Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Privacy preservation using game theory in e-health application

Published: 01 May 2022 Publication History

Abstract

In new e-health applications, the ubiquitous nature of intelligent devices raises legitimate questions about peoples’ privacy, and how to cope with the heterogeneity of user and application requirements in terms of security services. This requires the development of adaptive, context-aware and user-centric security solutions. Recent e-health applications (M2M: Machine-to-Machine/IoT: Internet of Things/Web) permit remote monitoring of patient health, medical treatments, fitness information and parameters, alarm triggering, etc. As monitored devices are tightly related to humans, they became able to act on their behalf, and may be modeled as attackers or defenders to make their decision autonomously. In this work, we propose a Markov based Theory Game Model (MTGM) between a data holder and a data requester in e-health applications to protect data privacy. The proposed solution ensures the highest payoff through the privacy-preserving decision taken to reach a compromise between privacy concession and incentive motivation. Numerical results of executed experiments are shown to confirm that game theory can enhance privacy protection and improve performance regarding time efficiency and information loss.

References

[1]
Focus Group on M2M Service Layer, M2M enabled ecosystems ehealth, ITU-T, 2014.
[2]
ETSI, eHEALTH; Standardization use cases for eHealth, European Telecommunications Standards Institute, 2020.
[3]
Lake D., Milito R., Morrow M., Vargheese R., Internet of things: Architectural framework for ehealth security, J ICT Stand 34 (2014) 301–328.
[4]
Keshta I., Odeh A., Security and privacy of electronic health records: Concerns and challenges, Egypt Inform J 22 (2) (2021) 177–183,. URL https://www.sciencedirect.com/science/article/pii/S1110866520301365.
[5]
Sahi A., Lai D., Li Y., A review of the state of the art in privacy and security in the ehealth cloud, IEEE Access 9 (2021) 104127–104141,.
[6]
Cam-Winget N, Sadeghi AR, Jin Y. Invited: Can IoT be secured: Emerging challenges in connecting the unconnected. In: 2016 53nd ACM/EDAC/IEEE design automation conference. 2016, p. 1–6. https://doi.org/10.1145/2897937.2905004.
[7]
Roy S., Ellis C., Shiva S., Dasgupta D., Shandilya V., Wu Q., A survey of game theory as applied to network security, in: Proceedings of the 2010 43rd Hawaii international conference on system sciences, in: HICSS ’10, IEEE Computer Society, Washington, DC, USA, 2010, pp. 1–10.
[8]
Riahi Sfar A., Challal Y., Moyal P., Natalizio E., A game theoretic approach for privacy preserving model in IoT-based transportation, IEEE Trans Intell Transp Syst 20 (12) (2019) 4405–4414.
[9]
Wartena F, Muskens J, Schmitt L, Petkovic M. Continua: The reference architecture of a personal telehealth ecosystem. In: The 12th IEEE International conference on e-health networking, applications and services. 2010, p. 1–6. https://doi.org/10.1109/HEALTH.2010.5556588.
[10]
D’Acquisto G., Domingo-Ferrer J., Kikiras P., Torra V., de Montjoye Y., Bourka A., Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, 2015, CoRR abs/1512.06000 arXiv:1512.06000.
[11]
Kanwal T., Anjum A., Khan A., Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities, Cluster Comput (2020),.
[12]
Mendonca F.V., Catalao-Lopes M., Marinho R.T., Figueira J.R., Improving medical decision-making with a management science game theory approach to liver transplantation, Omega 94 (2020),.
[13]
Halkidi M., Koutsopoulos I., A game theoretic framework for data privacy preservation in recommender systems, in: Proceedings of the 2011 european conference on machine learning and knowledge discovery in databases - vol. I, in: ECML PKDD’11, Springer-Verlag, Berlin, Heidelberg, 2011, pp. 629–644.
[14]
Zhu G., Liu H., Feng M., An evolutionary game-theoretic approach for assessing privacy protection in mhealth systems, Int J Environ Res Public Health 15 (10) (2018) 2196,.
[15]
Hamdi M, Abie H. Game-based adaptive security in the Internet of Things for eHealth. In: IEEE International conference on communications. Sydney, Australia; 2014, p. 920–5.
[16]
Meharouech A., Elias J., Paris S., Mehaoua A., A game theoretical approach for interference mitigation in body-to-body networks, in: ICC Workshops, IEEE, 2015, pp. 259–264.
[17]
Kumar N., Kaur K., Jindal A., Rodrigues J.J., Providing healthcare services on-the-fly using multi-player cooperation game theory in internet of vehicles (IoV) environment, Digit Commun Netw 1 (3) (2015) 191–203,.
[18]
Yi C., Zhao Z., Cai J., de Faria R.L., Zhang G.M., Priority-aware pricing-based capacity sharing scheme for beyond-wireless body area networks, Comput Netw 98 (2016) 29–43.
[19]
Lin D., Tang Y., Labeau F., Yao Y., Imran M., Vasilakos A.V., Internet of vehicles for E-health applications: A potential game for optimal network capacity, IEEE Syst J 11 (3) (2017) 1888–1896,.
[20]
Ara A., Al-Rodhaan M., Tian Y., Al-Dhelaan A., A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems, IEEE Access 5 (2017) 12601–12617.
[21]
Pasha M., Shah S., Framework for E-health systems in IoT-based environments, Wirel Commun Mob Comput 2018 (2018) 1–11,.
[22]
Tan H., Chung I., A secure and efficient group key management protocol with cooperative sensor association in WBANs, Sensors 18 (2018) 3930,.
[23]
Dwivedi A., Srivastava G., Dhar S., Singh R., A decentralized privacy-preserving healthcare blockchain for IoT, Sensors 19 (2019) 326,.
[24]
Shen J., Tan H., Moh S., Chung I., Liu Q., Sun X., Enhanced secure sensor association and key management in wireless body area networks, J Commun Netw 17 (5) (2015) 453–462.
[25]
International Telecommunication Union. Telecommunication Standardization Sector J., Series H: Audiovisual and Multimedia Systems : E-health Multimedia Services and Applications – Interoperability Compliance Testing of Personal Health Systems (HRN, PAN, LAN and WAN) : Conformance of ITU-T H.810 Personal Health Devices : PAN/LAN/TAN Interface Part 1: Optimized Exchange Protocol : Agent, ITU-T, 2015.
[26]
Karimi Adl R., Askari M., Barker K., Safavi-Naini R., Privacy consensus in anonymization systems via game theory, in: Cuppens-Boulahia N., Cuppens F., Garcia-Alfaro J. (Eds.), Data and applications security and privacy XXVI, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 74–89.
[27]
Xu L., Jiang C., Chen Y., Ren Y., Liu K.J.R., Privacy or utility in data collection? A contract theoretic approach, J Sel Top Signal Process 9 (7) (2015) 1256–1269.
[28]
Wu X., Wu T., Khan M., Ni Q., Dou W., Game theory based correlated privacy preserving analysis in big data, IEEE Trans Big Data (2017),. arXiv:1512.00327.
[29]
Liang X., Yan Z., A survey on game theoretical methods in human-machine networks, Future Gener Comput Syst (2017),.
[30]
Wang S., Li L., Sun W., Guo J., Bie R., Lin K., Context sensing system analysis for privacy preservation based on game theory, Sensors (2017).
[31]
Vasa J., Modi P., Review of different privacy preserving techniques in PPDP, 2018, CoRR abs/1808.04088 arXiv:1808.04088.
[32]
Sen J., Homomorphic encryption: Theory & applications, 2013, CoRR abs/1305.5886 arXiv:1305.5886.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Information Security and Applications
Journal of Information Security and Applications  Volume 66, Issue C
May 2022
383 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 01 May 2022

Author Tags

  1. Privacy
  2. Internet of Things
  3. E-health
  4. Game theory
  5. Markovian process

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media