MPDP k-medoids: Multiple partition differential privacy preserving k-medoids clustering for data publishing in the Internet of Medical Things

被引:6
作者
Zhang, Zekun [1 ]
Wu, Tongtong [1 ]
Sun, Xiaoting [1 ]
Yu, Jiguo [2 ,3 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao, Peoples R China
[2] Qilu Univ Technol, Shandong Acad Sci, Sch Comp Sci & Technol, Jinan 250353, Peoples R China
[3] Shandong Lab Comp Networks, Jinan, Peoples R China
关键词
Data publishing; differential privacy; k-medoids clustering; privacy preservation; Internet of Medical Things; DATA RELEASE; ALGORITHM; MODEL;
D O I
10.1177/15501477211042543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The tremendous growth of Internet of Medical Things has led to a surge in medical user data, and medical data publishing can provide users with numerous services. However, neglectfully publishing the data may lead to severe leakage of user's privacy. In this article, we investigate the problem of data publishing in Internet of Medical Things with privacy preservation. We present a novel system model for Internet of Medical Things user data publishing which adopts the proposed multiple partition differential privacy k-medoids clustering algorithm for data clustering analysis to ensure the security of user data. Particularly, we propose a multiple partition differential privacy k-medoids clustering algorithm based on differential privacy in data publishing. Based on the traditional k-medoids clustering, multiple partition differential privacy k-medoids clustering algorithm optimizes the randomness of selecting initial center points and adds Laplace noise to the clustering process to improve data availability while protecting user's privacy information. Comprehensive analysis and simulations demonstrate that our method can not only meet the requirements of differential privacy but also retain the better availability of data clustering.
引用
收藏
页数:15
相关论文
共 52 条
[1]  
[Anonymous], 12 ACM SIGKDD INT C, DOI DOI 10.1145/1150402.1150499
[2]   Target Tracking for Wireless Localization Systems With Degraded Measurements and Quantization Effects [J].
Bai, Xingzhen ;
Wang, Zidong ;
Zou, Lei ;
Cheng, Cheng .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (12) :9687-9697
[3]  
Blum A., 2005, PODS, P128
[4]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[5]   Trading Private Range Counting over Big IoT Data [J].
Cai, Zhipeng ;
He, Zaobo .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :144-153
[6]   A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies [J].
Cai, Zhipeng ;
Zheng, Xu ;
Yu, Jiguo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) :6492-6499
[7]   A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems [J].
Cai, Zhipeng ;
Zheng, Xu .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (02) :766-775
[8]   Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks [J].
Cai, Zhipeng ;
He, Zaobo ;
Guan, Xin ;
Li, Yingshu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :577-590
[9]   Quantifying Differential Privacy in Continuous Data Release Under Temporal Correlations [J].
Cao, Yang ;
Yoshikawa, Masatoshi ;
Xiao, Yonghui ;
Xiong, Li .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 31 (07) :1281-1295
[10]   Verifiable dynamic ranked search with forward privacy over encrypted cloud data [J].
Chen, Chien-Ming ;
Tie, Zhuoyu ;
Wang, Eric Ke ;
Khan, Muhammad Khurram ;
Kumar, Sachin ;
Kumari, Saru .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) :2977-2991