A Privacy-Preserving Technique for Incremental Dataset on Cloud by Synthetic Data Perturbation

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud is an impetus technology revolution, allowing data providers to store their privatized Electronic Health Record (EHR) for further analysis and outlook with a compromised privacy, where the shared data being exposed to various adversary attacks and malware threats. There are several masking and randomization techniques that provide hints of privacy. In this paper, the Electronic Health Record (EHR) values are perturbed using logarithmic data perturbation and outsourced to the cloud.

    Aims.To develop a privacy-preserving technique for effective sharing ofElectronic Health Record (EHR) on a cloud by logarithmic data perturbation.

    Methods.Synthetic logarithmic transformation is applied to the sensitive values in a record before they are outsourced and for better privacy.

    Results. Synthetic Logarithmic Transformation along with the incremental anonymization produces effective result compared to classical anonymization..

     


  • Keywords


    EHR, SLT, Privacy, distortion, performance.

  • References


      [1] "The Privacy Torts" (December 19, 2000). Privacilla.org.

      [2] http://faculty.uml.edu/sgallagher/Brandeisprivacy.htm

      [3] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,” no. 1, 2014.

      [4] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing,” System, pp. 1–12.

      [5] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling efficient fuzzy keyword search over encrypted data in cloud computing,” {IACR} Cryptol. {ePrint} Arch., no. September 2015, pp. 1–16, 2009.

      [6] L. Sweeney. k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; 557-570

      [7] Machanavajjhala, Ashwin; Kifer, Daniel; Gehrke, Johannes; Venkitasubramaniam, Muthuramakrishnan (March 2007). "L-diversity: Privacy Beyond K-anonymity". ACM Trans. Knowl. Discov. Data. 1 (1). doi:10.1145/1217299.1217302. ISSN 1556-4681

      [8] Li, Ninghui; Li, Tiancheng; Venkatasubramanian, S. (April 2007). "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity". IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007: 106–115. doi:10.1109/ICDE.2007.367856

      [9] X. Zhang, C. Liu, S. Nepal, and J. Chen, “An efficient quasi identifier index based approach for privacy preservation over incremental data sets on cloud,” J. Comput. Syst.Sci., vol. 79, no. 5, pp. 542–555, Aug. 2013.

      [10] P. Bhatotia, A. Wieder, R. Rodrigues, U. a Acar, and R. Pasquin, “Incoop: MapReduce for incremental computations,” Proc. 2nd ACM Symp. Cloud Comput. - SOCC ’11, pp. 1–14, 2011.

      [11] N. Adam and J. Wortman. Security control methods for statistical databases. ACM Computing Surveys, 21(4), 1989.

      [12] Kargupta, H., Datta, S., Wang, Q., and Sivakumar, K. (2003). Random Data Perturbation Techniques and Privacy Preserving Data Mining, Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), Melbourn, Florida, USA, December 2003

      [13] K. Chen and L. Liu. Privacy-preserving data classification with rotation perturbation. In Proceedings of the 5th IEEE International Conference on Data Mining (ICDM’05), pages 589–592, Houston, TX, November 2005.

      [14] Latanya Sweeney. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):571–588, 2002.

      [15] P. Samarati. Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010–1027, November/December 2001.

      [16] J. A. Nelder and R. Mead. A simplex method for function minimization.Computer Journal, 7:308–313, 1965.

      [17] S. R. M. Oliveira and O. R. Za¨ıane. Privacy preserving clustering bydata transformation. In Proceedings of the 18th Brazilian Symposium onDatabases, pages 304–318, Manaus, Amazonas, Brazil, October 2003

      [18] S. Guo, X. Wu, and Y. Li. Deriving private information from perturbeddata using IQR based approach. In Proceedings of the Second InternationalWorkshop on Privacy Data Management (PDM’06), Atlanta, GA, April2006.

      [19] L. Sweeney. "Database Security: k-anonymity". Retrieved 19 January 2014

      [20] M Stephens, NJ Smith, P Donnelly, “A new statistical method for haplotype reconstruction from population data”- The American Journal of Human, 2001 – Elsevier

      [21] K Chen, G Sun, L Liu, “Towards attack-resilient geometric data perturbation” - proceedings of the 2007 SIAM international conference …, 2007 – SIAM


 

View

Download

Article ID: 19219
 
DOI: 10.14419/ijet.v7i3.34.19219




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.