Abstract
As a special kind of application of wireless sensor networks, body sensor networks (BSNs) have broad application perspectives in health caring. Big data acquired from BSNs usually contain sensitive information, such as physical condition, location information, and so on, which is compulsory to be appropriately protected. However, previous methods overlooked the privacy protection issue, leading to privacy violation. In this paper, a differential privacy protection scheme for sensitive big data in BSNs is proposed. A tree structure is constructed to reduce errors and provide long range queries. Haar Wavelet transformation method is applied to convert histogram into a complete binary tree. At last, to verify the advantages of our scheme, several experiments are conducted to show the outperformed results. Experimental results demonstrate that the tree structure greatly reduces the calculation overheads which preserves differential privacy for users.
Similar content being viewed by others
References
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393– 422
Alemdar H, Ersoy C (2010) Wireless sensor networks for healthcare: a survey. Comput Netw 54(15):2688–2710
Ali ST, Sivaraman V, Ostry D (2014) Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Trans Mob Comput 13(12):2763–2776
Antonescu B, Basagni S (2013) Wireless body area networks: challenges, trends and emerging technologies. In: Proceedings of the 8th international conference on body area networks, 1-7, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Barua M, Alam MS, Liang X, Shen X (2011) Secure and quality of service assurance scheduling scheme for wban with application to ehealth. In: 2011 IEEE Wireless communications and networking conference (WCNC 2011). IEEE, pp 1102–1106
Bettini C, Riboni D (2015) Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive Mob Comput 17:159–174
Canny J (2002) Collaborative filtering with privacy. In: 2002 IEEE Symposium on security and privacy. IEEE, pp 45–57
Casino F, Domingo-Ferrer J, Patsakis C, Puig D, Solanas A (2015) A k-anonymous approach to privacy preserving collaborative filtering. J Comput Syst Sci 81(6):1000–1011
Dwork C (2011) Differential privacy. In: Encyclopedia of cryptography and security. Springer, pp 338–340
Giannotti F, Lakshmanan LV, Monreale A, Pedreschi D, Wang H (2013) Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst J 7(3):385–395
Hanson MA, Powell Jr HC, Barth AT, Ringgenberg K, Calhoun BH, Aylor JH, Lach J (2009) Body area sensor networks: challenges and opportunities. Computer 1(1):58–65
Hao Y, Foster R (2008) Wireless body sensor networks for health-monitoring applications. Physiol Meas 29(11):1–42
He D, Chen C, Chan SC, Bu J, Zhang P (2013) Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J Biomed Health Inform 17(3):664– 674
James A (2015) Optimisation, security, privacy and trust in e-business systems. J Comput Syst Sci 81 (6):941–942
Khan N, Javaid N, Khan ZA, Jaffar M, Rafiq U, Bibi A (2012) Ubiquitous healthcare in wireless body area networks. In: 2012 IEEE 11Th international conference on trust, security and privacy in computing and communications (trustcom 2012). IEEE, pp 1960–1967
Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun 17(1):51– 58
Li M, Yu S, Guttman JD, Lou W, Ren K (2013) Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans Sens Netw (TOSN) 9(2):1–35
Li N, Zhang N, Das SK, Thuraisingham B (2009) Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw 7(8):1501–1514
Liu J, Zhang Z, Sun R, Kwak KS (2012) An efficient certificateless remote anonymous authentication scheme for wireless body area networks. In: 2012 IEEE International conference on communications (ICC 2012). IEEE, pp 3404–3408
Lo BP, Thiemjarus S, King R, Yang GZ (2005) Body sensor network–a wireless sensor platform for pervasive healthcare monitoring na
Lou H, Ma Y, Zhang F, Liu M, Shen W (2014) Data mining for privacy preserving association rules based on improved mask algorithm. In: Proceedings of the 2014 IEEE 18th international conference on computer supported cooperative work in design (CSCWD 2014). IEEE, pp 265–270
Lu Y, Bao SD (2014) Efficient fuzzy vault application in node recognition for securing body sensor networks. In: 2014 IEEE International conference on communications (ICC). IEEE, pp 3648–3651
Ma CY, Yau DK, Yip NK, Rao NS (2013) Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Trans Networking 21(3):720–733
Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J (2002) Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on wireless sensor networks and applications. ACM, pp 88–97
Rushanan M, Rubin AD, Kune DF, Swanson CM (2014) Sok: security and privacy in implantable medical devices and body area networks. In: 2014 IEEE Symposium on security and privacy (SP 2014). IEEE, pp 524–539
Sun J, Fang Y, Zhu X (2010) Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel Commun 17(1):66–73
Toch E, Wang Y, Cranor LF (2012) Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model User-Adap Inter 22(1-2):203– 220
Trcek D, Brodnik A (2013) Hard and soft security provisioning for computationally weak pervasive computing systems in e-health. IEEE Wirel Commun 20(4):22–29
Venkatasubramanian KK, Gupta SK (2010) Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans Sens Netw (TOSN) 6(4):31
Xiao X, Wang G, Gehrke J (2011) Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng 23(8):1200– 1214
Yan Y, Shu T (2014) Energy-efficient in-network encryption/decryption for wireless body area sensor networks. In: 2014 IEEE Global communications conference (GLOBECOM 2014). IEEE, pp 2442–2447
Yang GZ, Yacoub M (2006) Body sensor networks Springer
Yao L, Gao F, Yu G (2013) Pattern regulator for wireless body sensor networks. In: 2013 IEEE International conference on embedded and ubiquitous computing (HPCC_EUC 2013). IEEE, pp 1558–1565
Zhao H, Xu R, Shu M, Hu J (2015) Physiological-signal-based key negotiation protocols for body sensor networks: a survey pp 63–70. doi:10.1109/ISADS.2015.13
Zhou J, Cao Z, Dong X, Lin X (2015) Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions, and future directions. IEEE Wirel Commun 22(2):136–144
Zhu T, Xiong P, Li G, Zhou W (2015) Correlated differential privacy: hiding information in non-iid data set. IEEE Trans Inf Forensics Secur 10(2):229–242
Acknowledgments
This research is sponsored in part by the National Natural Science Foundation of China (No.61402078 and 61572231). This research is also sponsored in part supported by the Fundamental Research Funds for the Central Universities (No.DUT14RC(3)090).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lin, C., Wang, P., Song, H. et al. A differential privacy protection scheme for sensitive big data in body sensor networks. Ann. Telecommun. 71, 465–475 (2016). https://doi.org/10.1007/s12243-016-0498-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-016-0498-7