Enabling Clustering for Privacy-Aware Data Dissemination Based on Medical Healthcare-IoTs (MH-IoTs) for Wireless Body Area Network

There is a need to develop an effective data preservation scheme with minimal information loss when the patient's data are shared in public interest for different research activities. Prior studies have devised different approaches for data preservation in healthcare domains; however, there is still room for improvement in the design of an elegant data preservation approach. With that motivation behind, this study has proposed a medical healthcare-IoTs-based infrastructure with restricted access. The infrastructure comprises two algorithms. The first algorithm protects the sensitivity information of a patient with quantifying minimum information loss during the anonymization process. The algorithm has also designed the access polices comprising the public access, doctor access, and the nurse access, to access the sensitivity information of a patient based on the clustering concept. The second suggested algorithm is K-anonymity privacy preservation based on local coding, which is based on cell suppression. This algorithm utilizes a mapping method to classify the data into different regions in such a manner that the data of the same group are placed in the same region. The benefit of using local coding is to restrict third-party users, such as doctors and nurses, when trying to insert incorrect values in order to access real patient data. Efficiency of the proposed algorithm is evaluated against the state-of-the-art algorithm by performing extensive simulations. Simulation results demonstrate benefits of the proposed algorithms in terms of efficient cluster formation in minimum time, minimum information loss, and execution time for data dissemination.

[1]  Xiao Chun Yin,et al.  An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks , 2019, Sensors.

[2]  Peng Liu,et al.  The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved , 2018, IEEE Internet of Things Journal.

[3]  Feng Bao,et al.  Evolving privacy: From sensors to the Internet of Things , 2017, Future Gener. Comput. Syst..

[4]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[5]  Lukáš Hellebrandt,et al.  Survey of Privacy Enabling Strategies in IoT Networks , 2017 .

[6]  Amit P. Sheth,et al.  Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems , 2018, IEEE Internet Computing.

[7]  Mansour Naser Alraja,et al.  The Effect of Security, Privacy, Familiarity, and Trust on Users’ Attitudes Toward the Use of the IoT-Based Healthcare: The Mediation Role of Risk Perception , 2019, IEEE Access.

[8]  Yuguang Fang,et al.  Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare , 2019, IEEE Internet of Things Journal.

[9]  Baoding Zhou,et al.  APs’ Virtual Positions-Based Reference Point Clustering and Physical Distance-Based Weighting for Indoor Wi-Fi Positioning , 2018, IEEE Internet of Things Journal.

[10]  Jianqiang Li,et al.  A top-down approach for approximate data anonymisation , 2013, Enterp. Inf. Syst..

[11]  Ibrahim Khalil,et al.  Real-time Secure Health Surveillance for Smarter Health Communities , 2019, IEEE Communications Magazine.

[12]  Amir Mosavi,et al.  A New K-Nearest Neighbors Classifier for Big Data Based on Efficient Data Pruning , 2020, Mathematics.

[13]  Paolo Bellavista,et al.  A privacy-preserving cryptosystem for IoT E-healthcare , 2020, Inf. Sci..

[14]  Chen Wang,et al.  P3-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization , 2018, IEEE/ACM Transactions on Networking.

[15]  Sanjay Kumar Jena,et al.  Anonymizing social networks: A generalization approach , 2013, Comput. Electr. Eng..

[16]  Hamada H. Ghenniwa,et al.  Ambient Systems , Networks and Technologies ( ANT 2015 ) Privacy in Internet of Things : A Model and Protection Framework , 2015 .

[17]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[18]  Jie Wu,et al.  PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems , 2018, IEEE Communications Magazine.

[19]  Abdul Hanan Abdullah,et al.  TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network , 2017, Journal of Medical Systems.

[20]  Mritunjay Kumar Rai,et al.  Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications , 2019, IEEE Access.

[21]  Abdul Hanan Abdullah,et al.  EETP-MAC: energy efficient traffic prioritization for medium access control in wireless body area networks , 2020, Telecommun. Syst..

[22]  Munam Ali Shah,et al.  A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT , 2017 .

[23]  Nenghai Yu,et al.  Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data , 2019, IEEE Internet of Things Journal.

[24]  Andy Crabtree,et al.  Personal Data, Privacy and the Internet of Things: The Shifting Locus of Agency and Control , 2016 .

[25]  Iti Saha Misra,et al.  Performance Analysis of Scheduled Access Mode of the IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions , 2020, IEEE Transactions on Mobile Computing.

[26]  Victor I. Chang,et al.  Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..

[27]  Xianmang He,et al.  Clustering-Based k-Anonymity , 2012, PAKDD.

[28]  Kwan-Liu Ma,et al.  A Utility-Aware Visual Approach for Anonymizing Multi-Attribute Tabular Data , 2018, IEEE Transactions on Visualization and Computer Graphics.

[29]  Jie Wang,et al.  (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems , 2018, Journal of Medical Systems.