Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity

被引:0
|
作者
Sun, Hui [1 ]
Huang, Cheng [1 ]
Cheng, Xu [1 ]
Chen, Fulong [1 ,2 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu, Peoples R China
[2] Anhui Prov Key Lab Network & Informat Secur, Wuhu, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
K-anonymity; Data slicing; Data iteration; Privacy protection;
D O I
10.1007/978-3-030-37337-5_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, there are many threats to medical data security. Because of the different standards of data storage and system, it is very difficult to share medical data and protect data privacy. This paper proposes a data privacy protection method based on K-anonymity for medical alliance chain. The data privacy protection method of Medical Alliance chain in this paper consists of four steps: (1) constructing equivalent classes; (2) medical data slicing; (3) data iteration; (4) medical data reorganization. The scheme of data privacy protection in Medical Alliance chain proposed in this paper has high security, no trusted third party and low energy consumption. It is a privacy protection method suitable for application and medical alliance chain data.
引用
收藏
页码:258 / 264
页数:7
相关论文
共 50 条
  • [1] Research on uncertain data privacy protection based on K-anonymity
    Jing, Yang
    Xiangmin, Ren
    Jianpei, Zhang
    Kechao, Wang
    Jing, Y. (yangjing@hrbeu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04): : 140 - 149
  • [2] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
  • [3] Medical Ethics Privacy Protection Based on Combining Distributed Randomization With K-anonymity
    Xie, Yonghong
    He, Qing
    Zhang, Dezheng
    Hu, Xiaojing
    2015 8th International Congress on Image and Signal Processing (CISP), 2015, : 1577 - 1582
  • [4] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
  • [5] Anatomy: Uncertain data k-anonymity privacy protection algorithm
    Ren, Xiangmin
    Jia, Boxuan
    Wang, Kechao
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +
  • [6] Research on K-Anonymity Algorithm in Privacy Protection
    Wang, Chen
    Liu, Lianzhong
    Gao, Lijie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196
  • [7] K-Anonymity Privacy Protection Using Ontology
    Talouki, Maedeh Ashouri
    NematBakhsh, Mohammad-ali
    Baraani, Ahmad
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 681 - 684
  • [8] Methods for Privacy Protection Using K-Anonymity
    Sharma, Vijay
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 149 - 152
  • [9] Data privacy preservation algorithm with k-anonymity
    Waranya Mahanan
    W. Art Chaovalitwongse
    Juggapong Natwichai
    World Wide Web, 2021, 24 : 1551 - 1561
  • [10] Data privacy preservation algorithm with k-anonymity
    Mahanan, Waranya
    Chaovalitwongse, W. Art
    Natwichai, Juggapong
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (05): : 1551 - 1561