Abstract
In this chapter, we investigate privacy-preserving health data processing in MHNs to classify health data for diagnosis and prediction with sufficient privacy protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
“iHT2 Releases Big Data Research Report,” 2013. [Online]. Available: http://ihealthtran.com/wordpress/2013/03/iht2-releases-big-data-research-report-download-today/
M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. Tygar, “Can Machine Learning Be Secure?” in Proc. of ASIACCS, 2006, pp. 16–25.
M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, “PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid,” IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 1, pp. 178–191, 2013.
G. Singla, D. J. Cook, and M. Schmitter-Edgecombe, “Recognizing independent and joint activities among multiple residents in smart environments,” J. Ambient Intelligence and Humanized Computing, vol. 1, no. 1, pp. 57–63, 2010.
G. Virone, M. Alwan, S. Dalal, S. W. Kell, B. Turner, J. A. Stankovic, and R. A. Felder, “Behavioral patterns of older adults in assisted living,” IEEE Transactions on Information Technology in Biomedicine, vol. 12, no. 3, pp. 387–398, 2008.
B. A. Majeed and S. J. Brown, “Developing a well-being monitoring system - modeling and data analysis techniques,” Appl. Soft Comput, vol. 6, no. 4, pp. 384–393, 2006.
T. S. Barger, D. E. Brown, and M. Alwan, “Health-status monitoring through analysis of behavioral patterns,” IEEE Transactions on Systems, Man, and Cybernetics, Part A, vol. 35, no. 1, pp. 22–27, 2005.
L. Rabiner, “A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition,” Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286, 1989.
Z. Xing, J. Pei, and E. J. Keogh, “A brief survey on sequence classification,” SIGKDD Explorations, vol. 12, no. 1, pp. 40–48, 2010.
M. T. Chan, A. J. Hoogs, J. Schmiederer, and M. Petersen, “Detecting rare events in video using semantic primitives with HMM,” in Proc. of ICPR, 2004, pp. IV: 150–154.
C. Stauffer and W. Grimson, “Learning patterns of activity using real-time tracking,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 22, no. 8, pp. 747–757, 2000.
H. Zhong, J. Shi, and M. Visontai, “Detecting unusual activity in video,” in Proc. of CVPR, 2004, pp. 819–826.
D. Zhang, D. G. Perez, S. Bengio, and I. McCowan, “Semi-supervised adapted HMMs for unusual event detection,” in Proc. of CVPR, 2005, pp. I: 611–618.
T. Graepel, K. Lauter, and M. Naehrig, “ML Confidential: Machine Learning on Encrypted Data,” in Proc. of ICISC, vol. 7839, 2012, pp. 1–21.
Z. Brakerski, C. Gentry, and V. Vaikuntanathan, “(leveled) fully homomorphic encryption without bootstrapping,” in Proc. of ITCS, 2012, pp. 309–325.
X. Liu, R. Lu, J. Ma, L. Chen, and B. Qin, “Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification,” Biomedical and Health Informatics, IEEE Journal of, to appear.
B. Samanthula, Y. Elmehdwi, and W. Jiang, “k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data,” Knowledge and Data Engineering, IEEE Transactions on, vol. 27, no. 5, pp. 1261–1273, May 2015.
Paillier and Pointcheval, “Efficient public-key cryptosystems provably secure against active adversaries,” in Proc. ASIACRYPT: Advances in Cryptology, 1999.
M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider, “Privacy-preserving ecg classification with branching programs and neural networks,” Information Forensics and Security, IEEE Transactions on, vol. 6, no. 2, pp. 452–468, June 2011.
R. Bost, R. Popa, S. Tu, and S. Goldwasser, “Machine Learning Classification over Encrypted Data,” in Proc. of NDSS, 2015, pp. 1–14.
J. Yuan and S. Yu, “Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 212–221, 2014.
Boneh, Goh, and Nissim, “Evaluating 2-DNF formulas on ciphertexts,” in Theory of Cryptography Conference (TCC), LNCS, vol. 2, 2005.
P. Fong and J. Weber-Jahnke, “Privacy Preserving Decision Tree Learning Using Unrealized Data Sets,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 2, pp. 353–364, 2012.
S. Goldwasser and S. Micali, “Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information,” in Proc. STOC, 1982, pp. 365–377.
C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. of STOC, 2009, pp. 169–178.
C. Gentry and S. Halevi, “Implementing Gentry’s fully-homomorphic encryption scheme,” in Proc. of EUROCRYPT, 2011, pp. 129–148.
I. Damgard, M. Geisler, and M. Kroigard, “Homomorphic encryption and secure comparison,” International Journal of Applied Cryptography, vol. 1, pp. 22–31, 2008.
R. Rivest, “Cryptography and machine learning,” Lecture Notes in Computer Science, vol. 739, pp. 427–439, 1993.
T. T. A. Dinh and A. Datta, “Stream on the sky: Outsourcing access control enforcement for stream data to the cloud,” CoRR, vol. abs/1210.0660, 2012.
J. Bernardo and A. Smith, Bayesian Theory. Wiley, 2000.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Zhang, K., Shen, X.(. (2015). Privacy-Preserving Health Data Processing. In: Security and Privacy for Mobile Healthcare Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-24717-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-24717-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24715-1
Online ISBN: 978-3-319-24717-5
eBook Packages: Computer ScienceComputer Science (R0)