Abstract
Data mining plays a very important role in various database applications. Medical data mining has been a popular data mining application with a vital role in improving the quality of medical services and promoting the development of the medical industry. There has been extensive research in rough set theory (RST) to mine potential patterns in medical data, which has important implications for clinical decision support and online medical diagnosis. Although medical data mining is very promising, the rapid development of this field still faces many challenges, such as information security and privacy issues. Under the assumption that data miners cannot be trusted, this paper combines the differential privacy and rough set rules’ extraction for the first time and proposes a new method to mine hidden patterns in medical data and ensure patient privacy. This algorithm uses the Laplacian mechanism to add noise to the credibility in the process of data mining while maximizing the utility of the data. Experiments show that our algorithm can effectively preserve the accuracy of data while protecting patient privacy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
E.S. Berner, Clinical Decision Support Systems, vol. 233 (Springer Science + Business Media, LLC, New York, 2007)
M.A. Musen, B. Middleton, R.A. Greenes, Clinical decision-support systems, in Biomedical Informatics (Springer, London, 2014), pp. 643–674
H. Monkaresi, R.A. Calvo, H. Yan, A machine learning approach to improve contactless heart rate monitoring using a webcam. IEEE J. Biomed. Health Inf. 18(4), 1153–1160 (2014)
V. Chaitali, B. Nikita, M. Darshana, A survey on various classification techniques for clinical decision support system. Int. J. Comput. Appl. 116(23), 14–17 (2015)
S. Kumar, H. Inbarani, Optimistic multi-granulation rough set based classification for medical diagnosis. Procedia Comput. Sci. 47, 374–382 (2015)
H.H. Inbarani, A novel neighborhood rough set based classification approach for medical diagnosis. Procedia Comput. Sci. 47, 351–359 (2015)
R. Ali, J. Hussain, M.H. Siddiqi et al., H2RM: a hybrid rough set reasoning model for prediction and management of diabetes mellitus. Sensors 15(7), 15921–15951 (2015)
L. Sweeney, k-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)
A. Machanavajjhala, J. Gehrke, D. Kifer, L-diversity: privacy beyond k-anonymity, in Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE’06 (IEEE, 2006), pp. 24–24
N. Li, T. Li, S. Venkatasubramanian, T-closeness: privacy beyond k-anonymity and l-diversity, in IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007 (IEEE, 2007), pp. 106–115
M.B. Malik, M.A. Ghazi, R. Ali, Privacy preserving data mining techniques: current scenario and future prospects, in 2012 Third International Conference on Computer and Communication Technology (ICCCT) (IEEE, 2012), pp. 26–32
A. Gkoulalas-Divanis, G. Loukides, J. Sun, Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4–19 (2014)
C. Dwork, Differential privacy, in Encyclopedia of Cryptography and Security (Springer US, 2011), pp. 338–340
R.S. Ledley, L.B. Lusted, Reasoning foundations of medical diagnosis. Science 130(3366), 9–21 (1959)
H.L. Chen, B. Yang, J. Liu et al., A support vector machine classifier with rough set-based feature selection for breast cancer diagnosis. Expert Syst. Appl. 38(7), 9014–9022 (2011)
M. Kantarcıoglu, J. Vaidya, C. Clifton, Privacy preserving naive bayes classifier for horizontally partitioned data, in IEEE ICDM Workshop on Privacy Preserving Data Mining (2003), pp. 3–9
X. Liu, R. Lu, J. Ma, L. Chen, B. Qin, Privacy-preserving patient centric clinical decision support system on Naïve Bayesian classification. IEEE J. Biomed. Health Inf. 20(2), 655–668 (2016)
M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)
Y. Elmehdwi, B.K. Samanthula, W. Jiang, Secure k-nearest neighbor query over encrypted data in outsourced environments, in 2014 IEEE 30th International Conference on Data Engineering (ICDE) (IEEE, 2014), pp. 664–675
J.P. Hubaux, J. Fellay, E. Ayday et al., Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data, in Proceedings of USENIX Security Workshop on Health Information Technologies (HealthTech” 13), no. EPFL-CONF-187118 (2013)
Y. Rahulamathavan, S. Veluru, R. Phan, J. Chambers, M. Rajarajan, Privacy-preserving clinical decision support system using gaussian kernel based classification. IEEE J. Biomed. Health Inf. 18(1), 56–66 (2014)
C. Dwork, F. McSherry, K. Nissim, A. Smith, Calibrating noise to sensitivity in private data analysis, in Theory of Cryptography Conference (Springer, Berlin, Heidelberg, 2006), pp. 265–284
F. McSherry, K. Talwar, Mechanism design via differential privacy, in 48th Annual IEEE Symposium on Foundations of Computer Science, 2007. FOCS’07 (IEEE, 2007), pp. 94–103
Z. Ding, Z. Qin, Z. Qin, Frequent symptom sets identification from uncertain medical data in differentially private way. Sci. Program. 2017, 1–10 (2017)
N. Li, W. Qardaji, D. Su, J. Cao, PrivBasis: frequent itemset mining with differential privacy. Proc. VLDB Endowment 5(11), 1340–1351 (2012)
R. Bhaskar, S. Laxman, A. Smith, A. Thakurta, Discovering frequent patterns in sensitive data, in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2010), pp. 503–512
N. Li, W. Qardaji, D. Su, J. Cao, Privbasis: frequent itemset mining with differential privacy. Proc. VLDB Endowment 5(11), 1340–1351 (2012)
X.J. Zhang, M. Wang, X.F. Meng, An accurate method for mining top-k frequent pattern under differential privacy. J. Comput. Res. Dev. 51(1), 104–114 (2014)
A. Blum, C. Dwork, F. McSherry, K. Nissim, Practical privacy: the SuLQ framework, in Proceedings of the Twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (ACM, 2005), pp. 128–138
A. Friedman, S. Assaf, Data mining with differential privacy, in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2010), pp. 493–502
Q. Yu, Y. Luo, C. Chen, X. Ding, Outlier-eliminated k-means clustering algorithm based on differential privacy preservation. Appl. Intell. 45(4), 1179–1191 (2016)
K. Chaudhuri, C. Monteleoni, Privacy-preserving logistic regression, in Advances in Neural Information Processing Systems (2009), pp. 289–296
Acknowledgements
The research is supported by the National Science Foundation of China (Nos. 61672176, 61662008, 61502111), Guangxi “Bagui Scholar” Teams for Innovation and Research Project, the Guangxi Collaborative Center of Multi-source Information Integration and Intelligent Processing, Guangxi Natural Science Foundation (Nos. 2015GXNSFBA139246, 2016GXNSFAA380192), and the Innovation Project of Guangxi Graduate Education (Nos. YCSZ2015104, 2018KY0082).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, X., Luo, C., Liu, P., Wang, Le., Yu, D. (2019). Injecting Differential Privacy in Rules Extraction of Rough Set. In: Wu, C., Chyu, MC., Lloret, J., Li, X. (eds) Proceedings of the 2nd International Conference on Healthcare Science and Engineering . ICHSE 2018. Lecture Notes in Electrical Engineering, vol 536. Springer, Singapore. https://doi.org/10.1007/978-981-13-6837-0_13
Download citation
DOI: https://doi.org/10.1007/978-981-13-6837-0_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6836-3
Online ISBN: 978-981-13-6837-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)