Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems

被引:108
作者
Sharma, Sagar [1 ]
Chen, Keke [1 ]
Sheth, Amit [1 ]
机构
[1] Wright State Univ, Knoesis, Dayton, OH 45435 USA
基金
美国国家卫生研究院; 美国国家科学基金会;
关键词
application of privacy preserving protocols; Internet; IoT healthcare and privacy concerns; pervasive healthcare services; precision healthcare; privacy preserving outsourced computation; privacy risks in modern healthcare;
D O I
10.1109/MIC.2018.112102519
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern healthcare systems now rely on advanced computing methods and technologies, such as Internet of Things (IoT) devices and clouds, to collect and analyze personal health data at an unprecedented scale and depth. Patients, doctors, healthcare providers, and researchers depend on analytical models derived from such data sources to remotely monitor patients, early-diagnose diseases, and find personalized treatments and medications. However, without appropriate privacy protection, conducting data analytics becomes a source of a privacy nightmare. In this article, we present the research challenges in developing practical privacy-preserving analytics in healthcare information systems. The study is based on kHealth-a personalized digital healthcare information system that is being developed and tested for disease monitoring. We analyze the data and analytic requirements for the involved parties, identify the privacy assets, analyze existing privacy substrates, and discuss the potential tradeoff among privacy, efficiency, and model quality.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 15 条
[1]  
Agrawal R., 2004, P ACM SIGMOD INT C M, P563
[2]  
Anantharam Pramod, 2015, 2015 IEEE INT C MOB
[3]  
[Anonymous], 2013, Proceedings of the 2013 ACM SIGSAC conference on Computer communications security
[4]  
[Anonymous], 2010, Computing, DOI DOI 10.1145/1749603.1749605
[5]  
[Anonymous], 1979, COMMUNICATIONS ACM
[6]  
Boneh D., 2005, P 2 INT C THEOR CRYP
[7]  
Brakerski Z., 2012, FULLY HOMOMORPHIC EN
[8]  
Chen K., 2011, KNOWLEDGE INFORM SYS, V29
[9]  
Dwork C., 2006, INT C AUT L ANG PROG
[10]  
Graepel Thore, 2013, Information Security and Cryptology - ICISC 2012. 15th International Conference. Revised Selected Papers, P1, DOI 10.1007/978-3-642-37682-5_1