Enhancing Security and Privacy Preservation of Sensitive Information in e-Health Datasets Using FCA Approach

被引:2
|
作者
Hamdi, Hedi [1 ]
Brahmi, Zaki [2 ]
Alaerjan, Alaa S. S. [1 ]
Mhamdi, Lotfi [3 ]
机构
[1] Jouf Univ, Dept Comp Sci, Sakkaka 72388, Saudi Arabia
[2] Taibah Univ, Coll Sci & Arts Al Ola, Comp & Informat Sci Dept, Medinah 43522, Saudi Arabia
[3] Univ Leeds, Sch Elect & Elect Engn, Leeds LS2 9JT, W Yorkshire, England
关键词
Healthcare process data; security and privacy; sensitive itemsets; data anonymization and sanitization; formal concept analysis (FCA); ALGORITHMS;
D O I
10.1109/ACCESS.2023.3285407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in data collection, storage, and processing in e-Health systems have recently increased the importance and popularity of data mining in the health care field. However, the high sensitivity of the handled and shared data, brings a high risk of information disclosure and exposure. It is therefore important to hide sensitive relationships by modifying the shared data. This major information security threat has, therefore, mandated the requirement of hiding/securing sensitive relationships of shared data. As a large number of data mining activities that attempt to identify interesting patterns from databases depend on locating frequent item sets, further investigation of frequent item sets requires privacy-preserving techniques. To solve many difficult combinatorial problems, such as data distribution problem, exact and heuristic algorithms have been used. Exact algorithms are studied and considered optimal for such problems, however they suffer scalability bottleneck, as they are limited to medium-sized instances only. Heuristic algorithms, on the other hand, are scalable, however, they perform poor on security and privacy preservation. This paper proposes a novel heuristic approach based on Formal Concept Analysis (FCA) for enhancing security and privacy preservation of sensitive e-Health information using itemset hiding techniques. Our approach, named FACHS (FCA Hiding Sensitive-itemsets) uses constraints to minimise side effects and asymmetry between the original database and the clean database (minimal distortion on the database). Moreover, our approach does not require frequent itemset extraction before the masking process. This gives the proposed approach an advantage in terms of total availability. We tested our FCAHS heuristic on various reference datasets. Extensive experimental results showed the effectiveness of the proposed masking approach and the time efficiency of itemset extraction, making it very promising for e-Health sensitive data security and privacy.
引用
收藏
页码:62591 / 62604
页数:14
相关论文
共 50 条
  • [41] A Comprehensive Quantified Approach for Security Risk Management in e-Health Systems
    Ksibi, Sondes
    Jaidi, Faouzi
    Bouhoula, Adel
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 652 - 657
  • [42] An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health
    Sanchez-Guerrero, Rosa
    Almenarez, Florina
    Diaz-Sanchez, Daniel
    Marin, Andres
    Arias, Patricia
    Sanvido, Fabio
    [J]. SENSORS, 2012, 12 (05) : 6129 - 6154
  • [43] Analysis of Gender Differences in Online Handwriting Signals for Enhancing e-Health and e-Security Applications
    Marcos Faundez-Zanuy
    Jiri Mekyska
    [J]. Cognitive Computation, 2023, 15 : 208 - 219
  • [44] Analysis of Gender Differences in Online Handwriting Signals for Enhancing e-Health and e-Security Applications
    Faundez-Zanuy, Marcos
    Mekyska, Jiri
    [J]. COGNITIVE COMPUTATION, 2023, 15 (01) : 208 - 219
  • [45] How to exploit 5G networks for IoT e-Health security and privacy challenges
    Deebak, B.D.
    Al-Turjman, Fadi
    [J]. Deebak, B.D. (deebak.bd@vit.ac.in), 1600, Institute of Electrical and Electronics Engineers Inc. (04): : 6 - 11
  • [46] A Comprehensive Assessment Framework for Evaluating Adaptive Security and Privacy Solutions for IoT e-Health Applications
    Aman, Waqas
    Mohammed, Fatima Najla
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (10) : 613 - 623
  • [47] Security and Privacy in IoT-Cloud-Based e-Health Systems-A Comprehensive Review
    Butpheng, Chanapha
    Yeh, Kuo-Hui
    Xiong, Hu
    [J]. SYMMETRY-BASEL, 2020, 12 (07):
  • [48] Security and privacy issues in e-health cloud-based system: A comprehensive content analysis
    Azeez, Nureni Ayofe
    Van der Vyver, Charles
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2019, 20 (02) : 97 - 108
  • [49] Cloud based security on outsourcing using blockchain in E-health systems
    Benil, T.
    Jasper, J.
    [J]. COMPUTER NETWORKS, 2020, 178
  • [50] Blockchain-based approach for e-health data access management with privacy protection
    Hirtan, Liviu
    Krawiec, Piotr
    Dobre, Ciprian
    Batalla, Jordi Mongay
    [J]. 2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD), 2019,