Enhancing Security and Privacy Preservation of Sensitive Information in e-Health Datasets Using FCA Approach

被引:2
|
作者
Hamdi, Hedi [1 ]
Brahmi, Zaki [2 ]
Alaerjan, Alaa S. S. [1 ]
Mhamdi, Lotfi [3 ]
机构
[1] Jouf Univ, Dept Comp Sci, Sakkaka 72388, Saudi Arabia
[2] Taibah Univ, Coll Sci & Arts Al Ola, Comp & Informat Sci Dept, Medinah 43522, Saudi Arabia
[3] Univ Leeds, Sch Elect & Elect Engn, Leeds LS2 9JT, W Yorkshire, England
关键词
Healthcare process data; security and privacy; sensitive itemsets; data anonymization and sanitization; formal concept analysis (FCA); ALGORITHMS;
D O I
10.1109/ACCESS.2023.3285407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in data collection, storage, and processing in e-Health systems have recently increased the importance and popularity of data mining in the health care field. However, the high sensitivity of the handled and shared data, brings a high risk of information disclosure and exposure. It is therefore important to hide sensitive relationships by modifying the shared data. This major information security threat has, therefore, mandated the requirement of hiding/securing sensitive relationships of shared data. As a large number of data mining activities that attempt to identify interesting patterns from databases depend on locating frequent item sets, further investigation of frequent item sets requires privacy-preserving techniques. To solve many difficult combinatorial problems, such as data distribution problem, exact and heuristic algorithms have been used. Exact algorithms are studied and considered optimal for such problems, however they suffer scalability bottleneck, as they are limited to medium-sized instances only. Heuristic algorithms, on the other hand, are scalable, however, they perform poor on security and privacy preservation. This paper proposes a novel heuristic approach based on Formal Concept Analysis (FCA) for enhancing security and privacy preservation of sensitive e-Health information using itemset hiding techniques. Our approach, named FACHS (FCA Hiding Sensitive-itemsets) uses constraints to minimise side effects and asymmetry between the original database and the clean database (minimal distortion on the database). Moreover, our approach does not require frequent itemset extraction before the masking process. This gives the proposed approach an advantage in terms of total availability. We tested our FCAHS heuristic on various reference datasets. Extensive experimental results showed the effectiveness of the proposed masking approach and the time efficiency of itemset extraction, making it very promising for e-Health sensitive data security and privacy.
引用
收藏
页码:62591 / 62604
页数:14
相关论文
共 50 条
  • [1] Security Improvement and Privacy Preservation in E-Health
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Kumar, Kulamala Vinod
    Mohapatra, Durga Prasad
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [2] Privacy and security shield for health information systems (e-health)
    Ulieru, M
    Ionescu, D
    [J]. IECON 2004 - 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL. 1, 2004, : 496 - 501
  • [3] Privacy and security shield for health information systems (e-health)
    Ulieru, Mihaela
    Ionescu, Dan
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (03): : 215 - 221
  • [4] Privacy preservation using game theory in e-health application
    Sfar, Arbia Riahi
    Natalizio, Enrico
    Mazlout, Sahbi
    Challal, Yacine
    Chtourou, Zied
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [5] Ensuring Privacy and Security in E-Health Records
    Vora, Jayneel
    Italiya, Prit
    Tanwar, Sudeep
    Tyagi, Sudhanshu
    Kumar, Neeraj
    Obaidat, M. S.
    Hsiao, K-F.
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2018), 2018, : 192 - 196
  • [6] e-Health: An Introduction to the Challenges of Privacy and Security
    Jara, H. R.
    Schafir, E.
    [J]. 2014 IEEE CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIV), 2014,
  • [7] A Survey on Security & Privacy Design in e-Health
    Ozkar, Mehmet
    Sandikkaya, Mehmet Tahir
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 208 - 213
  • [8] A Contactless E-health Information System with Privacy
    Plateaux, Aude
    Lacharme, Patrick
    Rosenberger, Christophe
    Murty, Kumar
    [J]. 2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1660 - 1665
  • [9] A Security and Privacy Survey for WSN in e-Health Applications
    Cosio Leon, Maria de los Angeles
    Nieto Hipolito, Juan Ivan
    Luna Garcia, Jesus
    [J]. CERMA: 2009 ELECTRONICS ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE, 2009, : 125 - +
  • [10] Blockchain Survey for Security and Privacy in the e-Health Ecosystem
    Boughdiri, Maher
    Abdellatif, Takoua
    Abdellatif, Tesnim
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2022, 2023, 13857 : 69 - 84