Abstract
The increasing use of electronic medical records (EMR) makes the medical data mining becomes a hot topic. Consequently, medical privacy invasion attracts people’s attention. Among these, we are particularly interested in the privacy preserving for association rule mining (ARM). In this paper, we improve the traditional reconstruction-based privacy preserving data mining (PPDM) and propose a new architecture for medical data publishing with privacy preserving, and we present a sanitization algorithm for the sensitive rules hiding. In this architecture, the sensitive rules are strictly controlled as well as the side effects are minimized. And finally we performed an experiment to evaluate the proposed architecture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Malik, M.B., Ghazi, M.A., Ali, R.: Privacy preserving data mining techniques: current scenario and future prospects. In: 3rd IEEE International Conference on Computer Communication Technology (ICCCT), pp. 26–32 (2012)
Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of ACM SIGMOD Conference, pp. 439–450 (2000)
Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy preserving data publishing: a survey of recent developments, ACM Comput. Surv. 42(4), art. id 14 (2010)
Xu, L., Jiang, C.: Information security in big data: privacy and data mining. IEEE 2(10) (2014)
Matwin, S.: Privacy preserving data mining techniques: survey and challenges. In: Custers, B., Calders, T., Schermer, B., Zarsky, T. (eds.) Discrimination and Privacy in the Information Society, pp. 209–221. Springer, Berlin (2013)
Chen, L., Yang, J.: Privacy-preserving data publishing for free text chinese electronic medical records. In: IEEE 35th International Conference on Computer Software and Applications, pp. 567–572 (2012)
Chen, L., Yang, J.: A framework for privacy-preserving healthcare data sharing. In: IEEE 14th International Conference on e-Healthcare Networking, Applications and Services, pp. 341–346 (2012)
Hossain, A.A., Ferdous, S.M.S.: Rapid cloud data processing with healthcare information protection. In: IEEE 10th World Congress on Services, pp. 454–455 (2014)
Alabdulatif, A., Khalil, I.: Protection of electronic health records (EHRs) in cloud. In: 35th Annual International Conference of the IEEE EMBS Osaka, Japan, pp. 4191–4194 (2013)
HIPAA-General Infromation. http://www.cms.gov/HIPPAGenInfo/
Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)
Machanavajjhala, A., Gehrke, J.. Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy Beyond k-anonymity. In: International Conference on Data Engineering (ICDE), pp. 24–35. IEEE Computer Society, Atlanta (2006)
Li, N.H., Li, T.C., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 23rd IEEE International Conference on Data Engineering (ICDE), pp. 106–115. IEEE Computer Society, Istanbul (2007)
Gionis, A., Tassa, T.: k-anonymization with minimal loss of information. IEEE Trans. Knowl. Data Eng. 21(2), 206–219 (2009)
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y.: State of the art in privacy preserving data mining. ACM SIGMOD Rec. 33(1), 50–57 (2004)
Sathiyapriya, K., Sadasivam, G.S.: A survey on privacy preserving association rule mining. Int. J. Data Mining Knowl. Manage. Process 3(2), 119 (2013)
Zhu, J.M., Zhang, N., Li, Z.Y.: A new privacy preserving association rule mining algorithm based on hybrid partial hiding strategy. Cybern. Inf. Technol. 13, 41–50 (2013)
Jain, D., Khatri, P., Soni, R., Chaurasia, B.K.: Hiding sensitive association rules without altering the support of sensitive item(s). In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds.) CCSIT 2012, Part I. LNICST, vol. 84, pp. 500–509. Springer, Heidelberg (2012)
Le, H.Q., Arch-Int, S., Nguyen, H.X., Arch-Int, N.: Association rule hiding in risk management for retail supply chain collaboration. Comput. Ind. 64(7), 776–784 (2013)
Dehkordi, M.N.: A novel association rule hiding approach in OLAP data cubes. Indian J. Sci. Technol. 6(2), 4063–4075 (2013)
Bonam, J., Reddy, A.R., Kalyani, G.: Privacy preserving in association rule mining by data distortion using PSO. In: Satapathy, S.C., Avadhani, P.S., Udgata, S.K., Lakshminarayana, S. (eds.) Proceedings of the ICT Critical Infrastructure, Proceedings of 48th Annual Convention Computer Society India, vol. 2, pp. 551–558. Springer (2014)
Radadiya, N.R., Prajapati, N.B., Shah, K.H.: Privacy preserving in association rule mining. Int. J. Adv. Innovative Res. 2(4), 203–213 (2013)
Verykios, V.S.: Association rule hiding methods. Wiley Interdiscipl. Rev. Data Mining Knowl. Discovery 3(1), 28–36 (2013)
Chen, X., Orlowska, M., Li, X.: A new framework of privacy preserving data sharing. In: Proceedings of the 4th IEEE ICDM Workshop: Privacy and Security Aspects of Data Mining, pp. 47–56. IEEE Computer Society (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Fengli, Z., Yijing, B. (2015). ARM-Based Privacy Preserving for Medical Data Publishing. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-27051-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27050-0
Online ISBN: 978-3-319-27051-7
eBook Packages: Computer ScienceComputer Science (R0)