Privacy Protection Technology and Access Control Mechanism for Medical Big Data

被引:6
作者
Lee, Narn-Yih [1 ]
Wu, Bing-Han [1 ]
机构
[1] Southern Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, 1 Nan Tai St, Tainan 710, Taiwan
来源
2017 6TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS (IIAI-AAI) | 2017年
关键词
Big data; De-identification; Access control; Information security; Cryptography;
D O I
10.1109/IIAI-AAI.2017.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The age of big data is coming. Many data processing and statistical analysis technologies of big data are developing now. They widely impact our live, for examples: society, science, medical industry, military, education, government and business, etc. By using statistical analysis technologies of big data, many valuable information are produced and those results can be used to predict the trend of the future. However, it also brings huge challenges for personal privacy. For protecting the privacy of personal medical data, how to use cryptographic technologies de-identify medical privacy data becomes very important. On the other hand, how to control the access privileges of privacy data for authorized persons are also needed to be solved. This paper bases on Diffie-Hellman protocol to design a privacy protection system for medical big data. It can protect patient privacy information and avoid revealing the medical data. Besides, it can assign access right to authorized doctors, such that the authorized doctors can access and share the patient privacy information. Finally, it can achieve the destination of protecting the privacy and confidentiality of medical big data.
引用
收藏
页码:424 / 429
页数:6
相关论文
共 17 条
  • [1] Data-intensive applications, challenges, techniques and technologies: A survey on Big Data
    Chen, C. L. Philip
    Zhang, Chun-Yang
    [J]. INFORMATION SCIENCES, 2014, 275 : 314 - 347
  • [2] Secure Sensitive Data Sharing on a Big Data Platform
    Dong, Xinhua
    Li, Ruixuan
    He, Heng
    Zhou, Wanwan
    Xue, Zhengyuan
    Wu, Hao
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2015, 20 (01) : 72 - 80
  • [3] Gadepally Vijay, 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST), P1, DOI 10.1109/THS.2015.7225312
  • [4] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [5] Kanamori Sachiko, 2014, INF THEOR ITS APPL I, P26
  • [6] Katal A, 2013, INT CONF CONTEMP, P404, DOI 10.1109/IC3.2013.6612229
  • [7] Kepner J., 2014, High Performance Extreme Computing Conference, Computing on masked data: A high performance method for improving big data veracity, P1
  • [8] Kepner Jeremy., 2015, 2015 IEEE High Performance Extreme Computing Conference (HPEC), P1
  • [9] LANEY DOUGLAS, 2012, IMPORTANCE BIG DATA
  • [10] Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1578 - 1589