Skip to main content

ARM-Based Privacy Preserving for Medical Data Publishing

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9483))

Included in the following conference series:

Abstract

The increasing use of electronic medical records (EMR) makes the medical data mining becomes a hot topic. Consequently, medical privacy invasion attracts people’s attention. Among these, we are particularly interested in the privacy preserving for association rule mining (ARM). In this paper, we improve the traditional reconstruction-based privacy preserving data mining (PPDM) and propose a new architecture for medical data publishing with privacy preserving, and we present a sanitization algorithm for the sensitive rules hiding. In this architecture, the sensitive rules are strictly controlled as well as the side effects are minimized. And finally we performed an experiment to evaluate the proposed architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Malik, M.B., Ghazi, M.A., Ali, R.: Privacy preserving data mining techniques: current scenario and future prospects. In: 3rd IEEE International Conference on Computer Communication Technology (ICCCT), pp. 26–32 (2012)

    Google Scholar 

  2. Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of ACM SIGMOD Conference, pp. 439–450 (2000)

    Google Scholar 

  3. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy preserving data publishing: a survey of recent developments, ACM Comput. Surv. 42(4), art. id 14 (2010)

    Google Scholar 

  4. Xu, L., Jiang, C.: Information security in big data: privacy and data mining. IEEE 2(10) (2014)

    Google Scholar 

  5. Matwin, S.: Privacy preserving data mining techniques: survey and challenges. In: Custers, B., Calders, T., Schermer, B., Zarsky, T. (eds.) Discrimination and Privacy in the Information Society, pp. 209–221. Springer, Berlin (2013)

    Google Scholar 

  6. Chen, L., Yang, J.: Privacy-preserving data publishing for free text chinese electronic medical records. In: IEEE 35th International Conference on Computer Software and Applications, pp. 567–572 (2012)

    Google Scholar 

  7. Chen, L., Yang, J.: A framework for privacy-preserving healthcare data sharing. In: IEEE 14th International Conference on e-Healthcare Networking, Applications and Services, pp. 341–346 (2012)

    Google Scholar 

  8. Hossain, A.A., Ferdous, S.M.S.: Rapid cloud data processing with healthcare information protection. In: IEEE 10th World Congress on Services, pp. 454–455 (2014)

    Google Scholar 

  9. Alabdulatif, A., Khalil, I.: Protection of electronic health records (EHRs) in cloud. In: 35th Annual International Conference of the IEEE EMBS Osaka, Japan, pp. 4191–4194 (2013)

    Google Scholar 

  10. HIPAA-General Infromation. http://www.cms.gov/HIPPAGenInfo/

  11. Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  12. Machanavajjhala, A., Gehrke, J.. Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy Beyond k-anonymity. In: International Conference on Data Engineering (ICDE), pp. 24–35. IEEE Computer Society, Atlanta (2006)

    Google Scholar 

  13. Li, N.H., Li, T.C., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 23rd IEEE International Conference on Data Engineering (ICDE), pp. 106–115. IEEE Computer Society, Istanbul (2007)

    Google Scholar 

  14. Gionis, A., Tassa, T.: k-anonymization with minimal loss of information. IEEE Trans. Knowl. Data Eng. 21(2), 206–219 (2009)

    Article  Google Scholar 

  15. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y.: State of the art in privacy preserving data mining. ACM SIGMOD Rec. 33(1), 50–57 (2004)

    Article  Google Scholar 

  16. Sathiyapriya, K., Sadasivam, G.S.: A survey on privacy preserving association rule mining. Int. J. Data Mining Knowl. Manage. Process 3(2), 119 (2013)

    Article  Google Scholar 

  17. Zhu, J.M., Zhang, N., Li, Z.Y.: A new privacy preserving association rule mining algorithm based on hybrid partial hiding strategy. Cybern. Inf. Technol. 13, 41–50 (2013)

    MathSciNet  Google Scholar 

  18. Jain, D., Khatri, P., Soni, R., Chaurasia, B.K.: Hiding sensitive association rules without altering the support of sensitive item(s). In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds.) CCSIT 2012, Part I. LNICST, vol. 84, pp. 500–509. Springer, Heidelberg (2012)

    Google Scholar 

  19. Le, H.Q., Arch-Int, S., Nguyen, H.X., Arch-Int, N.: Association rule hiding in risk management for retail supply chain collaboration. Comput. Ind. 64(7), 776–784 (2013)

    Article  Google Scholar 

  20. Dehkordi, M.N.: A novel association rule hiding approach in OLAP data cubes. Indian J. Sci. Technol. 6(2), 4063–4075 (2013)

    Google Scholar 

  21. Bonam, J., Reddy, A.R., Kalyani, G.: Privacy preserving in association rule mining by data distortion using PSO. In: Satapathy, S.C., Avadhani, P.S., Udgata, S.K., Lakshminarayana, S. (eds.) Proceedings of the ICT Critical Infrastructure, Proceedings of 48th Annual Convention Computer Society India, vol. 2, pp. 551–558. Springer (2014)

    Google Scholar 

  22. Radadiya, N.R., Prajapati, N.B., Shah, K.H.: Privacy preserving in association rule mining. Int. J. Adv. Innovative Res. 2(4), 203–213 (2013)

    Google Scholar 

  23. Verykios, V.S.: Association rule hiding methods. Wiley Interdiscipl. Rev. Data Mining Knowl. Discovery 3(1), 28–36 (2013)

    Article  Google Scholar 

  24. Chen, X., Orlowska, M., Li, X.: A new framework of privacy preserving data sharing. In: Proceedings of the 4th IEEE ICDM Workshop: Privacy and Security Aspects of Data Mining, pp. 47–56. IEEE Computer Society (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Fengli, Z., Yijing, B. (2015). ARM-Based Privacy Preserving for Medical Data Publishing. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27051-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27050-0

  • Online ISBN: 978-3-319-27051-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics