An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare

Big data mining-driven disease risk prediction has become one of the important topics in the field of e-healthcare. However, without the security and privacy assurances, disease risk prediction cannot continue to flourish. To address this challenge, in this paper, an efficient and privacy-preserving disease risk prediction scheme for e-healthcare is proposed, hereafter referred to as EPDP. Compared with the up-to-date works, the proposed EPDP comprehensively achieves two phases of disease risk prediction, i.e., disease model training and disease prediction, while ensuring the privacy preservation. Specifically, a super-increasing sequence is combined with a homomorphic cryptographic algorithm to efficiently extract the symptom set of each disease in the phase of disease model training. Bloom filter technique is introduced to compute the prediction result in the phase of disease risk prediction. Besides, extensive performance evaluations demonstrate that our proposed EPDP attains outstanding efficiency advantage over the state-of-the-art in terms of both computational and communication overheads, and hence our EPDP is more suitable for real-time e-healthcare, especially medical emergency.

[1]  Jaideep Vaidya,et al.  Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.

[2]  Jun Zhou,et al.  PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System , 2015, IEEE Transactions on Parallel and Distributed Systems.

[3]  Kazunori Matsumoto,et al.  Prediction for Disease Risk and Medical Cost using Time Series Healthcare Data , 2016, HEALTHINF.

[4]  Azzedine Boukerche,et al.  Monitoring patients via a secure and mobile healthcare system , 2010, IEEE Wireless Communications.

[5]  Samina Raza Abidi,et al.  Semantics-based plausible reasoning to extend the knowledge coverage of medical knowledge bases for improved clinical decision support , 2017, BioData Mining.

[6]  Stratis Ioannidis,et al.  Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.

[7]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[8]  Chris Clifton,et al.  Privacy-preserving Naïve Bayes classification , 2008, The VLDB Journal.

[9]  Xiaohui Liang,et al.  Security and privacy for mobile healthcare networks: from a quality of protection perspective , 2015, IEEE Wireless Communications.

[10]  Yuguang Fang,et al.  Privacy and emergency response in e-healthcare leveraging wireless body sensor networks , 2010, IEEE Wireless Communications.

[11]  Min Ji,et al.  CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..

[12]  Zekeriya Erkin,et al.  Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.

[13]  M. Bonten,et al.  treatment of , 2004 .

[14]  Xiaohui Liang,et al.  Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage , 2018, IEEE Transactions on Dependable and Secure Computing.

[15]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[16]  Xiaoxia Liu,et al.  Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM , 2017, IEEE Journal of Biomedical and Health Informatics.

[17]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[18]  Xiaolei Dong,et al.  PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.

[19]  Jacques Stern,et al.  RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.

[20]  Muttukrishnan Rajarajan,et al.  Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification , 2014, IEEE Journal of Biomedical and Health Informatics.

[21]  Xuemin Shen,et al.  Security and Privacy for Mobile Healthcare Networks , 2015, Wireless Networks.

[22]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[23]  Cheng Huang,et al.  PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare , 2015, 2015 10th International Conference on Information, Communications and Signal Processing (ICICS).

[24]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[25]  Jiming Chen,et al.  Smart community: an internet of things application , 2011, IEEE Communications Magazine.

[26]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[27]  Sushruta Mishra,et al.  Impact of Swarm Intelligence Techniques in Diabetes Disease Risk Prediction , 2016, Int. J. Knowl. Discov. Bioinform..

[28]  Xiaoyan Zhu,et al.  EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks , 2015, Sensors.

[29]  Jianfeng Ma,et al.  Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.

[30]  Chun-Nan Hsu,et al.  Why Discretization Works for Naive Bayesian Classifiers , 2000, ICML.

[31]  Ji Zhang,et al.  A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset , 2017, PAKDD.

[32]  Tzu-Tsung Wong,et al.  Naïve Bayesian Classifiers with Multinomial Models for rRNA Taxonomic Assignment , 2013, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[33]  Xiaolei Dong,et al.  Securing m-healthcare social networks: challenges, countermeasures and future directions , 2013, IEEE Wireless Communications.

[34]  Wei Jiang,et al.  k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2014, IEEE Transactions on Knowledge and Data Engineering.

[35]  ALESSANDRA TONINELLI,et al.  Enabling secure service discovery in mobile healthcare enterprise networks , 2009, IEEE Wireless Communications.

[36]  David L. Buckeridge,et al.  Enteric disease episodes and the risk of acquiring a future sexually transmitted infection: a prediction model in Montreal residents , 2016, J. Am. Medical Informatics Assoc..

[37]  Cheng Huang,et al.  PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[38]  Robert Clarke,et al.  Risk prediction for cardiovascular disease using ECG data in the China kadoorie biobank , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[39]  G Eysenbach,et al.  What is e-health? , 2001, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[40]  Yun Ling,et al.  Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage , 2018, IEEE Transactions on Information Forensics and Security.

[41]  Angelo De Caro,et al.  jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[42]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[43]  Seher Korkmaz,et al.  A health record integrated clinical decision support system to support prescriptions of pharmaceutical drugs in patients with reduced renal function: Design, development and proof of concept , 2015, Int. J. Medical Informatics.

[44]  Tatsuaki Okamoto,et al.  A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.

[45]  Cong Wang,et al.  Learning the Truth Privately and Confidently: Encrypted Confidence-Aware Truth Discovery in Mobile Crowdsensing , 2018, IEEE Transactions on Information Forensics and Security.