Cybersecurity of Medical Data Based on Big Data and Privacy Protection Method

被引:0
作者
Li, Jianhong [1 ]
Pan, An [2 ]
Zheng, Tongxing [2 ]
机构
[1] Wenzhou Med Univ, Affiliated Hosp 2, Big Data Ctr, Informat Ctr, Wenzhou 3250027, Zhejiang, Peoples R China
[2] Wenzhou Med Univ, Informat Ctr, Big Data Ctr, Affiliated Hosp 2, Wenzhou, Peoples R China
关键词
Access Control; Big Data; Medical Data; Privacy Protection;
D O I
10.4018/IJDWM.325222
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Big data brings new opportunities to discover the new value of healthcare industry, since it can help us understand the hidden value of data deeply. This also brings new challenges: how to effectively manage and organize these datasets. Throughout the whole life cycle of publishing, storing, mining, and using big data in health care, different users are involved, so there are corresponding privacy protection methods and technologies for different life cycles. Data usage is the last and most important part of the whole life cycle. Therefore, this article proposes a privacy protection method for large medical data: an access control based on credibility of the requesting user. This model evaluates and quantifies doctors' credibility from the perspective of behavioral trust. Comparative experiments show that under the background of linear, geometric and exponential distribution trends and mixed trends, the regression model in this article is better than the existing methods in predicting trust accuracy and trust trends.
引用
收藏
页数:16
相关论文
共 14 条
[1]  
[Anonymous], 2015, Accelerated bridge con-struction
[2]  
Chakraborty S., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P49
[3]   Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review [J].
He, Ying ;
Aliyu, Aliyu ;
Evans, Mark ;
Luo, Cunjin .
JOURNAL OF MEDICAL INTERNET RESEARCH, 2021, 23 (04)
[4]  
Huo C., 2014, COMPUTER APPL SOFTWA, V11, P75
[5]  
Kuhn D.R, 2003, ROLE BASED ACCESS CO
[6]  
Lampson B. W., 1974, Operating Systems Review, V8, P18, DOI 10.1145/775265.775268
[7]   Opportunities for and challenges of computerisation [J].
Powsner, SM ;
Wyatt, JC ;
Wright, P .
LANCET, 1998, 352 (9140) :1617-1622
[8]   Big Data analysis in development of personalized medical system [J].
Shakhovska, Natalia ;
Fedushko, Solomia ;
Ml, Michal Gregus ;
Melnykova, Natalia ;
Shvorob, Iryna ;
Syerov, Yuriy .
10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 :229-234
[9]   An adaptive mutual trust based access control model for electronic healthcare system [J].
Singh, Ashish ;
Chatterjee, Kakali .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) :2117-2136
[10]  
Soni VD, 2020, SSRN Electronic Journal, DOI [10.2139/ssrn.3624487, 10.2139/ssrn.3624487, DOI 10.2139/SSRN.3624487, 10. 2139/ssrn.3624487]