Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach

被引:45
作者
Guan, Zhitao [1 ]
Lv, Zefang [2 ]
Du, Xiaojiang [3 ]
Wu, Longfei [4 ]
Guizani, Mohsen [5 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
[2] North China Elect Power Univ, Sch Math & Phys, Beijing, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Fayetteville State Univ, Dept Math & Comp Sci, Fayetteville, NC 28301 USA
[5] Univ Idaho, Elect & Comp Engn Dept, Moscow, ID 83843 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 98卷
基金
北京市自然科学基金;
关键词
Differential privacy; K-means clustering; Internet of Medical Things; Machine learning; MapReduce; KEY MANAGEMENT SCHEME; COVERT CHANNEL; BIG DATA; SENSOR; CLOUD; MODEL;
D O I
10.1016/j.future.2019.01.058
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The emergence and rapid development of the Internet of Medical Things (IoMT), an application of the Internet of Things into the medical and healthcare systems, have brought many changes and challenges to modern medical and healthcare systems. Particularly, machine learning technology can be used to process the data involved in IoMT for medical analysis and disease diagnosis. However, in this process, the disclosure of personal privacy information must receive considerable attentions especially for sensitive medical data. Cluster analysis is an important technique for medical analysis and disease diagnosis. To enable privacy-preserving cluster analysis in IoMT, this paper proposed an Efficient Differentially Private Data Clustering scheme (EDPDCS) based on MapReduce framework. In EDPDCS, we optimize the allocation of privacy budgets and the selection of initial centroids to improve the accuracy of differentially private K-means clustering algorithm. Specifically, the number of iterations of the K-means algorithm is set to a fixed value according to the total privacy budget and the minimal privacy budget of each iteration. In addition, an improved initial centroids selection method is proposed to increase the accuracy and efficiency of the clustering algorithm. Finally, we prove that the proposed EDPDCS can improve the accuracy of the differentially private K-means algorithm by comparing the Normalized Intra-Cluster Variance (NICV) produced by our algorithm on two datasets with two other algorithms. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:60 / 68
页数:9
相关论文
共 45 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] [Anonymous], J MED SYST
  • [3] [Anonymous], 2018, Security and Communication Networks, DOI DOI 10.18653/V1/N18-1121
  • [4] Cecil J., 2018, Informatics in Medicine Unlocked, V12, P128, DOI 10.1016/j.imu.2018.05.002
  • [5] A Reference Model for Internet of Things Middleware
    da Cruz, Mauro A. A.
    Rodrigues, Joel Jose P. C.
    Al-Muhtadi, Jalal
    Korotaev, Valery V.
    de Albuquerque, Victor Hugo C.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02): : 871 - 883
  • [6] Medical Internet of Things and Big Data in Healthcare
    Dimitrov, Dimiter V.
    [J]. HEALTHCARE INFORMATICS RESEARCH, 2016, 22 (03) : 156 - 163
  • [7] Security in wireless sensor networks
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 60 - 66
  • [8] An effective key management scheme for heterogeneous sensor networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Mohsen
    Chen, Hslao-Hwa
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 24 - 34
  • [9] A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
    Du, Xiaojiang
    Guizani, Mohsen
    Xiao, Yang
    Chen, Hsiao-Hwa
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1223 - 1229
  • [10] Differential privacy: A survey of results
    Dwork, Cynthia
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 : 1 - 19