Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation

被引:55
作者
Wang, Wei [1 ,2 ]
Chen, Lei [2 ,3 ]
Zhang, Qian [2 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Hubei, Peoples R China
[2] Hong Kong Univ Sci & Technol, Fok Ying Tung Res Inst, Kowloon, Hong Kong, Peoples R China
[3] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
Healthcare data; Privacy; Hybrid cloud;
D O I
10.1016/j.comnet.2015.06.014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to the recent rule released by Health and Human Services (HHS), healthcare data can be outsourced to cloud computing services for medical studies. A major concern about outsourcing healthcare data is its associated privacy issues. However, previous solutions have focused on cryptographic techniques which introduce significant cost when applied to healthcare data with high-dimensional sensitive attributes. To address these challenges, we propose a privacy-preserving framework to transit insensitive data to commercial public cloud and the rest to trusted private cloud. Under the framework, we design two protocols to provide personalized privacy protections and defend against potential collusion between the public cloud service provider and the data users. We derive provable privacy guarantees and bounded data distortion to validate the proposed protocols. Extensive experiments over real-world datasets are conducted to demonstrate that the proposed protocols maintain high usability and scale well to large datasets. (C) 2015 Elsevier BM. All rights reserved.
引用
收藏
页码:136 / 148
页数:13
相关论文
共 28 条
[1]  
[Anonymous], P IEEE INFOCOM
[2]  
Boyd S.P, 2004, Convex optimization, DOI [DOI 10.1017/CBO9780511804441, 10.1017/CBO9780511804441]
[3]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[4]  
Ciriani V., 2009, P IEEE ICDCS
[5]  
Cormode G., 2012, P IEEE ICDE
[6]  
Ding B., 2011, P ACM SIGMOD
[7]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[8]  
Furht B, 2010, HANDBOOK OF CLOUD COMPUTING, P3, DOI 10.1007/978-1-4419-6524-0_1
[9]  
Jung T., 2013, P IEEE INFOCOM
[10]  
Lee Sangmin., 2013, NSDI