Skip to main content

Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Included in the following conference series:

Abstract

At present, there are many threats to medical data security. Because of the different standards of data storage and system, it is very difficult to share medical data and protect data privacy. This paper proposes a data privacy protection method based on K-anonymity for medical alliance chain. The data privacy protection method of Medical Alliance chain in this paper consists of four steps: (1) constructing equivalent classes; (2) medical data slicing; (3) data iteration; (4) medical data reorganization. The scheme of data privacy protection in Medical Alliance chain proposed in this paper has high security, no trusted third party and low energy consumption. It is a privacy protection method suitable for application and medical alliance chain data.

Foundation Project: National Natural Science Foundation of China (61572036); Open Project of National Key Laboratory of Computer Architecture (CARCH201810).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sadeghi, A.R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE (2015)

    Google Scholar 

  2. Gan, G., Lu, Z., Jiang, J.: Internet of things security analysis. In: 2011 International Conference on Internet Technology and Applications, pp. 1–4. IEEE (2011)

    Google Scholar 

  3. Liu, Z., Chengli, Y.: Starting with Wannacry blackmail virus, this paper explores the security defense strategy of computer viruses in LAN. Secrecy Sci. Technol. 06, 19–22 (2017)

    Google Scholar 

  4. Chen, Q., Bridges, R.A.: Automated behavioral analysis of malware: a case study of wannacry ransomware. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 454–460. IEEE (2017)

    Google Scholar 

  5. Wang, T., Liu, Y., Jinxin, et al.: Research on k-anonymity-based location and data privacy protection methods in group intelligence perception. J. Commun. 39(S1), 176–184 (2018)

    Google Scholar 

  6. Tian, Y., Li, X., Sangaiah, A.K., et al.: Privacy-preserving scheme in social participatory sensing based on secure multiparty cooperation. Comput. Commun. 119, 167–178 (2018)

    Article  Google Scholar 

  7. Wang, C.J., Ku, W.S.: Anonymous sensory data collection approach for mobile participatory sensing. In: 2012 IEEE 28th International Conference on Data Engineering Workshops, pp. 220–227. IEEE (2012)

    Google Scholar 

  8. Xiao, Z., Yang, J.J., Huang, M., et al.: QLDS: a novel design scheme for trajectory privacy protection with utility guarantee in participatory sensing. IEEE Trans. Mob. Comput. 17(6), 1397–1410 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by National Natural Science Foundation of China (No. 61572036) and National Key Laboratory of Computer Architecture (CARCH201810).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fulong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sun, H., Huang, C., Cheng, X., Chen, F. (2019). Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics