skip to main content
research-article

UtilityAware: : A framework for data privacy protection in e-health

Published: 01 September 2023 Publication History

Abstract

Data privacy in e-health deals with the protection of sensitive medical information that is collected, stored, and analyzed in electronic health systems. Several organizations publish sensitive person-specific data for research purposes. E-health data and related domains are the loci of research. First, in publishing sensitive person-specific datasets, ensuring the privacy of user sensitive information is an issue. Secondly, ascertaining both privacy-preservation and data utility simultaneously are contradictory to each other. In addition, all transactions have the same prior belief that may result in erroneous modeling and privacy breaches. To refrain from the belief of an adversary and to solve the above discussed issues, a semantic privacy guarantee must be ensured before publishing data by any organization. This paper proposes a solution to the former issue, a framework for privacy preservation of structured datasets in ascertaining that an adversary has low confidence in extrapolation. The latter problem is also tackled by the proposed framework that combines stratified sampling with generalization to achieve representative semantic privacy-preservation with high data utility. Moreover, this study presents a mathematical proof that the proposed framework achieves differential privacy. Our experimental results show that our algorithm provides better data utility and privacy simultaneously. The proposed framework achieves 3% and 0.04% higher classification accuracy and low relative error, respectively, compared to state-of-the-art existing privacy-preservation approaches.

References

[1]
C.C. Aggarwal, S.Y. Philip, A condensation approach to privacy preserving data mining, in: International Conference on Extending Database Technology, Springer, 2004, pp. 183–199.
[2]
K. ALoufi, K. Malik, T. Naeem, R. Mir, Data transmission and capacity over efficient iot energy consumption, Int. J. Comput. Sci. Netw. Secur. 19 (2019) 102.
[3]
G. Beigi, H. Liu, A survey on privacy in social media: identification, mitigation, and applications, ACM Trans. Data Sci. 1 (2020) 1–38.
[4]
P.R. Bhaladhare, D.C. Jinwala, Novel approaches for privacy preserving data mining in k-anonymity model, J. Inf. Sci. Eng. 32 (2016) 63–78.
[5]
S. Biswas, N. Khare, P. Agrawal, P. Jain, Machine learning concepts for correlated big data privacy, J. Big Data 8 (2021) 1–32.
[6]
S.S. Borhade, B.B. Shinde, Privacy preserving data mining using association rule with condensation approach, Int. J. Emerg. Technol. Adv. Eng. 4 (2014) 292–296.
[7]
C. Dwork, A. Roth, et al., The algorithmic foundations of differential privacy, Found. Trends® Theor. Comput. Sci. 9 (2014) 211–407.
[8]
U. Farooq, N. Tariq, M. Asim, T. Baker, A. Al-Shamma'a, Machine learning and the Internet of things security: solutions and open challenges, J. Parallel Distrib. Comput. 162 (2022) 89–104.
[9]
Z. Gu, G. Zhang, Trajectory data publication based on differential privacy, Int. J. Inf. Secur. Priv. (IJISP) 17 (2023) 1–15.
[10]
M.U. Hassan, M.H. Rehmani, J. Chen, Optimizing blockchain based smart grid auctions: a green revolution, IEEE Trans. Green Commun. Netw. 6 (2021) 462–471.
[11]
C. Iwendi, S.A. Moqurrab, A. Anjum, S. Khan, S. Mohan, G. Srivastava, N-sanitization: a semantic privacy-preserving framework for unstructured medical datasets, Comput. Commun. (2020).
[12]
V.S. Iyengar, Transforming data to satisfy privacy constraints, in: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002, pp. 279–288.
[13]
T. Kanwal, S.A. Moqurrab, A. Anjum, A. Khan, J.J. Rodrigues, G. Jeon, Formal verification and complexity analysis of confidentiality aware textual clinical documents framework, Int. J. Intell. Syst. (2021).
[14]
N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and l-diversity, in: 2007 IEEE 23rd International Conference on Data Engineering, IEEE, 2007, pp. 106–115.
[15]
Li, N.; Qardaji, W.H.; Su, D. (2011): Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR arXiv:1101.2604 49, 55.
[16]
T. Li, N. Li, On the tradeoff between privacy and utility in data publishing, in: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009, pp. 517–526.
[17]
J.L. Lin, M.C. Wei, An efficient clustering method for k-anonymization, in: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008, pp. 46–50.
[18]
P. Liu, Y. Bai, L. Wang, X. Li, Partial k-anonymity for privacy-preserving social network data publishing, Int. J. Softw. Eng. Knowl. Eng. 27 (2017) 71–90.
[19]
G. Loukides, J. Shao, Data utility and privacy protection trade-off in k-anonymisation, in: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008, pp. 36–45.
[20]
A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, l-diversity: privacy beyond k-anonymity, ACM Trans. Knowl. Discov. Data 1 (2007) 3–es.
[21]
C. Mistry, U. Thakker, R. Gupta, M.S. Obaidat, S. Tanwar, N. Kumar, J.J. Rodrigues, Medblock: an ai-enabled and blockchain-driven medical healthcare system for Covid-19, in: ICC 2021-IEEE International Conference on Communications, IEEE, 2021, pp. 1–6.
[22]
I. Mistry, S. Tanwar, S. Tyagi, N. Kumar, Blockchain for 5g-enabled iot for industrial automation: a systematic review, solutions, and challenges, Mech. Syst. Signal Process. 135 (2020).
[23]
S.A. Moqurrab, A. Anjum, A. Khan, M. Ahmed, A. Ahmad, G. Jeon, Deep-confidentiality: an iot-enabled privacy-preserving framework for unstructured big biomedical data, ACM Trans. Internet Technol. 22 (2021) 1–21.
[24]
S.A. Moqurrab, A. Anjum, U. Manzoor, S. Nefti, N. Ahmad, S. Ur Rehman Malik, Differential average diversity: an efficient privacy mechanism for electronic health records, J. Med. Imag. Health Inform. 7 (2017) 1177–1187.
[25]
S.A. Moqurrab, A. Anjum, N. Tariq, G. Srivastava, Instant_anonymity: a lightweight semantic privacy guarantee for 5g-enabled iiot, IEEE Trans. Ind. Inform. (2022).
[26]
A. Mubarak, S. Iqbal, T. Naeem, S. Hussain, 2 mm: a new technique for sorting data, Theor. Comput. Sci. 910 (2022) 68–90.
[27]
A. Nawaz, T. Naeem, M. Tayyab, Application profiling from encrypted traffic, in: International Conference on Cyber Warfare and Security (ICCWS), IEEE, 2021, pp. 1–8.
[28]
S. Ni, M. Xie, Q. Qian, Clustering based k-anonymity algorithm for privacy preservation, Int. J. Netw. Secur. 19 (2017) 1062–1071.
[29]
Y. Qu, J. Xu, S. Yu, Privacy preserving in big data sets through multiple shuffle, in: Proceedings of the Australasian Computer Science Week Multiconference, 2017, pp. 1–8.
[30]
A.S. Sattar, J. Li, X. Ding, J. Liu, M. Vincent, A general framework for privacy preserving data publishing, Knowl.-Based Syst. 54 (2013) 276–287.
[31]
M. Sharma, A. Chaudhary, M. Mathuria, S. Chaudhary, Privacy preserving data publishing based on k-anonymity by categorization of sensitive values, Int. J. Sci. Eng. Res. (2014).
[32]
M. Sridhar, B.R. Babu, A fuzzy approach for privacy preserving in data mining, Int. J. Comput. Appl. 57 (2012).
[33]
X. Sun, H. Wang, J. Li, T.M. Truta, Enhanced p-sensitive k-anonymity models for privacy preserving data publishing, Trans. Data Priv. 1 (2008) 53–66.
[34]
L. Sweeney, k-anonymity: a model for protecting privacy, Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10 (2002) 557–570.
[35]
X. Tang, M. Shen, Q. Li, L. Zhu, T. Xue, Q. Qu, Pile: robust privacy-preserving federated learning via verifiable perturbations, IEEE Trans. Dependable Secure Comput. (2023).
[36]
C. Tian, Y. Xu, W. Zuo, Image denoising using deep cnn with batch renormalization, Neural Netw. 121 (2020) 461–473.
[37]
C. Tian, Y. Zhang, W. Zuo, C.W. Lin, D. Zhang, Y. Yuan, A heterogeneous group cnn for image super-resolution, IEEE Trans. Neural Netw. Learn. Syst. (2022).
[38]
J. Vora, A. Nayyar, S. Tanwar, S. Tyagi, N. Kumar, M.S. Obaidat, J.J. Rodrigues, Bheem: a blockchain-based framework for securing electronic health records, in: 2018 IEEE Globecom Workshops (GC Wkshps), IEEE, 2018, pp. 1–6.
[39]
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, A.W.C. Fu, Utility-based anonymization using local recoding, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006, pp. 785–790.
[40]
Z. Yan, K.S. Zachrison, L.H. Schwamm, J.J. Estrada, R. Duan, A privacy-preserving and computation-efficient federated algorithm for generalized linear mixed models to analyze correlated electronic health records data, PLoS ONE 18 (2023).
[41]
L. Yao, X. Wang, X. Wang, H. Hu, G. Wu, Publishing sensitive trajectory data under enhanced l-diversity model, in: 2019 20th IEEE International Conference on Mobile Data Management (MDM), IEEE, 2019, pp. 160–169.
[42]
L. Zhang, J. Xuan, R. Si, R. Wang, An improved algorithm of individuation k-anonymity for multiple sensitive attributes, Wirel. Pers. Commun. 95 (2017) 2003–2020.
[43]
Q. Zhang, N. Koudas, D. Srivastava, T. Yu, Aggregate query answering on anonymized tables, in: 2007 IEEE 23rd International Conference on Data Engineering, IEEE, 2007, pp. 116–125.
[44]
Y. Zhao, J. Chen, A survey on differential privacy for unstructured data content, ACM Comput. Surv. (CSUR) 54 (2022) 1–28.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Information Sciences: an International Journal
Information Sciences: an International Journal  Volume 643, Issue C
Sep 2023
760 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 01 September 2023

Author Tags

  1. Anonymization
  2. Data utility
  3. Data privacy
  4. Local recoding
  5. Sampling
  6. Data publishing

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media