A Multi-Agent System for Healthcare Data Privacy

Research has been conducted on distributed data mining, privacy preserving data mining, and multiagent systems; however, integrating the aforementioned research areas require further investigation. Sensitive data sources, such as healthcare organizations, may be reluctant to permit sensitive data to leave the source or permit mining of the sensitive data. Additionally, distributed data mining on sensitive data spanning multiple organizations poses challenges for data privacy and integration. A multi-agent architecture may be employed to anonymize data at the source before transmission to a central repository for knowledge discovery. The advantages of the multi-agent method include customization based on individual organizational requirements, facilitating data integration, maintaining data privacy, and maintaining the integrity of source data. This research explores applying a multi-agent architecture coupled with privacy preserving techniques to mining distributed healthcare data. Results indicate a multi-agent architecture may facilitate data mining across disparate sensitive data sources while maintaining data and knowledge integrity.

[1]  Pat Langley,et al.  Induction of One-Level Decision Trees , 1992, ML.

[2]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[3]  Sung Wook Baik,et al.  Agent Based Distributed Data Mining , 2004, PDCAT.

[4]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[5]  Victoria Y. Yoon,et al.  Agent learning in the multi-agent contracting system [MACS] , 2008, Decis. Support Syst..

[6]  Isabel de la Torre Díez,et al.  Advances and Current State of the Security and Privacy in Electronic Health Records: Survey from a Social Perspective , 2012, Journal of Medical Systems.

[7]  M. Janssen,et al.  Multi-Agent Systems for the Simulation of Land-Use and Land-Cover Change: A Review , 2003 .

[8]  David A. Landgrebe,et al.  A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..

[9]  Michael Negnevitsky,et al.  Artificial Intelligence: A Guide to Intelligent Systems , 2001 .

[10]  Jacques Ferber,et al.  Organization models and behavioural requirements specification for multi-agent systems , 2000, Proceedings Fourth International Conference on MultiAgent Systems.

[11]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[12]  Timothy W. Finin,et al.  A negotiation-based Multi-agent System for Supply Chain Management , 1999 .

[13]  Tom Fawcett,et al.  Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions , 1997, KDD.

[14]  Sooyong Park,et al.  Designing multi-agent systems: a framework and application , 2005, Expert Syst. Appl..

[15]  M. Jay Norton,et al.  Knowledge Discovery in Databases , 1999, Libr. Trends.

[16]  Roy Rada,et al.  Applying Semantic Web Technologies to Ontology Alignment , 2012, Int. J. Intell. Inf. Technol..

[17]  Victoria Y. Yoon,et al.  A multiagent system for U.S. defense research contracting , 2005, CACM.

[18]  Matthias Klusch,et al.  Agent-Based Distributed Data Mining: The KDEC Scheme , 2003, AgentLink.

[19]  William Frawley,et al.  Knowledge Discovery in Databases , 1991 .

[20]  Moshe Tennenholtz,et al.  Adaptive Load Balancing: A Study in Multi-Agent Learning , 1994, J. Artif. Intell. Res..

[21]  Robert C. Holte,et al.  Very Simple Classification Rules Perform Well on Most Commonly Used Datasets , 1993, Machine Learning.

[22]  Longbing Cao,et al.  Agent Mining: The Synergy of Agents and Data Mining , 2009, IEEE Intelligent Systems.

[23]  Vladimir Gorodetsky,et al.  Multi-agent technology for distributed data mining and classification , 2003, IEEE/WIC International Conference on Intelligent Agent Technology, 2003. IAT 2003..

[24]  Victoria Y. Yoon,et al.  Natural language interface for multi-agent contracting system (MACS) , 2004, Intell. Syst. Account. Finance Manag..

[25]  Ling Li,et al.  Distributed data mining: a survey , 2012, Inf. Technol. Manag..

[26]  Agostino Poggi,et al.  Developing multi‐agent systems with a FIPA‐compliant agent framework , 2001 .

[27]  Zoran Obradovic,et al.  Distributed Privacy-Preserving Decision Support System for Highly Imbalanced Clinical Data , 2013, TMIS.

[28]  Ramon Martí,et al.  Secure Integration of Distributed Medical Data Using Mobile Agents , 2006, IEEE Intelligent Systems.

[29]  Nicholas R. Jennings,et al.  On agent-based software engineering , 2000, Artif. Intell..

[30]  Scott H. Clearwater,et al.  A Multi-Agent System for Controlling Building Environments , 1995, ICMAS.

[31]  Tomasz Imielinski,et al.  Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..

[32]  Liang Xiao,et al.  Developing a security protocol for a distributed decision support system in a healthcare environment , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.

[33]  Willy Susilo,et al.  Biometrics for Electronic Health Records , 2010, Journal of Medical Systems.

[34]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[35]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[36]  Kuan C. Chen,et al.  Designing Service Learning Project in Systems Analysis and Design Course , 2013 .

[37]  Ilker Hamzaoglu,et al.  Scalable, Distributed Data Mining - An Agent Architecture , 1997, KDD.

[38]  Adewale Opeoluwa Ogunde,et al.  Towards an adaptive multi-agent architecture for association rule mining in distributed databases , 2011, 3rd IEEE International Conference on Adaptive Science and Technology (ICAST 2011).

[39]  Barbara Hayes-Roth,et al.  An Architecture for Adaptive Intelligent Systems , 1995, Artif. Intell..

[40]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[41]  Heikki Mannila,et al.  Principles of Data Mining , 2001, Undergraduate Topics in Computer Science.

[42]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[43]  Ran Wolff,et al.  Distributed Data Mining in Peer-to-Peer Networks , 2006, IEEE Internet Computing.

[44]  Irina Rish,et al.  An empirical study of the naive Bayes classifier , 2001 .

[45]  Nicholas R. Jennings Agent-Oriented Software Engineering , 1999, MAAMAW.

[46]  Igor Kononenko,et al.  Inductive and Bayesian learning in medical diagnosis , 1993, Appl. Artif. Intell..

[47]  Yu-Fang Chung,et al.  A Password-Based User Authentication Scheme for the Integrated EPR Information System , 2012, Journal of Medical Systems.

[48]  Zoran Obradovic,et al.  Distributed Privacy Preserving Decision Support System for Predicting Hospitalization Risk in Hospitals with Insufficient Data , 2012, 2012 11th International Conference on Machine Learning and Applications.

[49]  Hyacinth S. Nwana,et al.  Software agents: an overview , 1996, The Knowledge Engineering Review.

[50]  Roy Rada,et al.  Integrating Knowledge Sources: An Ontological Approach , 2013, Int. J. Knowl. Manag..

[51]  Barbara Hayes Roth Architectural foundations for real-time performance in intelligent agents , 1990 .

[52]  François Bousquet,et al.  Using Self-Designed Role-Playing Games and a Multi-Agent System to Empower a Local Decision-Making Process for Land Use Management: The SelfCormas Experiment in Senegal , 2003, J. Artif. Soc. Soc. Simul..