Computer Science ›› 2022, Vol. 49 ›› Issue (4): 362-368.doi: 10.11896/jsjkx.210300032

• Information Security • Previous Articles     Next Articles

Study on Differential Privacy Protection for Medical Set-Valued Data

WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can   

  1. School of Computer Science and Engineering, Northeastern University, Shenyang 110169, China
  • Received:2021-03-02 Revised:2021-08-07 Published:2022-04-01
  • About author:WANG Mei-shan,born in 1996,postgraduate.Her main research interests include privacy protection and so on.GAO Fu-xiang,born in 1961,Ph.D,professor.His main research interests include computer network security,embedded computer networks.

Abstract: Electronic medical data surges along with the constant development of information technologies and medical care digitalization.It provides foundations for further application on data analysis, data mining and intelligent diagnosis.The fact that me-dical data are massive and involve a lot of patient privacy.How to protect patient privacy while using medical data is challenging.The predominant principle for the solutions is anonymity.It is not competent in confidentiality or availability when attackers possess strong background knowledge.This paper proposes an optimized classification tree and an improved Diffpart.In our design, association of data is introduced to sift set-valued data for DP based perturbation, which satisfies the utility and supports statistic query.Then test is conducted with 240000 practical medical data and the results show that the proposed algorithm holds DP distribution and outperforms Diffpart in privacy and utility.

Key words: Data utility, Differential privacy, Medical big data, Privacy protection, Set-Valued data

CLC Number: 

  • TP309.2
[1] SWEENEY L.k-anonymity:A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
[2] SAMARATI P.Protecting respondents’ identities in microdata release[J].IEEE Transactions on Knowledge and Data Engineering,2001,13(6):1010-1027.
[3] NARAYANAN A,SHMATIKOV V.Robust de-anonymization of large sparse datasrts[C]//Proceedings of the 2008 IEEE Symposium on Security and Privacy.Oakland,USA,2008:111-125.
[4] XIONG P,ZHU T Q,WANG X F.A Survey on Differential Privacy and Applications[J].Chinese Journal of Computers,2014,37(1):101-122.
[5] DWORK C.Differential privacy:A survey of results[C]//Proceedings of the 5th International Conference on Theory and Applications of Models of Computation.Xi’an,China,2008:1-19.
[6] XIAO X,WANG G,GEHREKE J.Differential privacy viawavelet transforms[C]//Proceedings of the IEEE 26th International Conference on Data Engineering.Piscataway,NJ:IEEE,2010:225-236.
[7] HAY M,LI C,MIKLAU G,et al.Accurate estimation of the degree distribution of private networks[C]//Proceedings of the 9th IEEE International Conference on Data Mining.Piscataway,NJ:IEEE,2009:169-178.
[8] MCSHERRY F,MIRONOV I.Differentially private recom-mender systems;building privacy into the net[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York:ACM,2009:627-636.
[9] CHEN R,MOHAMMED N,FUNG B C M,et al.Publishing set-valued data via differential privacy[J].Proceedings of the VLDB Endowment,2011,4(11):1087-1098.
[10] DWORK C,MCSHERRY F,NISSIM K,et al.Calibrating noise to sensitivity in private data analysis[C]//Proceedings of the 3rd Conference on Theory of Cryptography.New York,USA,2006:265-284.
[11] MCSHERRY F,TALWAR K.Mechanism design via differential privacy[C]//Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science.Providence,Rhode Island,USA,2007:94-103.
[12] ABADI M,GOODFELLOW I.Deep learning with differentialprivacy[C]//ACM Sigsac Conference on Computer and Communications Security.ACM,2016:308-318.
[13] CAI T T,WANG Y,ZHANG L.The cost of privacy:optimal rates of convergence for parameter estimation with differential privacy[J].arXiv:1902.04495,2019.
[14] BEAULIEU-JONES B K,WU Z S,WILLIAMS C,et al.Privacy-preserving generative deep neural networks support clinical data sharing[J].BioRxiv,2017,159756.
[15] BLUM A,DWORK C,MCSHERRY F,et al.Practical privacy:the SuLQ framework[C]//Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems.2005:128-138.
[16] DWORK C,NAOR M,PITASSI T,et al.Pan-private streaming algorithms[C]//Proceedings of the 1st Symposium on Innovations in Computer Science.2010.
[17] LI Y,HAO Z F,WEN W,et al.Research on differential privacy preserving K-means clustering[J].Computer Science,2013,40(3):287-290.
[18] SONG F G,MA T H,TIAN Y,et al.A new method of privacy protection:random k-anonymous[J].IEEE Access,2019,7:75434-75445.
[19] SHI X J,HU Y L.Proprietary protection of dynamic set-valued data release based on classification tree[J].Computer Science,2017,44(5):120-124,165.
[20] LI S Y,JI X S,YOU W,et al.A data query hierarchical control strategy based on differential privacy[J].Computer Science,2019,46(11):130-136.
[21] DONG X M,WANG R,ZOU X K.Survey on Privacy Protection Solutions for Recommended Applications[J].Computer Science,2021,48(9):21-35.
[22] CHEN H Y,WANG J H,HU Z P,et al.Dynamic update privacy protection algorithm for medical data publishing[J].Compu-ter Science,2019,46(1):206-211.
[23] MCSHERRY F.Privacy integrated queries:An ex- tensible platform for privacy-preserving data analysis[J].Communications of the ACM,2010,53(9):89-97.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[3] HUANG Jue, ZHOU Chun-lai. Frequency Feature Extraction Based on Localized Differential Privacy [J]. Computer Science, 2022, 49(7): 350-356.
[4] KONG Yu-ting, TAN Fu-xiang, ZHAO Xin, ZHANG Zheng-hang, BAI Lu, QIAN Yu-rong. Review of K-means Algorithm Optimization Based on Differential Privacy [J]. Computer Science, 2022, 49(2): 162-173.
[5] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[6] LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20.
[7] DONG Xiao-mei, WANG Rui, ZOU Xin-kai. Survey on Privacy Protection Solutions for Recommended Applications [J]. Computer Science, 2021, 48(9): 21-35.
[8] SUN Lin, PING Guo-lou, YE Xiao-jun. Correlation Analysis for Key-Value Data with Local Differential Privacy [J]. Computer Science, 2021, 48(8): 278-283.
[9] ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308.
[10] CHEN Tian-rong, LING Jie. Differential Privacy Protection Machine Learning Method Based on Features Mapping [J]. Computer Science, 2021, 48(7): 33-39.
[11] WANG Le-ye. Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities [J]. Computer Science, 2021, 48(6): 301-305.
[12] GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340.
[13] PENG Chun-chun, CHEN Yan-li, XUN Yan-mei. k-modes Clustering Guaranteeing Local Differential Privacy [J]. Computer Science, 2021, 48(2): 105-113.
[14] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[15] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!