Skip to main content
Erschienen in: Journal of Medical Systems 3/2018

01.03.2018 | Mobile & Wireless Health

(a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems

verfasst von: Hongtao Li, Feng Guo, Wenyin Zhang, Jie Wang, Jinsheng Xing

Erschienen in: Journal of Medical Systems | Ausgabe 3/2018

Einloggen, um Zugang zu erhalten

Abstract

The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a1,k1)-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a1,k1)-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a2,k2)-anonymity (a1 ≥ a2, k2 ≥ k1). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.
Literatur
1.
Zurück zum Zitat Agrawal, R., and Srikant, R., Privacy-preserving data mining. SIGMOD Record (ACM Special Interest Group on Management of Data). 29(2):439–450, 2000. Agrawal, R., and Srikant, R., Privacy-preserving data mining. SIGMOD Record (ACM Special Interest Group on Management of Data). 29(2):439–450, 2000.
2.
Zurück zum Zitat Mohana, S., Mary, S.A., and Arul, S., Preserving privacy in health care information: a memetic approach. Journal of Medical Imaging and Health Informatics. 6(3):779–783, 2016.CrossRef Mohana, S., Mary, S.A., and Arul, S., Preserving privacy in health care information: a memetic approach. Journal of Medical Imaging and Health Informatics. 6(3):779–783, 2016.CrossRef
3.
Zurück zum Zitat Guan, S.P, Zhang, Y, Ji, Y., Preserving-Privacy Health Data Collection for Preschool Children. Computational and Mathematical Methods in Medical, Article ID 501607, 5 pages, 2013. Guan, S.P, Zhang, Y, Ji, Y., Preserving-Privacy Health Data Collection for Preschool Children. Computational and Mathematical Methods in Medical, Article ID 501607, 5 pages, 2013.
4.
Zurück zum Zitat Rahman, F, Williams, D, Wang, Q, et al. PriDac: Privacy Preserving Data Collection in Sensor enabled REID based Healthcare Services. 2014 I.E. 15th International Symposium on High-Assurance Systems Engineering, Washington: HASE: 236–242, 2014. Rahman, F, Williams, D, Wang, Q, et al. PriDac: Privacy Preserving Data Collection in Sensor enabled REID based Healthcare Services. 2014 I.E. 15th International Symposium on High-Assurance Systems Engineering, Washington: HASE: 236–242, 2014.
6.
Zurück zum Zitat Kumari, S., Karuppiah, M., Das, A.K., et al., A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers[J]. J. Supercomput. 4:1–26, 2017. Kumari, S., Karuppiah, M., Das, A.K., et al., A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers[J]. J. Supercomput. 4:1–26, 2017.
7.
Zurück zum Zitat Lakshmi, S., and Ramesh, S.P., Secure encrypted-data routing protocol for wireless sensor networks. Journal of Computer Applications. 5:167–173, 2012. Lakshmi, S., and Ramesh, S.P., Secure encrypted-data routing protocol for wireless sensor networks. Journal of Computer Applications. 5:167–173, 2012.
8.
Zurück zum Zitat Ganesh, S., and Amutha, R., Efficient and secure routing protocol for wireless sensor networks through optimal power control and optimal handoff-based recovery mechanism. Journal of Computer Networks and Communications. 2012:1–8, 2012.CrossRef Ganesh, S., and Amutha, R., Efficient and secure routing protocol for wireless sensor networks through optimal power control and optimal handoff-based recovery mechanism. Journal of Computer Networks and Communications. 2012:1–8, 2012.CrossRef
9.
Zurück zum Zitat Kumari, S., Design flaws of “an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography”[J]. Multimedia Tools & Applications:1–3, 2016. Kumari, S., Design flaws of “an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography”[J]. Multimedia Tools & Applications:1–3, 2016.
11.
Zurück zum Zitat Kumar, S, Dohare, D, Kumar, M. An efficient key distribution scheme for wireless sensor networks using polynomial based schemes. 2012 International Conference on Information and Network Technology, Singapore: IACSIT, 21–27, 2012. Kumar, S, Dohare, D, Kumar, M. An efficient key distribution scheme for wireless sensor networks using polynomial based schemes. 2012 International Conference on Information and Network Technology, Singapore: IACSIT, 21–27, 2012.
12.
Zurück zum Zitat Kumari, S., Khan, M.K., and Atiquzzaman, M., User authentication schemes for wireless sensor networks: A review[J]. Ad Hoc Netw. 27(C):159–194, 2015.CrossRef Kumari, S., Khan, M.K., and Atiquzzaman, M., User authentication schemes for wireless sensor networks: A review[J]. Ad Hoc Netw. 27(C):159–194, 2015.CrossRef
13.
Zurück zum Zitat Zhang, N, Wang, S, Zhao, W., A new scheme on privacy-preserving data classification. International Conference on Knowledge Discovery and Data Mining, pp. 374–382, 2005. Zhang, N, Wang, S, Zhao, W., A new scheme on privacy-preserving data classification. International Conference on Knowledge Discovery and Data Mining, pp. 374–382, 2005.
14.
Zurück zum Zitat Sivaraman, V., Swaminathan, N., and Vijayaraghavan, P., Privacy preserving web search by client side generalization of user profile. Asian Journal of Computer Science and Technology. 4(1):14–17, 2015. Sivaraman, V., Swaminathan, N., and Vijayaraghavan, P., Privacy preserving web search by client side generalization of user profile. Asian Journal of Computer Science and Technology. 4(1):14–17, 2015.
15.
Zurück zum Zitat Vishwakarma, B, Gupta, H, Manoria, M., A survey on privacy preserving mining implementing techniques[C]//Colossal Data Analysis and Networking (CDAN), Symposium on. IEEE: 1–5, 2016. Vishwakarma, B, Gupta, H, Manoria, M., A survey on privacy preserving mining implementing techniques[C]//Colossal Data Analysis and Networking (CDAN), Symposium on. IEEE: 1–5, 2016.
16.
Zurück zum Zitat Iyengar V.S., Transforming data to satisfy privacy constraints. In: Proceeding of the 8th ACM international conference on knowledge discovery and data mining (SIGKDD), Edmonton: ACM, 279–288, 2002. Iyengar V.S., Transforming data to satisfy privacy constraints. In: Proceeding of the 8th ACM international conference on knowledge discovery and data mining (SIGKDD), Edmonton: ACM, 279–288, 2002.
17.
Zurück zum Zitat Samarati, P, Sweeney, L., Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc. of the IEEE Symposium on Research in Security and Privacy, 1998. Samarati, P, Sweeney, L., Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc. of the IEEE Symposium on Research in Security and Privacy, 1998.
18.
Zurück zum Zitat Wong, R., Li, J., Fu, A., et al., (a,k)-Anonymous data publishing[J]. J. Intell. Inf. Syst. 33(2):209–234, 2009.CrossRef Wong, R., Li, J., Fu, A., et al., (a,k)-Anonymous data publishing[J]. J. Intell. Inf. Syst. 33(2):209–234, 2009.CrossRef
19.
Zurück zum Zitat Meyerson, A, Williams, R., On the complexity of optimal k-anonymity. In: Proceeding of POD’04 the 23rd ACM SIGMOD-SIGACTSIGART Symposium on the Principles of Database Systems, New York: ACM. 223–228, 2004. Meyerson, A, Williams, R., On the complexity of optimal k-anonymity. In: Proceeding of POD’04 the 23rd ACM SIGMOD-SIGACTSIGART Symposium on the Principles of Database Systems, New York: ACM. 223–228, 2004.
22.
Zurück zum Zitat Jin, X, Zhang, N, Das, G., Algorithm-safe privacy preserving data publishing. In: Proceeding of EDBT’10 the 13 International Conference on Extending Database Technology, New York: ACM. 633–644, 2010. Jin, X, Zhang, N, Das, G., Algorithm-safe privacy preserving data publishing. In: Proceeding of EDBT’10 the 13 International Conference on Extending Database Technology, New York: ACM. 633–644, 2010.
23.
Zurück zum Zitat Jin, X., Zhang, N., and Das, G., ASAP: eliminating algorithm-based disclosure in privacy-preserving data publishing. Inf. Syst. 36:859–880, 2011.CrossRef Jin, X., Zhang, N., and Das, G., ASAP: eliminating algorithm-based disclosure in privacy-preserving data publishing. Inf. Syst. 36:859–880, 2011.CrossRef
24.
Zurück zum Zitat Jiang, Q., Chen, Z.R., Li, B.Y., and Ma, J.F., Security analysis and improvement of biohashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Compiting, 2017. https://doi.org/10.1007/s12652-017-0516-2. Jiang, Q., Chen, Z.R., Li, B.Y., and Ma, J.F., Security analysis and improvement of biohashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Compiting, 2017. https://​doi.​org/​10.​1007/​s12652-017-0516-2.
25.
Zurück zum Zitat Lee, C.C., Hsu, C.W., Lai, Y.M., et al., An enhanced mobile-healthcare emergency system based on extended chaotic maps.[J]. J. Med. Syst. 37(5):1–12, 2013.CrossRef Lee, C.C., Hsu, C.W., Lai, Y.M., et al., An enhanced mobile-healthcare emergency system based on extended chaotic maps.[J]. J. Med. Syst. 37(5):1–12, 2013.CrossRef
26.
Zurück zum Zitat He, D., Kumar, N., Chen, J., et al., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks[J]. Multimedia Systems. 21(1):49–60, 2015.CrossRef He, D., Kumar, N., Chen, J., et al., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks[J]. Multimedia Systems. 21(1):49–60, 2015.CrossRef
27.
Zurück zum Zitat Li, C.T., Lee, C.C., Weng, C.Y., et al., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems[J]. J. Med. Syst. 40(11):1–10, 2016.CrossRef Li, C.T., Lee, C.C., Weng, C.Y., et al., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems[J]. J. Med. Syst. 40(11):1–10, 2016.CrossRef
29.
Zurück zum Zitat Hung, T.H, Hsieh, S.H, Lu, C.S., Privacy-preserving data collection and recovery of compressive sensing[C]//Signal and Information Processing (ChinaSIP), 2015 I.E. China Summit and International Conference on. IEEE: 473–477, 2015. Hung, T.H, Hsieh, S.H, Lu, C.S., Privacy-preserving data collection and recovery of compressive sensing[C]//Signal and Information Processing (ChinaSIP), 2015 I.E. China Summit and International Conference on. IEEE: 473–477, 2015.
30.
Zurück zum Zitat Wu, D., Si, S., Wu, S., et al., Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing[J]. IEEE Internet of Things Journal. PP(99):1–1, 2017. Wu, D., Si, S., Wu, S., et al., Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing[J]. IEEE Internet of Things Journal. PP(99):1–1, 2017.
31.
Zurück zum Zitat Mohammed, H, Tonyali, S, Rabieh, K, et al., Efficient privacy-preserving data collection scheme for smart grid ami networks[C]//Proc. of IEEE Globecom. 2016. Mohammed, H, Tonyali, S, Rabieh, K, et al., Efficient privacy-preserving data collection scheme for smart grid ami networks[C]//Proc. of IEEE Globecom. 2016.
32.
Zurück zum Zitat Cox, L.H., Suppression methodology and statistical disclosure control. J. Am. Stat. Assoc. 75:377–385, 1980.CrossRef Cox, L.H., Suppression methodology and statistical disclosure control. J. Am. Stat. Assoc. 75:377–385, 1980.CrossRef
33.
Zurück zum Zitat Li, H.T., Ma, J.F., and Fu, S., A privacy-preserving data collection model for digital community. Science China Inf. Sci. 58(3):1–16, 2014. Li, H.T., Ma, J.F., and Fu, S., A privacy-preserving data collection model for digital community. Science China Inf. Sci. 58(3):1–16, 2014.
34.
Zurück zum Zitat Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications. 27(4):365–378, 2009.CrossRef Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications. 27(4):365–378, 2009.CrossRef
35.
Zurück zum Zitat Song, J, Myungae, C., SHOES: secure healthcare oriented environment service model. In Proceedings of the IEEE Biomedical Circuits and Systems Conference Healthcare Technology, London, Bio CAS: 89–93, 2006. Song, J, Myungae, C., SHOES: secure healthcare oriented environment service model. In Proceedings of the IEEE Biomedical Circuits and Systems Conference Healthcare Technology, London, Bio CAS: 89–93, 2006.
Metadaten
Titel
(a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems
verfasst von
Hongtao Li
Feng Guo
Wenyin Zhang
Jie Wang
Jinsheng Xing
Publikationsdatum
01.03.2018
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 3/2018
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-018-0896-7

Weitere Artikel der Ausgabe 3/2018

Journal of Medical Systems 3/2018 Zur Ausgabe