Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity

被引:0
|
作者
Sun, Hui [1 ]
Huang, Cheng [1 ]
Cheng, Xu [1 ]
Chen, Fulong [1 ,2 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu, Peoples R China
[2] Anhui Prov Key Lab Network & Informat Secur, Wuhu, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
K-anonymity; Data slicing; Data iteration; Privacy protection;
D O I
10.1007/978-3-030-37337-5_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, there are many threats to medical data security. Because of the different standards of data storage and system, it is very difficult to share medical data and protect data privacy. This paper proposes a data privacy protection method based on K-anonymity for medical alliance chain. The data privacy protection method of Medical Alliance chain in this paper consists of four steps: (1) constructing equivalent classes; (2) medical data slicing; (3) data iteration; (4) medical data reorganization. The scheme of data privacy protection in Medical Alliance chain proposed in this paper has high security, no trusted third party and low energy consumption. It is a privacy protection method suitable for application and medical alliance chain data.
引用
收藏
页码:258 / 264
页数:7
相关论文
共 50 条
  • [21] An Adaptive Learning Model for k-Anonymity Location Privacy Protection
    Natesan, Gayathri
    Liu, Jigang
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
  • [22] k-Anonymity Location Privacy Algorithm Based on Clustering
    Zheng, Lijuan
    Yue, Huanhuan
    Li, Zhaoxuan
    Pan, Xiao
    Wu, Mei
    Yang, Fan
    IEEE ACCESS, 2018, 6 : 28328 - 28338
  • [23] Clustering based k-anonymity algorithm for privacy preservation
    Ni S.
    Xie M.
    Qian Q.
    International Journal of Network Security, 2017, 19 (06) : 1062 - 1071
  • [24] -diversity: Privacy beyond k-anonymity
    Cornell University
    不详
    ACM Trans. Knowl. Discov. Data, 2007, 1
  • [25] k-anonymity:: A model for protecting privacy
    Sweeney, L
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570
  • [26] A K-Anonymity Based Schema for Location Privacy Preservation
    Fei, Fan
    Li, Shu
    Dai, Haipeng
    Hu, Chunhua
    Dou, Wanchun
    Ni, Qiang
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02): : 156 - 167
  • [27] Enhanced k-anonymity Privacy Protection Scheme in Continuous LBS Queries
    Wang, Wei
    Zhao, Wen-Hong
    Cheng, Zhong
    Li, Xing-Hua
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 289 - 293
  • [28] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
    Wang, Hui
    Huang, Haiping
    Qin, Yuxiang
    Wang, Yunqi
    Wu, Min
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (06)
  • [29] A Location Privacy Protection Algorithm Based on Double K-Anonymity in the Social Internet of Vehicles
    Xing, Ling
    Jia, Xiaofan
    Gao, Jianping
    Wu, Honghai
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (10) : 3199 - 3203
  • [30] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637