Location Privacy Protection in Smart Health Care System

被引:18
作者
Natgunanathan, Iynkaran [1 ]
Mehmood, Abid [1 ]
Xiang, Yong [1 ]
Gao, Longxiang [1 ]
Yu, Shui [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3125, Australia
[2] Univ Technol Sydney, Sch Software, Ultimo, NSW 2007, Australia
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 02期
基金
澳大利亚研究理事会;
关键词
Location privacy; privacy protection; smart health; utility; ALGORITHMS;
D O I
10.1109/JIOT.2018.2878917
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a smart health system, patients' location information is periodically sent to hospitals and this information helps hospitals to provide improved health care services. The location information together with time stamp alone can reveal a patient's private information, such as person's life style, places frequently visited by the person, and personal interests. Thus, it is important to protect the location privacy of a patient. In the existing privacy protection mechanisms, trusted third party (TTP) and location perturbation techniques are used. However, in TTP-based mechanism, an adversary who illegally gets access to TTP server will have access to the private location information. On the other hand, in location perturbation technique, utility of the location information is significantly compromised. In this paper, we propose a location privacy protection mechanism in which location privacy is protected while maintaining the utility of the location data. In the proposed mechanism, a main processing unit attached to a patient's body generates the perturbed location by considering the distance between the patient's location and the preidentified patient's sensitive locations. This adaptive generation of perturbed location, removes the necessity to trust other parties while preserving the privacy and utility of the location data. The validity of the proposed mechanism is demonstrated by simulation results.
引用
收藏
页码:3055 / 3069
页数:15
相关论文
共 26 条
  • [1] Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185
  • [2] Bonomi F., 2012, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
  • [3] Telemonitoring or structured telephone support programmes for patients with chronic heart failure: systematic review and meta-analysis
    Clark, Robyn A.
    Inglis, Sally C.
    McAlister, Finlay A.
    Cleland, John G. F.
    Stewart, Simon
    [J]. BMJ-BRITISH MEDICAL JOURNAL, 2007, 334 (7600): : 942 - 945
  • [4] Systematic review of studies on telemonitoring of patients with congestive heart failure: a meta-analysis
    Clarke, Malcolm
    Shah, Anila
    Sharma, Urvashi
    [J]. JOURNAL OF TELEMEDICINE AND TELECARE, 2011, 17 (01) : 7 - 14
  • [5] Location privacy in mobile systems: A personalized anonymization model
    Gedik, B
    Liu, L
    [J]. 25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, : 620 - 629
  • [6] Ghinita G., 2009, P ACM SIGSPATIAL, P246, DOI 10.1145/1653771.1653807
  • [7] A reciprocal framework for spatial K-anonymity
    Ghinita, Gabriel
    Zhao, Keliang
    Papadias, Dimitris
    Kalnis, Panos
    [J]. INFORMATION SYSTEMS, 2010, 35 (03) : 299 - 314
  • [8] Telemonitoring in Chronic Heart Failure: A Systematic Review
    Giamouzis, Gregory
    Mastrogiannis, Dimos
    Koutrakis, Konstantinos
    Karayannis, George
    Parisis, Charalambos
    Rountas, Chris
    Adreanides, Elias
    Dafoulas, George E.
    Stafylas, Panagiotis C.
    Skoularigis, John
    Giacomelli, Sara
    Olivari, Zoran
    Triposkiadis, Filippos
    [J]. CARDIOLOGY RESEARCH AND PRACTICE, 2012, 2012
  • [9] Anonymous usage of location-based services through spatial and temporal cloaking
    Gruteser, M
    Grunwald, D
    [J]. PROCEEDINGS OF MOBISYS 2003, 2003, : 31 - 42
  • [10] COMPARING IMAGES USING THE HAUSDORFF DISTANCE
    HUTTENLOCHER, DP
    KLANDERMAN, GA
    RUCKLIDGE, WJ
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1993, 15 (09) : 850 - 863