Skip to main content
Log in

MNSSp3: Medical big data privacy protection platform based on Internet of things

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

How to transform the growing medical big data into medical knowledge is a global topic. However, medical data contains a large amount of personal privacy information, especially electronic medical records, gene data and electroencephalography data; the current methods and tools for data sharing are not efficient or cannot be applied in real-life applications. Privacy disclosure has become the bottleneck of medical big data sharing. In this context, we conducted research of medical data from the data collection, data transport and data sharing to solve the key problems of privacy protection and put forward a privacy protection sharing platform called MNSSp3 (medical big data privacy protection platform based on Internet of things), which attempts to provide an effective medical data sharing solution with the privacy protection algorithms for different data types and support for data analytics. The platform focuses on the transmission and sharing security of medical big data to provide users with mining methods and realizes the separation of data and users to ensure the security of medical data. Moreover, the platform also provides users with the capacity to upload privacy algorithms independently. We discussed the requirements and the design components of the platform, then three case studies were presented to verify the functionality of the platform, and the results of the experiments show clearly the benefit and practicality of the proposed platform.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. http://www.healthcareitnews.com.

  2. https://www.sohu.com/a/197611957_104421.

  3. http://www.mnss.xzhmu.edu.cn.

  4. http://www.mnssp3.xzhmu.edu.cn.

  5. http://www.bio.cs.washington.edu/assessment/download.html.

  6. http://www.hgdownload.soe.ucsc.edu/downloads.html.

References

  1. Perez JA, Poon CCY, Merrifield RD et al (2015) Big data for health. IEEE J Biomed Health Inform 19(4):1

    Google Scholar 

  2. O’Driscoll A, Daugelaite J, Sleator RD (2013) ‘Big data’, Hadoop and cloud computing in genomics. J Biomed Inform 46(5):774–781

    MATH  Google Scholar 

  3. Zhang Y, Guo SL, Han LN et al (2016) Application and exploration of big data mining in clinical medicine. Chin Med J 129(6):731–738

    Google Scholar 

  4. Pashazadeh A, Navimipour NJ (2018) Big data handling mechanisms in the healthcare applications: a comprehensive and systematic literature review. J Biomed Inform 82:47–62

    Google Scholar 

  5. Chen Y, Ding S, Xu Z et al (2018) Blockchain-based medical records secure storage and medical service framework. J Med Syst 43(1):5

    Google Scholar 

  6. Vayena E, Blasimme A (2017) Biomedical big data: new models of control over access, use and governance. J Bioeth Inq 14(4):501–513

    Google Scholar 

  7. Bibault JE, Giraud P, Burgun A (2016) Big data and machine learning in radiation oncology: state of the art and future prospects. Cancer Lett 382:S0304383516303469

    Google Scholar 

  8. Jagadeesh KA, Wu DJ, Birgmeier JA et al (2017) Deriving genomic diagnoses without revealing patient genomes. Science 357(6352):692–695

    Google Scholar 

  9. Wang S, Jiang X, Singh S et al (2016) Genome privacy: challenges, technical approaches to mitigate risk, and ethical considerations in the United States. Ann N Y Acad Sci 1387:73

    Google Scholar 

  10. Glenn T, Monteith S (2014) Privacy in the digital world: medical and health data outside of HIPAA protections. Curr Psychiatry Rep 16(11):494

    Google Scholar 

  11. Nia A, Sur-Kolay S, Raghunathan A et al (2015) Physiological information leakage: a new frontier in health information security. IEEE Trans Emerg Top Comput 4:1

    Google Scholar 

  12. Ibrahim MHA, Zhou K, Ren J (2018) Privacy characterization and quantification in data publishing. IEEE Trans Knowl Data Eng PP(99):1

    Google Scholar 

  13. Adane K, Gizachew M, Kendie S (2019) The role of medical data in efficient patient care delivery: a review. J Risk Manag Healthc Policy 12:67–73

    Google Scholar 

  14. Peat G, Riley RD, Croft P et al (2014) Improving the transparency of prognosis research: the role of reporting, data sharing, registration, and protocols. PLoS Med 11(7):e1001671

    Google Scholar 

  15. Rhead B, Karolchik D, Kuhn RM et al (2010) The UCSC genome browser database: update 2010. Nucleic Acids Res 38(Database Issue):D613

    Google Scholar 

  16. Hamid HAA, Rahman SMM, Hossain MS et al (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:1

    Google Scholar 

  17. Shi X, Wu X (2016) An overview of human genetic privacy. Ann N Y Acad Sci 1387(1):61

    Google Scholar 

  18. Dwork C, Roth A (2013) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3–4):211–407

    MathSciNet  MATH  Google Scholar 

  19. Wu X, Wang H, Wei Y, Mao Y, Jiang S (2018) An anonymous data publishing framework for streaming genomic data. J Med Imaging Health Inform 8(3):546–554

    Google Scholar 

  20. Wu X, Wei Y, Jiang T, Wang Y, Jiang S (2019) A micro-aggregation algorithm based on density partition method for anonymizing biomedical data. Curr Bioinform 14(7):667–675

    Google Scholar 

  21. Gkoulalas-Divanis A, Loukides G, Sun J (2014) Publishing data from electronic health records while preserving privacy: a survey of algorithms. J Biomed Inform 50(Sp. Iss. SI):4–19

    Google Scholar 

  22. Sarwate AD, Plis SM, Turner JA et al (2014) Sharing privacy-sensitive access to neuroimaging and genetics data: a review and preliminary validation. Front Neuroinform 8:35

    Google Scholar 

  23. Wu X, Wei Y, Mao Y, Wang L (2018) A differential privacy DNA motif finding method based on closed frequent patterns. Clust Comput 21:1–13

    Google Scholar 

  24. Woodward B (1997) Medical record confidentiality and data collection: current dilemmas. J Law Med Ethics 25(2–3):10

    Google Scholar 

  25. Claerhout B, Demoor GJE (2005) Privacy protection for clinical and genomic data: the use of privacy-enhancing techniques in medicine. Int J Med Inform 74(2–4):257–265

    Google Scholar 

  26. Li Z, Roberts K, Jiang X, Long Q (2019) Distributed learning from multiple EHR databases: contextual embedding models for medical events. J Biomed Inform 92:103138

    Google Scholar 

  27. Malin B (2004) Protecting dna sequence anonymity with generalization lattices. Carnegie Mellon University, School of Computer Science (Institute for Software Research International)

  28. Gymrek M, McGuire AL, Golan D, Halperin E, Erlich Y (2013) Identifying personal genomes by surname inference. Science 339(6117):321–324

    Google Scholar 

  29. Angrist M (2013) Genetic privacy needs a more nuanced approach. Nature 494(7435):7

    Google Scholar 

  30. Homer N, Szelinger S, Redman M et al (2008) Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet 4:e1000167

    Google Scholar 

  31. Erlich Y, Williams JB, Glazer D et al (2014) Redefining genomic privacy: trust and empowerment. PLoS Biol 12:e1001983

    Google Scholar 

  32. Dwork C, McSherry F, Nissim K et al (2006) Theory of cryptography. In; Lecture notes computer science, vol 3876. Calibrating noise to sensitivity in private data analysis. Springer, Berlin, pp 265–284

  33. Dwork C (2011) A firm foundation for private data analysis. Commun ACM 54:86–95

    Google Scholar 

  34. Djatmiko M, Friedman A, Boreli R et al (2014) Proceedings of the 13th workshop on privacy in the electronic society. In: Secure evaluation protocol for personalized medicine. ACM, New York, pp 159–162

  35. He D, Furlotte NA, Hormozdiari F et al (2014) Identifying genetic relatives without compromising privacy. Genome Res 24:664–672

    Google Scholar 

  36. Boto E et al (2018) Moving magnetoencephalography towards real-world applications with a wearable system. Nature 555:657–661

    Google Scholar 

  37. Moses DA, Leonard MK, Makin JG et al (2019) Real-time decoding of question-and-answer speech dialogue using human cortical activity. Nat Commun 10:3096

    Google Scholar 

  38. Martinovic I, Davies D, Frank M, Perito D, Ros T, Song D (2012) On the feasibility of side-channel attacks with brain–computer interfaces. In: Kohno T (ed) USENIX security symposium. Proceedings. USENIX Association, pp 143–158

  39. Vu K, Zheng R, Gao J (2012) Efficient algorithms for K-anonymous location privacy in participatory sensing. In; Proceedings—IEEE INFOCOM, pp 2399–2407

  40. Cramer R, Damgård I, Nielsen JB (2015) Secure multiparty computation and secret sharing. University Press, Cambridge

    MATH  Google Scholar 

  41. Agarwal A, Dowsley R, Nicholas D et al (2019) Protecting privacy of users in brain–computer interface applications. IEEE Trans Neural Syst Rehabil Eng 27(8):1534–4320

    Google Scholar 

  42. Wenyong G, Yingjie WU, Lan S et al (2015) Frequent pattern mining with differential privacy based on transaction truncation. J Chin Comput Syst. https://doi.org/10.1007/978-3-319-89500-0_38

    Article  Google Scholar 

  43. Dwork C, Roth A et al (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3–4):211–407

    MathSciNet  MATH  Google Scholar 

  44. Huang D, Han S, Li X (2015) Achieving accuracy guarantee for answering batch queries with differential privacy. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, Cham

  45. Shen H, Lu Z (2017) A new lower bound of privacy budget for distributed differential privacy. In: 2017 18th international conference on parallel and distributed computing, applications and technologies (PDCAT). IEEE

  46. Sun HM, Wu ME, Ting WC et al (2007) Dual RSA and its security analysis. IEEE Trans Inf Theory 53(8):2922–2933

    MathSciNet  MATH  Google Scholar 

  47. Zhang C, Zhu L, Xu C, Sharif K, Du X, Guizani M (2019) LPTD: achieving lightweight and privacy-preserving truth discovery in CIoT. Fut Gener Comp Syst 90:175–184

    Google Scholar 

  48. Xu B, Xu LD, Cai H et al (2014) Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans Ind Inf 10(2):1578–1586

    Google Scholar 

  49. Zhang H, Li J, Wen B et al (2018) Connecting intelligent things in smart hospitals using NB-IoT. IEEE Internet Things J 5:1550–1560

    Google Scholar 

  50. Lumley Thomas (2010) Potential for revealing individual-level information in genome-wide association studies. JAMA 303(7):659

    Google Scholar 

  51. Homer S, Szelinger M, Redman D, Duggan W, Tembe J, Muehling JV, Pearson DA, Stephan SF, Nelson DW (2008) Craig, resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density SNP genotyping microarrays. PLoS Genet 4(8):e1000167

    Google Scholar 

  52. Chen R, Acs G, Castelluccia C (2012) Differentially private sequential data publication via variable-length N-grams. In: ACM conference on computer and communications security (CCS). ACM

  53. Chen R, Peng Y, Choi B et al (2014) A private DNA motif finding algorithm. J Biomed Inform 50(Sp. Iss. SI):122–132

    Google Scholar 

  54. Kevin O, Seidman R (2016) Personal information security and exchange tool. Interaction processor and exchange tool

  55. Wu X, Wang H, Wei D et al (2020) ANFIS with natural language processing and gray relational analysis based cloud computing framework for real time energy efficient resource allocation. Comput Commun 150:122–130

    Google Scholar 

  56. Wu X, Wang H, Tan W et al (2020) Dynamic allocation strategy of VM resources with fuzzy transfer learning method. Peer Netw Appl. https://doi.org/10.1007/s12083-020-00885-7

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Natural science fund for colleges and universities of Jiangsu Province under Grant No. 18KJB520049 and the industry University-Research-Cooperation Project in Jiangsu Province under Grant No. BY2018124. In addition, the project received the funding support from National Scientific Data Sharing Platform for Population and Health.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiang Wu.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, X., Zhang, Y., Wang, A. et al. MNSSp3: Medical big data privacy protection platform based on Internet of things. Neural Comput & Applic 34, 11491–11505 (2022). https://doi.org/10.1007/s00521-020-04873-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-020-04873-z

Keywords

Navigation