Achieving data privacy for decision support systems in times of massive data sharing

被引:7
作者
Fazal, Rabeeha [1 ]
Shah, Munam Ali [1 ]
Khattak, Hasan Ali [2 ]
Rauf, Hafiz Tayyab [3 ]
Al-Turjman, Fadi [4 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[2] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci SEECS, H12, Islamabad, Pakistan
[3] Univ BRADFORD, Fac Engn & Informat, Dept Comp Sci, Bradford, W Yorkshire, England
[4] Near East Univ, Res Ctr AI & IoT, Artificial Intelligence Dept, Mersin 10, Istanbul, Turkey
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2022年 / 25卷 / 05期
关键词
Data privacy; Encryption; Blowfish; Data masking; Identity data; Sensitive data; Non-sensitive data;
D O I
10.1007/s10586-021-03514-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The world is suffering from a new pandemic of Covid-19 that is affecting human lives. The collection of records for Covid-19 patients is necessary to tackle that situation. The decision support systems (DSS) are used to gather that records. The researchers access the patient's data through DSS and perform predictions on the severity and effect of the Covid-19 disease; in contrast, unauthorized users can also access the data for malicious purposes. For that reason, it is a challenging task to protect Covid-19 patient data. In this paper, we proposed a new technique for protecting Covid-19 patients' data. The proposed model consists of two folds. Firstly, Blowfish encryption uses to encrypt the identity attributes. Secondly, it uses Pseudonymization to mask identity and quasi-attributes, then all the data links with one another, such as the encrypted, masked, sensitive, and non-sensitive attributes. In this way, the data becomes more secure from unauthorized access.
引用
收藏
页码:3037 / 3049
页数:13
相关论文
共 41 条
[11]   COVID-19 Mobile Positioning Data Contact Tracing and Patient Privacy Regulations: Exploratory Search of Global Response Strategies and the Use of Digital Tools in Nigeria [J].
Ekong, Iniobong ;
Chukwu, Emeka ;
Chukwu, Martha .
JMIR MHEALTH AND UHEALTH, 2020, 8 (04)
[12]  
Gao JC, 2019, IEEE INT CONF BIG DA, P1111, DOI [10.1109/bigdata47090.2019.9006011, 10.1109/TSC.2020.2993728, 10.1109/BigData47090.2019.9006011]
[13]   Machine Learning Based Workload Prediction in Cloud Computing [J].
Gao, Jiechao ;
Wang, Haoyu ;
Shen, Haiying .
2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
[14]   Smartly Handling Renewable Energy Instability in Supporting A Cloud Datacenter [J].
Gao, Jiechao ;
Wang, Haoyu ;
Shen, Haiying .
2020 IEEE 34TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM IPDPS 2020, 2020, :769-778
[15]   OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city [J].
Gheisari, Mehdi ;
Najafabadi, Hamid Esmaeili ;
Alzubi, Jafar A. ;
Gao, Jiechao ;
Wang, Guojun ;
Abbasi, Aaqif Afzaal ;
Castiglione, Aniello .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 123 :1-13
[16]   A decision support system for demand management in healthcare supply chains considering the epidemic outbreaks: A case study of coronavirus disease 2019 (COVID-19) [J].
Govindan, Kannan ;
Mina, Hassan ;
Alavi, Behrouz .
TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATION REVIEW, 2020, 138
[17]  
Hussaini, 2020, INT J INF TECHNOL IJ, V6
[18]  
Kansuwan Thivanon, 2019, 2019 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT-NCON), P5, DOI 10.1109/ECTI-NCON.2019.8692255
[19]   Maintaining Fog Trust Through Continuous Assessment [J].
Khattak, Hasan Ali ;
Imran, Muhammad ;
Abbas, Assad ;
Khan, Samee U. .
SERVICES - SERVICES 2019, 2019, 11517 :129-137
[20]   Safe contact tracing for COVID-19: A method without privacy breach using functional encryption techniques based-on spatio-temporal trajectory data [J].
Kim, Wooil ;
Lee, Hyubjin ;
Chung, Yon Dohn .
PLOS ONE, 2020, 15 (12)