(a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems

The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a1,k1)-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a1,k1)-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a2,k2)-anonymity (a1 ≥ a2, k2 ≥ k1). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

[1]  Sanjay Kumar,et al.  An Efficient Key Distribution Scheme for Wireless Sensor Networks using polynomial based schemes , 2022 .

[2]  Shaopeng Guan,et al.  Privacy-Preserving Health Data Collection for Preschool Children , 2013, Comput. Math. Methods Medicine.

[3]  S. A. Sahaaya Arul Mary,et al.  Preserving Privacy in Health Care Information: A Memetic Approach , 2016 .

[4]  S Lakshmi Secure Encrypted-Data Routing Protocol for Wireless Sensor Networks , 2012 .

[5]  Kemal Akkaya,et al.  Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[6]  Manish Manoria,et al.  A survey on privacy preserving mining implementing techniques , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[7]  Jian Shen,et al.  Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems , 2018, J. Ambient Intell. Humaniz. Comput..

[8]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[9]  Sheikh Iqbal Ahamed,et al.  PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare Services , 2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering.

[10]  Shaoen Wu,et al.  Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing , 2018, IEEE Internet of Things Journal.

[11]  R. Sugumar,et al.  Conditional Entropy with Swarm Optimization Approach for Privacy Preservation of Datasets in Cloud , 2016 .

[12]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[13]  Jianfeng Ma,et al.  A privacy-preserving data collection model for digital community , 2015, Science China Information Sciences.

[14]  L. Cox Suppression Methodology and Statistical Disclosure Control , 1980 .

[15]  Xin Jin,et al.  ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing , 2011, Inf. Syst..

[16]  Muhammad Khurram Khan,et al.  User authentication schemes for wireless sensor networks: A review , 2015, Ad Hoc Networks.

[17]  Adam Meyerson,et al.  On the complexity of optimal K-anonymity , 2004, PODS.

[18]  Guangjun Liu,et al.  RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data , 2017, Mobile Networks and Applications.

[19]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[20]  Myungae Chung,et al.  SHOES : Secure Healthcare Oriented Environement Service Model , 2006, 2006 IEEE Biomedical Circuits and Systems Conference.

[21]  Catherine Blake,et al.  UCI Repository of machine learning databases , 1998 .

[22]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[23]  Xiong Li,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[24]  Sivaraman.,et al.  Privacy Preserving Web Search by Client Side Generalization of User Profile , 2015, Asian Journal of Computer Science and Technology.

[25]  Saru Kumari Design flaws of “an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography” , 2016, Multimedia Tools and Applications.

[26]  Raymond Chi-Wing Wong,et al.  (α, k)-anonymous data publishing , 2009, Journal of Intelligent Information Systems.

[27]  Xiaojun Zhang,et al.  A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety , 2015, Journal of Medical Systems.

[28]  Cheng-Chi Lee,et al.  A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems , 2016, Journal of Medical Systems.

[29]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.

[30]  Xin Jin,et al.  Algorithm-safe privacy-preserving data publishing , 2010, EDBT '10.

[31]  Chun-Shien Lu,et al.  Privacy-preserving data collection and recovery of compressive sensing , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[32]  Chao Yang,et al.  Efficient end-to-end authentication protocol for wearable health monitoring systems , 2017, Comput. Electr. Eng..

[33]  Vijay S. Iyengar,et al.  Transforming data to satisfy privacy constraints , 2002, KDD.

[34]  Athanasios V. Vasilakos,et al.  An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps , 2013, Journal of Medical Systems.

[35]  Wei Zhao,et al.  A new scheme on privacy-preserving data classification , 2005, KDD '05.