Skip to main content
Log in

A differential privacy protection scheme for sensitive big data in body sensor networks

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

As a special kind of application of wireless sensor networks, body sensor networks (BSNs) have broad application perspectives in health caring. Big data acquired from BSNs usually contain sensitive information, such as physical condition, location information, and so on, which is compulsory to be appropriately protected. However, previous methods overlooked the privacy protection issue, leading to privacy violation. In this paper, a differential privacy protection scheme for sensitive big data in BSNs is proposed. A tree structure is constructed to reduce errors and provide long range queries. Haar Wavelet transformation method is applied to convert histogram into a complete binary tree. At last, to verify the advantages of our scheme, several experiments are conducted to show the outperformed results. Experimental results demonstrate that the tree structure greatly reduces the calculation overheads which preserves differential privacy for users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393– 422

    Article  Google Scholar 

  2. Alemdar H, Ersoy C (2010) Wireless sensor networks for healthcare: a survey. Comput Netw 54(15):2688–2710

    Article  Google Scholar 

  3. Ali ST, Sivaraman V, Ostry D (2014) Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Trans Mob Comput 13(12):2763–2776

    Article  Google Scholar 

  4. Antonescu B, Basagni S (2013) Wireless body area networks: challenges, trends and emerging technologies. In: Proceedings of the 8th international conference on body area networks, 1-7, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

  5. Barua M, Alam MS, Liang X, Shen X (2011) Secure and quality of service assurance scheduling scheme for wban with application to ehealth. In: 2011 IEEE Wireless communications and networking conference (WCNC 2011). IEEE, pp 1102–1106

  6. Bettini C, Riboni D (2015) Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive Mob Comput 17:159–174

    Article  Google Scholar 

  7. Canny J (2002) Collaborative filtering with privacy. In: 2002 IEEE Symposium on security and privacy. IEEE, pp 45–57

  8. Casino F, Domingo-Ferrer J, Patsakis C, Puig D, Solanas A (2015) A k-anonymous approach to privacy preserving collaborative filtering. J Comput Syst Sci 81(6):1000–1011

    Article  Google Scholar 

  9. Dwork C (2011) Differential privacy. In: Encyclopedia of cryptography and security. Springer, pp 338–340

  10. Giannotti F, Lakshmanan LV, Monreale A, Pedreschi D, Wang H (2013) Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst J 7(3):385–395

    Article  Google Scholar 

  11. Hanson MA, Powell Jr HC, Barth AT, Ringgenberg K, Calhoun BH, Aylor JH, Lach J (2009) Body area sensor networks: challenges and opportunities. Computer 1(1):58–65

  12. Hao Y, Foster R (2008) Wireless body sensor networks for health-monitoring applications. Physiol Meas 29(11):1–42

    Article  Google Scholar 

  13. He D, Chen C, Chan SC, Bu J, Zhang P (2013) Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J Biomed Health Inform 17(3):664– 674

    Article  Google Scholar 

  14. James A (2015) Optimisation, security, privacy and trust in e-business systems. J Comput Syst Sci 81 (6):941–942

    Article  MathSciNet  MATH  Google Scholar 

  15. Khan N, Javaid N, Khan ZA, Jaffar M, Rafiq U, Bibi A (2012) Ubiquitous healthcare in wireless body area networks. In: 2012 IEEE 11Th international conference on trust, security and privacy in computing and communications (trustcom 2012). IEEE, pp 1960–1967

  16. Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun 17(1):51– 58

    Article  Google Scholar 

  17. Li M, Yu S, Guttman JD, Lou W, Ren K (2013) Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans Sens Netw (TOSN) 9(2):1–35

    Article  Google Scholar 

  18. Li N, Zhang N, Das SK, Thuraisingham B (2009) Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw 7(8):1501–1514

    Article  Google Scholar 

  19. Liu J, Zhang Z, Sun R, Kwak KS (2012) An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In: 2012 IEEE International conference on communications (ICC 2012). IEEE, pp 3404–3408

  20. Lo BP, Thiemjarus S, King R, Yang GZ (2005) Body sensor network–a wireless sensor platform for pervasive healthcare monitoring na

  21. Lou H, Ma Y, Zhang F, Liu M, Shen W (2014) Data mining for privacy preserving association rules based on improved mask algorithm. In: Proceedings of the 2014 IEEE 18th international conference on computer supported cooperative work in design (CSCWD 2014). IEEE, pp 265–270

  22. Lu Y, Bao SD (2014) Efficient fuzzy vault application in node recognition for securing body sensor networks. In: 2014 IEEE International conference on communications (ICC). IEEE, pp 3648–3651

  23. Ma CY, Yau DK, Yip NK, Rao NS (2013) Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Trans Networking 21(3):720–733

    Article  Google Scholar 

  24. Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J (2002) Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on wireless sensor networks and applications. ACM, pp 88–97

  25. Rushanan M, Rubin AD, Kune DF, Swanson CM (2014) Sok: security and privacy in implantable medical devices and body area networks. In: 2014 IEEE Symposium on security and privacy (SP 2014). IEEE, pp 524–539

  26. Sun J, Fang Y, Zhu X (2010) Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel Commun 17(1):66–73

    Article  Google Scholar 

  27. Toch E, Wang Y, Cranor LF (2012) Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model User-Adap Inter 22(1-2):203– 220

    Article  Google Scholar 

  28. Trcek D, Brodnik A (2013) Hard and soft security provisioning for computationally weak pervasive computing systems in e-health. IEEE Wirel Commun 20(4):22–29

    Article  Google Scholar 

  29. Venkatasubramanian KK, Gupta SK (2010) Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans Sens Netw (TOSN) 6(4):31

    Google Scholar 

  30. Xiao X, Wang G, Gehrke J (2011) Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng 23(8):1200– 1214

    Article  Google Scholar 

  31. Yan Y, Shu T (2014) Energy-efficient in-network encryption/decryption for wireless body area sensor networks. In: 2014 IEEE Global communications conference (GLOBECOM 2014). IEEE, pp 2442–2447

  32. Yang GZ, Yacoub M (2006) Body sensor networks Springer

  33. Yao L, Gao F, Yu G (2013) Pattern regulator for wireless body sensor networks. In: 2013 IEEE International conference on embedded and ubiquitous computing (HPCC_EUC 2013). IEEE, pp 1558–1565

  34. Zhao H, Xu R, Shu M, Hu J (2015) Physiological-signal-based key negotiation protocols for body sensor networks: a survey pp 63–70. doi:10.1109/ISADS.2015.13

  35. Zhou J, Cao Z, Dong X, Lin X (2015) Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions, and future directions. IEEE Wirel Commun 22(2):136–144

    Article  Google Scholar 

  36. Zhu T, Xiong P, Li G, Zhou W (2015) Correlated differential privacy: hiding information in non-iid data set. IEEE Trans Inf Forensics Secur 10(2):229–242

    Article  Google Scholar 

Download references

Acknowledgments

This research is sponsored in part by the National Natural Science Foundation of China (No.61402078 and 61572231). This research is also sponsored in part supported by the Fundamental Research Funds for the Central Universities (No.DUT14RC(3)090).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi Lin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, C., Wang, P., Song, H. et al. A differential privacy protection scheme for sensitive big data in body sensor networks. Ann. Telecommun. 71, 465–475 (2016). https://doi.org/10.1007/s12243-016-0498-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-016-0498-7

Keywords

Navigation