Skip to main content

Privacy-Preserving Health Data Processing

  • Chapter
  • First Online:
Security and Privacy for Mobile Healthcare Networks

Part of the book series: Wireless Networks ((WN))

  • 873 Accesses

Abstract

In this chapter, we investigate privacy-preserving health data processing in MHNs to classify health data for diagnosis and prediction with sufficient privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. “iHT2 Releases Big Data Research Report,” 2013. [Online]. Available: http://ihealthtran.com/wordpress/2013/03/iht2-releases-big-data-research-report-download-today/

  2. M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. Tygar, “Can Machine Learning Be Secure?” in Proc. of ASIACCS, 2006, pp. 16–25.

    Google Scholar 

  3. M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, “PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid,” IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 1, pp. 178–191, 2013.

    Article  Google Scholar 

  4. G. Singla, D. J. Cook, and M. Schmitter-Edgecombe, “Recognizing independent and joint activities among multiple residents in smart environments,” J. Ambient Intelligence and Humanized Computing, vol. 1, no. 1, pp. 57–63, 2010.

    Article  Google Scholar 

  5. G. Virone, M. Alwan, S. Dalal, S. W. Kell, B. Turner, J. A. Stankovic, and R. A. Felder, “Behavioral patterns of older adults in assisted living,” IEEE Transactions on Information Technology in Biomedicine, vol. 12, no. 3, pp. 387–398, 2008.

    Article  Google Scholar 

  6. B. A. Majeed and S. J. Brown, “Developing a well-being monitoring system - modeling and data analysis techniques,” Appl. Soft Comput, vol. 6, no. 4, pp. 384–393, 2006.

    Article  Google Scholar 

  7. T. S. Barger, D. E. Brown, and M. Alwan, “Health-status monitoring through analysis of behavioral patterns,” IEEE Transactions on Systems, Man, and Cybernetics, Part A, vol. 35, no. 1, pp. 22–27, 2005.

    Article  Google Scholar 

  8. L. Rabiner, “A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition,” Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286, 1989.

    Article  Google Scholar 

  9. Z. Xing, J. Pei, and E. J. Keogh, “A brief survey on sequence classification,” SIGKDD Explorations, vol. 12, no. 1, pp. 40–48, 2010.

    Article  Google Scholar 

  10. M. T. Chan, A. J. Hoogs, J. Schmiederer, and M. Petersen, “Detecting rare events in video using semantic primitives with HMM,” in Proc. of ICPR, 2004, pp. IV: 150–154.

    Google Scholar 

  11. C. Stauffer and W. Grimson, “Learning patterns of activity using real-time tracking,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 22, no. 8, pp. 747–757, 2000.

    Article  Google Scholar 

  12. H. Zhong, J. Shi, and M. Visontai, “Detecting unusual activity in video,” in Proc. of CVPR, 2004, pp. 819–826.

    Google Scholar 

  13. D. Zhang, D. G. Perez, S. Bengio, and I. McCowan, “Semi-supervised adapted HMMs for unusual event detection,” in Proc. of CVPR, 2005, pp. I: 611–618.

    Google Scholar 

  14. T. Graepel, K. Lauter, and M. Naehrig, “ML Confidential: Machine Learning on Encrypted Data,” in Proc. of ICISC, vol. 7839, 2012, pp. 1–21.

    Google Scholar 

  15. Z. Brakerski, C. Gentry, and V. Vaikuntanathan, “(leveled) fully homomorphic encryption without bootstrapping,” in Proc. of ITCS, 2012, pp. 309–325.

    Google Scholar 

  16. X. Liu, R. Lu, J. Ma, L. Chen, and B. Qin, “Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification,” Biomedical and Health Informatics, IEEE Journal of, to appear.

    Google Scholar 

  17. B. Samanthula, Y. Elmehdwi, and W. Jiang, “k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data,” Knowledge and Data Engineering, IEEE Transactions on, vol. 27, no. 5, pp. 1261–1273, May 2015.

    Google Scholar 

  18. Paillier and Pointcheval, “Efficient public-key cryptosystems provably secure against active adversaries,” in Proc. ASIACRYPT: Advances in Cryptology, 1999.

    Google Scholar 

  19. M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider, “Privacy-preserving ecg classification with branching programs and neural networks,” Information Forensics and Security, IEEE Transactions on, vol. 6, no. 2, pp. 452–468, June 2011.

    Google Scholar 

  20. R. Bost, R. Popa, S. Tu, and S. Goldwasser, “Machine Learning Classification over Encrypted Data,” in Proc. of NDSS, 2015, pp. 1–14.

    Google Scholar 

  21. J. Yuan and S. Yu, “Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 212–221, 2014.

    Article  Google Scholar 

  22. Boneh, Goh, and Nissim, “Evaluating 2-DNF formulas on ciphertexts,” in Theory of Cryptography Conference (TCC), LNCS, vol. 2, 2005.

    Google Scholar 

  23. P. Fong and J. Weber-Jahnke, “Privacy Preserving Decision Tree Learning Using Unrealized Data Sets,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 2, pp. 353–364, 2012.

    Article  Google Scholar 

  24. S. Goldwasser and S. Micali, “Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information,” in Proc. STOC, 1982, pp. 365–377.

    Google Scholar 

  25. C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. of STOC, 2009, pp. 169–178.

    Google Scholar 

  26. C. Gentry and S. Halevi, “Implementing Gentry’s fully-homomorphic encryption scheme,” in Proc. of EUROCRYPT, 2011, pp. 129–148.

    Google Scholar 

  27. I. Damgard, M. Geisler, and M. Kroigard, “Homomorphic encryption and secure comparison,” International Journal of Applied Cryptography, vol. 1, pp. 22–31, 2008.

    Article  MathSciNet  Google Scholar 

  28. R. Rivest, “Cryptography and machine learning,” Lecture Notes in Computer Science, vol. 739, pp. 427–439, 1993.

    Article  MATH  Google Scholar 

  29. T. T. A. Dinh and A. Datta, “Stream on the sky: Outsourcing access control enforcement for stream data to the cloud,” CoRR, vol. abs/1210.0660, 2012.

    Google Scholar 

  30. J. Bernardo and A. Smith, Bayesian Theory. Wiley, 2000.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Zhang, K., Shen, X.(. (2015). Privacy-Preserving Health Data Processing. In: Security and Privacy for Mobile Healthcare Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-24717-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24717-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24715-1

  • Online ISBN: 978-3-319-24717-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics