A Privacy-Preserving Health Data Aggregation Scheme

Patients’ health data is very sensitive and the access to individual’s health data should be strictly restricted. However, many data consumers may need to use the aggregated health data. For example, the insurance companies needs to use this data to setup the premium level for health insurances. Therefore, privacy-preserving data aggregation solutions for health data have both theoretical importance and application potentials. In this paper, we propose a privacy-preserving health data aggregation scheme using differential privacy. In our scheme, patients’ health data are aggregated by the local healthcare center before it is used by data comsumers, and this prevents individual’s data from being leaked. Moreover, compared with the existing schemes in the literature, our work enjoys two additional benefits: 1) it not only resists many well known attacks in the open wireless networks, but also achieves the resilience against the human-factor-aware differential aggregation attack; 2) no trusted third party is employed in our proposed scheme, hence it achieves the robustness property and it does not suffer the single point failure problem.

[1]  Jian Shen,et al.  Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.

[2]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[3]  Yuhui Zheng,et al.  Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..

[4]  Xiaohui Liang,et al.  PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..

[5]  Sherali Zeadally,et al.  Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy , 2014, IEEE Transactions on Information Forensics and Security.

[6]  Jun Shao,et al.  Efficient verifiable multi-secret sharing scheme based on hash function , 2014, Inf. Sci..

[7]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[8]  Moni Naor,et al.  Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.

[9]  Han-Yu Lin,et al.  On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems , 2013, Journal of Medical Systems.

[10]  Fan Zhang,et al.  Securing communications between external users and wireless body area networks , 2013, HotWiSec '13.

[11]  Xiaolei Dong,et al.  Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid , 2014, IEEE Systems Journal.

[12]  Chun-I Fan,et al.  Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid , 2014, IEEE Transactions on Industrial Informatics.

[13]  Chandrashekhar Meshram,et al.  An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem , 2015, Inf. Process. Lett..

[14]  Kyung-Ah Shim An efficient ring signature scheme from pairings , 2015, Inf. Sci..