DP2AS-Definitive Privacy-Preserving Analytical Scheme for Healthcare Data Processing

被引:0
作者
Thota, Chandu [1 ]
Mavromoustakis, Constandinos X. [1 ]
Batalla, Jordi Mongay [2 ,3 ]
机构
[1] Univ Nicosia, Dept Comp Sci, Mobile Syst Lab, Nicosia, Cyprus
[2] Warsaw Univ Technol, Warsaw, Poland
[3] Natl Inst Telecommun, Warsaw, Poland
来源
2023 IEEE 24TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM | 2023年
基金
欧盟地平线“2020”;
关键词
Data Analytics; Healthcare Systems; Machine Learning; Privacy-Preserving; Wearable Sensor; MEDICAL DATA; FRAMEWORK;
D O I
10.1109/WoWMoM57956.2023.00076
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Smart healthcare systems require secure and robust data computations for providing uninterrupted monitoring, recommendation, and assistance. Wearable sensor (WS) data sources serve as the prime aggregator for data handling. Considering the security demands in sensitive healthcare data, this article introduces a Definitive Privacy-Preserving Analytical Scheme (DP2AS). The proposed scheme exploits the data classification feature based on false positives and replication. The suggested method detects redundant data in healthcare by comparing open and secure aggregation scenarios. Classifying data features as either continuous or replicating helps prevent fraudulent data insertion. By employing tree classifiers, the data attributes are accounted for in different WS aggregation intervals preventing replications. The computations are independent of false data and application-specific computations, retaining the WS privacy. In this analysis process, the error-free/ false positive fewer data chunks are concealed with user adaptable security mechanism for preventing data poisonings. The analytical model considers the previous data state with the current processing data for avoiding erroneous interruptions. The state classifier's maximum replication mitigation provides application-specific data transfers with fast computation possibility. The proposed scheme's performance is analyzed using the metrics false rate, data utilization, and analysis time.
引用
收藏
页码:431 / 438
页数:8
相关论文
共 50 条
  • [41] On the Security of A Privacy-Preserving Product Calculation Scheme
    Zhu, Youwen
    Huang, Zhiqiu
    Huang, Liusheng
    Takagi, Tsuyoshi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) : 373 - 374
  • [42] Privacy-Preserving Authentication Scheme for Wireless Networks
    Hazazi, Manal
    Tian, Yuan
    Al-Rodhaan, Mznah
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [43] PRELIMINARY DATA ANALYSIS IN HEALTHCARE MULTICENTRIC DATA MINING: A PRIVACY-PRESERVING DISTRIBUTED APPROACH
    Damiani, Andrea
    Masciocchi, Carlotta
    Boldrini, Luca
    Gatta, Roberto
    Dinapoli, Nicola
    Lenkowicz, Jacopo
    Chiloiro, Giuditta
    Gambacorta, Maria Antonietta
    Tagliaferri, Luca
    Autorino, Rosa
    Pagliara, Monica Maria
    Blasi, Maria Antonietta
    van Soest, Johan
    Dekker, Andre
    Valentini, Vincenzo
    JOURNAL OF E-LEARNING AND KNOWLEDGE SOCIETY, 2018, 14 (01): : 71 - 81
  • [44] A Privacy-Preserving and Verifiable Federated Learning Scheme
    Zhang, Xianglong
    Fu, Anmin
    Wang, Huaqun
    Zhou, Chunyi
    Chen, Zhenzhu
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [45] Privacy-Preserving Classification Scheme Based on Support Vector Machine
    Mao, Qinyu
    Chen, Yange
    Duan, Pu
    Zhang, Benyu
    Hong, Zhiyong
    Wang, Baocang
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5906 - 5916
  • [46] A Privacy-Preserving Machine Learning Scheme Using EtC Images
    Kawamura, Ayana
    Kinoshita, Yuma
    Nakachi, Takayuki
    Shiota, Sayaka
    Kiya, Hitoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (12) : 1571 - 1578
  • [47] A Simple and Direct Privacy-Preserving Classification Scheme
    Jiang, Rongrong
    Chen, Tieming
    KNOWLEDGE ENGINEERING AND MANAGEMENT, 2011, 123 : 455 - +
  • [48] Data processing based on the privacy-preserving vector for wireless sensor networks
    Zeng, Wei-Ni
    Lin, Ya-Ping
    Yi, Ye-Qing
    He, Shi-Ming
    Chen, Peng
    Tongxin Xuebao/Journal on Communications, 2015, 36 (09): : 34 - 46
  • [49] Risk assessing and privacy-preserving scheme for privacy leakage in APP
    Wang X.
    Niu B.
    Li F.
    He K.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 13 - 23
  • [50] R2PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme
    Pu, Yuwen
    Hu, Chunqiang
    Deng, Shaojiang
    Alrawais, Arwa
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8077 - 8089