Abstract
Evaluating medical time series (e.g., physiological sequences) under dynamic time warping (DTW) derives insights assisting biomedical research and clinical decision making. Due to the natural distribution of medical data, a collaboration among multiple healthcare institutes is required to carry out a reliable and quality medical judgment. Yet sharing medical data cross the boundaries of multiple institutions faces widespread privacy threats, along with increasingly stringent laws and privacy regulations nowadays. Addressing such demands, we propose a privacy-preserving system tailored for the DTW-based analysis over the decentralized medical time series sequences. Our system constructs a secure and scalable architecture to deliver comprehensive results from a joint data analytic task with privacy preservation. To accelerate complicated DTW query processing, our system adapts the advancement in secure multi-party computation (MPC) framework to realize encrypted DTW computation, decomposing complicated and iterative operations into atomic functions under suitable MPC primitives and optimized for DTW. Moreover, our system introduces a secure hybrid pruning strategy that diminishes the volume of time series sequences that are submitted before and processed within the encrypted DTW query. We implement a prototype and evaluate its performance on Amazon Cloud. The empirical evaluation demonstrates the feasibility of our system in practice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
[20] suggests that the OT-based Multiplication Triples generation is faster than the Homomorphic encryption-based protocol by up to three orders of magnitude.
- 2.
The DTW query is the process to find the sequences similar to the query based on the DTW distance within a given threshold.
- 3.
Another way is building a monolithic circuit to solve a decision tree. This is not under our consideration, since it leads higher latency.
References
PhysioBank ATM. http://physionet.org/cgi-bin/atm/ATM
UCR time series classification archive. https://www.cs.ucr.edu/~eamonn/time_series_data_2018/
104th United States Congress: Health Insurance Portability and Accountability Act of 1996 (HIPPA) (1996). https://www.hhs.gov/hipaa/index.html
Aggarwal, G., et al.: Two can keep a secret: a distributed architecture for secure database services. In: Proceedings of CIDR (2005)
Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: Proceedings of ACM CCS (2013)
Atallah, M., Bykova, M., Li, J., Frikken, K., Topkara, M.: Private collaborative forecasting and benchmarking. In: Proceedings of WPES (2004)
Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G.: Countering Gattaca: efficient and secure testing of fully-sequenced human genomes. In: Proceedings of ACM CCS (2011)
Barni, M., Failla, P., Lazzeretti, R., Sadeghi, A.R., Schneider, T.: Privacy-preserving ECG classification with branching programs and neural networks. IEEE TIFS 6, 452–468 (2011)
Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Proceedings of Crypto (1991)
Begum, N., Ulanova, L., Wang, J., Keogh, E.: Accelerating dynamic time warping clustering with a novel admissible pruning strategy. In: Proceedings of ACM SIGKDD (2015)
Berndt, D.J., Clifford, J.: Using dynamic time warping to find patterns in time series. In: Proceedings of KDD Workshop (1994)
Blanton, M., Kang, A.R., Karan, S., Zola, J.: Privacy preserving analytics on distributed medical data. CoRR abs/1806.06477 (2018). http://arxiv.org/abs/1806.06477
Bogdanov, D., Laud, P., Randmets, J.: Domain-polymorphic language for privacy-preserving applications. In: Proceedings of the ACM Workshop on Language Support for Privacy-Enhancing Technologies (2013)
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Proceedings of ESORICS (2008)
Brickell, J., Porter, D.E., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: Proceedings of ACM CCS (2007)
Camara, C., Peris-Lopez, P., Tapiador, J.E.: Security and privacy issues in implantable medical devices: a comprehensive survey. J. Biomed. Inform. 55, 272–289 (2015)
Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067 (2000)
Chen, Y., Hu, B., Keogh, E., Batista, G.E.: DTW-D: time series semi-supervised learning from a single example. In: Proceedings of ACM SIGKDD (2013)
Cho, H., Wu, D.J., Berger, B.: Secure genome-wide association analysis using multiparty computation. Nat. Biotechnol. 36(6), 547–551 (2018)
Demmler, D., Schneider, T., Zohner, M.: ABY-a framework for efficient mixed-protocol secure two-party computation. In: Proceedings of NDSS (2015)
European Parliament and of the Council: The General Data Protection Regulation (GDPR) (2016). http://data.europa.eu/eli/reg/2016/679/2016-05-04
Huang, Y., Malka, L., Evans, D., Katz, J.: Efficient privacy-preserving biometric identification. In: Proceedings of NDSS (2011)
Keogh, E.: Exact indexing of dynamic time warping. In: Proceedings of VLDB (2002)
Kerschbaum, F., Schneider, T., Schröpfer, A.: Automatic protocol selection in secure two-party computations. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 566–584. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07536-5_33
Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptol. 15(3), 177–206 (2002)
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y., et al.: Fairplay-secure two-party computation system. In: Proceedings of USENIX Security (2004)
Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: Proceedings of IEEE S&P (2017)
Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: Proceedings of IEEE S&P (2013)
Rakthanmanon, T., et al.: Searching and mining trillions of time series subsequences under dynamic time warping. In: Proceedings of ACM SIGKDD (2012)
Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492–1496 (2014)
Salem, A., Berrang, P., Humbert, M., Backes, M.: Privacy-preserving similar patient queries for combined biomedical data. Proc. PETS 2019, 47–67 (2019)
Tkachenko, O., Weinert, C., Schneider, T., Hamacher, K.: Large-scale privacy-preserving statistical computations for distributed genome-wide association studies. In: Proceedings of ACM AsiaCCS (2018)
Wang, X.S., Huang, Y., Zhao, Y., Tang, H., Wang, X., Bu, D.: Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In: Proceedings of ACM CCS (2015)
Wang, X.: FlexSC (2018). https://github.com/wangxiao1254/FlexSC
Yao, A.C.C.: How to generate and exchange secrets. In: Proceedings of IEEE FOCS (1986)
Yi, X., Bertino, E., Rao, F.Y., Bouguettaya, A.: Practical privacy-preserving user profile matching in social networks. In: Proceedings of IEEE ICDE (2016)
Zheng, W., Popa, R., Gonzalez, J.E., Stoica, I.: Helen: Maliciously secure coopetitive learning for linear models. In: Proceedings of IEEE S&P (2019)
Zheng, Y., Duan, H., Tang, X., Wang, C., Zhou, J.: Denoising in the dark: privacy-preserving deep neural network based image denoising. IEEE TDSC (2019)
Zheng, Y., Duan, H., Wang, C.: Learning the truth privately and confidently: encrypted confidence-aware truth discovery in mobile crowdsensing. IEEE TIFS 13(10), 2475–2489 (2018)
Zhu, H., Meng, X., Kollios, G.: Privacy preserving similarity evaluation of time series data. In: Proceedings of EDBT (2014)
Acknowledgment
This work was supported by Australian Research Council Discovery and Linkage Projects (DP180103251 and LP160101766).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, X., Yi, X. (2019). Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping. In: Sako, K., Schneider, S., Ryan, P. (eds) Computer Security – ESORICS 2019. ESORICS 2019. Lecture Notes in Computer Science(), vol 11736. Springer, Cham. https://doi.org/10.1007/978-3-030-29962-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-29962-0_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29961-3
Online ISBN: 978-3-030-29962-0
eBook Packages: Computer ScienceComputer Science (R0)