Privacy Protection Methods Research for Healthcare Big Data Based on FCM Clustering Algorithm

被引:0
作者
Ran, Chao [1 ]
Huang, Wendong [2 ]
机构
[1] Marxist Academy, Guangdong Jiangmen Chinese Medicine College, China
[2] Information Center, Guangdong Jiangmen Chinese Medicine College, Jiangmen,529000, China
关键词
D O I
10.6633/IJNS.202411_26(6).12
中图分类号
学科分类号
摘要
With the rapid growth of healthcare big data, protecting data privacy has become an important challenge. This study aims to apply the fuzzy C-means clustering algorithm for clustering analysis of health and medical big data and use methods such as risk quantification and access control to control user behavior. The experimental results showed that when the data volume reached 200000, the fuzzy C-means clustering model exhibited optimal performance, taking only 15.9 milliseconds. Meanwhile, when processing the same amount of data, the model had the shortest cumulative time, only 7.6 minutes. Compared with the statistical analysis model, this model not only performed well but also had lower CPU usage. Doctors, researchers, and insurance company personnel have drawn different conclusions regarding the risk limits of different restrictions. In addition, the model can implement differentiated access behavior control for users who trust directly and indirectly based on the difference in trust level, demonstrating its strong ability in data encryption. This method not only protects data privacy, but also maintains good data quality, providing a new solution for the privacy protection of healthcare big data, and is of great significance for research and practice in related fields. © (2024), (International Journal of Network Security). All rights reserved.
引用
收藏
页码:1027 / 1037
相关论文
共 50 条
[31]   Utility-based SK-clustering algorithm for privacy preservation of anonymized data in healthcare [J].
Shobana G. ;
Shankar S. .
Recent Advances in Computer Science and Communications, 2021, 14 (05) :1610-1615
[32]   Power Industry Big Data Privacy Protection Processing Method Based on Fuzzy Logic and Intelligent Clustering [J].
Hang, Feilu ;
Xie, Linjiang ;
Zhang, Zhenhong ;
Guo, Wei ;
Li, Hanruo .
Distributed Generation and Alternative Energy Journal, 2022, 37 (05) :1461-1492
[33]   Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data [J].
Du, Jiawen ;
Pi, Yong .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[34]   Interval attributes description based FCM clustering algorithm for noisy data [J].
Xa Shixiong ;
Li Yue'e ;
Zhou Yong .
FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, :667-670
[35]   FCM-based clustering algorithm ensemble for large data sets [J].
Li, Jie ;
Gao, Xinbo ;
Tian, Chunna .
FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 :559-567
[36]   Cybersecurity of Medical Data Based on Big Data and Privacy Protection Method [J].
Li, Jianhong ;
Pan, An ;
Zheng, Tongxing .
INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (05)
[37]   Data Incremental Clustering Algorithm based on Differential Privacy [J].
Gao, Qing ;
Wang, Xiujun ;
Gao, Yan ;
Tao, Tao .
2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
[38]   Big data security and privacy protection [J].
Feng, Deng-Guo ;
Zhang, Min ;
Li, Hao .
Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (01) :246-258
[39]   Big Data Security and Privacy Protection [J].
Zhang, Dongpo .
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT AND COMPUTER SCIENCE (ICMCS 2018), 2018, 77 :275-278
[40]   HiDS data clustering algorithm based on differential privacy [J].
Fang, Shuhui ;
Wan, Xuejun ;
Wang, Jun ;
Chai, Lin ;
Pan, Wenlin ;
Wang, Wu .
2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, :131-136