Abstract
In line with the concept of Smart cities and Smart World, there have been bewildering developments in the field of Internet of Things (IoT) and Big Data Analytics where one most noteworthy territory is that of Smart Health. Private Health data are required to be transmitted over wireless communication systems where the main problem arising is that of data security and privacy. Various algorithms have been implemented to achieve data privacy. In this work, k-anonymity, differential privacy, k-map, \(\ell\) -diversity and a hybrid of the three algorithms combined with ℓ-diversity have been analyzed using algorithms running on a raspberry pi (edge) for a breast cancer dataset. The results demonstrated a difference in using stand-alone algorithms in terms of output anonymized dataset, execution time, information loss, risk analysis, and statistical analysis. If solely based on its execution time, the hybrids took less than 20 s in comparison to the stand-alone taking nearly 90 s, leading to conclusion that hybrid algorithms are much more suitable in terms of efficiency. Having the option to share anonymized information quicker will reduce financial and admin costs indicating that hybrids should be the main focus even if all algorithms fulfilled their objective of achieving data privacy.









Similar content being viewed by others
References
Active Advice (2018) "What is Smart Health and How do People Benefit? | ActiveAdvice," 28 March 2018. [Online]. Available: https://www.activeadvice.eu/news/concept-projects/what-is-smart-health-and-how-do-people-benefit/. Accessed 3 Dec 2018.
Mandel JC, Kreda DA, Mandl KD, Kohane I, Ramoni RB. SMART on FHIR: a standards-based, interoperable apps platform for electronic health records. J Am Med Inform Assoc. 2016;23(5):899–908.
Suzuki T, Tanaka H, Minami S, Yamada H, Miyata T (2013) Wearable wireless vital monitoring technology for smart health care. In: International Symposium on medical information and communication technology (ISMICT), Tokyo, Japan, 2013
Yang L, Qiao Y, Liu Z, Ma J, Li X. Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm. Soft Comput. 2018;22(2):453–64.
Zhang Z, Li C, Gupta BB, Niu D. Efficient compressed Ciphertext length scheme using multi-authority CP-ABE. IEEE Access. 2018;6:38273–84.
Pavlich-Mariscal JA, Demurjian SA, Michel LD. A framework of composable access control features: preserving. Comput Secur. 2010;29(3):350–79.
Xiao Z, Fu X, Goh RSM. Data privacy-preserving automation architecture for industrial data exchange in smart cities. IEEE Trans Industr Inf. 2018;14(6):2780–91.
Amin R, Islam SKH, Gope P, Choo KKR, Tapas N. Anonymity preserving and lightweight multimedical server authentication protocol for telecare medical information system. IEEE J Biomed Health Inf. 2019;23(4):1749–59.
Uddin M, Islam S, Al-Nemrat A. A dynamic access control model using authorising workflow and task-role-based access control. IEEE Access. 2019;7:166676–89.
Zhang Y, Lang P, Zheng D, Yang M, Guo R. A secure and privacy-aware smart health system with secret key leakage resilience. Secur Commun Netw. 2018;2018:1–13.
Liu H, Yao X, Yang T, Ning H. Cooperative privacy preservation for wearable devices in hybrid computing based smart health. IEEE Internet of Things J. 2018;6(2):1352–62.
Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N. LSCSH: lattice-based secure cryptosystem for smart healthcare in smart cities environment. Inst Electric Electron Eng (IEEE). 2018;56(4):24–32.
Sweeney L. k-Anonimity: A model for protecting privacy. Int J Uncertain Puzziness Knowl-Based Syst. 2002;10(5):557–70.
Dwork C. Differential data privacy. In: Bugliesi M, Preneel B, Sassone V, Wegener I, editors. Automata, languages and programming, vol. 4052., Lecture Notes in Computer ScienceBerlin: Springer; 2006. p. 1–12.
S. Tu. An introduction to differential privacy," 2013. [Online]. https://people.eecs.berkeley.edu/~stephentu/writeups/6885-lec20-b.pdf. Accessed 3 December 2018.
Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertai Fuzziness Knowl-Based Syst. 2002;10(5):571–88.
Gkoulalas-Divanis A, Loukides G. Medical data privacy handbook. Springer; 2015.
Bradley M. k-Unlinkability: A privacy protection model for distributed data. Data Knowl Eng. 2008;64(1):294–311.
El Emam K, Dankar FK. Protecting privacy using k-anonymity. J Am Med Inf Assoc. 2008;15(5):627–37.
Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD). 2007;1(1):1–12.
Ohrn A, Ohno-Machado L. Using Boolean reasoning to anonymize databases. Artif Intell Med. 1999;15(3):235–54.
Acknowledgements
The authors would like to thank the University of Mauritius for the necessary facilities provided towards the proper conduction of this work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Fakeeroodeen, Y.N., Beeharry, Y. Hybrid Data Privacy and Anonymization Algorithms for Smart Health Applications. SN COMPUT. SCI. 2, 126 (2021). https://doi.org/10.1007/s42979-021-00547-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-021-00547-2