Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2897845.2897893acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS)

Published: 30 May 2016 Publication History

Abstract

Affordable cloud computing technologies allow users to efficiently store, and manage their Personal Health Records (PHRs) and share with their caregivers or physicians. This in turn improves the quality of healthcare services, and lower health care cost. However, serious security and privacy concerns emerge because people upload their personal information and PHRs to the public cloud. Data encryption provides privacy protection of medical information but it is challenging to utilize encrypted data. In this paper, we present a privacy-preserving disease treatment, complication prediction scheme (PDTCPS), which allows authorized users to conduct searches for disease diagnosis, personalized treatments, and prediction of potential complications. $PDTCPS$ uses a tree-based structure to boost search efficiency, a wildcard approach to support fuzzy keyword search, and a Bloom-filter to improve search accuracy and storage efficiency. In addition, our design also allows health care providers and the public cloud to collectively generate aggregated training models for disease diagnosis, personalized treatments and complications prediction. Moreover, our design provides query unlinkability and hides both search & access patterns. Finally, our evaluation results using two UCI datasets show that our scheme is more efficient and accurate than two existing schemes.

References

[1]
Patientslikeme, https://www.patientslikeme.com/.
[2]
NHIN, http://www.hhs.gov/healthit/healthnetwork.
[3]
UCI Machine Learning Repository, https://archive.ics.uci.edu/ml/datasets.html.
[4]
R. Agrawal and R. Srikant. Privacy-preserving data mining. In ACM Sigmod Record, volume 29, pages 439--450. ACM, 2000.
[5]
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. In Communications of the ACM, pages 50--58, April 2010.
[6]
M. Barni, P. Failla, R. Lazzeretti, A.-R. Sadeghi, and T. Schneider. Privacy-preserving ecg classi cation with branching programs and neural networks. pages 452--468. IEEE, 2011.
[7]
J. L. N. B.B. Dean, J. Lam, Q. Butler, D. Aguilar, and R. J. Nordyle. Use of electronic medical records for health outcomes research: a literature review. In Medical Care Research Review, 2010.
[8]
Y. Ben-Haim and E. Tom-Tov. A streaming parallel decision tree algorithm. volume 11, pages 849--872. JMLR.org, 2010.
[9]
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 506--522. Springer, 2004.
[10]
R. Bost, R. A. Popa, S. Tu, and S. Goldwasser. Machine learning classi cation over encrypted data. Crypto ePrint Archive, 2014.
[11]
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. volume 25, pages 222--233. IEEE, 2014.
[12]
M. Chuah and W. Hu. Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In ICDCSW, pages 273--281, 2011.
[13]
W. Du, Y. S. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In SDM, pages 222--233. SIAM, 2004.
[14]
A. Ev mievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 211--222. ACM, 2003.
[15]
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for ne-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, pages 89--98. Acm, 2006.
[16]
T. Graepel, K. Lauter, and M. Naehrig. Ml con dential: Machine learning on encrypted data. In Information Security and Cryptology--ICISC 2012, pages 1--21. Springer, 2013.
[17]
L. Guo, Y. Fang, M. Li, and P. Li. Veri able privacy-preserving monitoring for cloud-assisted mhealth systems. In Computer Communications (INFOCOM), 2015 IEEE Conference on, pages 1026--1034. IEEE, 2015.
[18]
E. Lau, F. S. Mowat, M. A. Kelsh, J. C. Legg, N. M. Engel-Nitz, H. N. Watson, and et al. Use of electronic medical records (emr) for oncology outcomes research:assessing the comparability of emr information to patient registry and health claims data. In Clinical Epidemiology, 2011.
[19]
S. Laur, H. Lipmaa, and T. Mielikainen. Cryptographically private support vector machines. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 618--624. ACM, 2006.
[20]
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. Parallel and Distributed Systems, IEEE Transactions on, 24(1):131--143, 2013.
[21]
H. Lin, J. Shao, C. Zhang, and Y. Fang. Cam: cloud-assisted privacy preserving mobile health monitoring. volume 8, pages 985--997. IEEE, 2013.
[22]
M. Mailman, M. Feolo, Y. Jin, M. Kimura, K. Tryka, R. Bagoutdinov, and et al. The ncbi dbgap database of genotypes and phenotypes. In National Genetology, 2007.
[23]
S. Roy and M. Chuah. Secure data retrieval based on ciphertext policy attribute-based encryption (cp-abe) system for the dtns. Technical report, Citeseer, 2009.
[24]
A. Sahai and B. Waters. Fuzzy identity-based encryption. In Advances in Cryptology--EUROCRYPT 2005, pages 457--473. Springer, 2005.
[25]
D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, pages 44--55. IEEE, 2000.
[26]
J. Sun, X. Zhu, C. Zhang, and Y. Fang. Hcpp: Cryptography based secure ehr system for patient privacy and emergency healthcare. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 373--382. IEEE, 2011.
[27]
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pages 71--82. ACM, 2013.
[28]
M. J. Tildesley, T. A. House, M. C. Bruhn, R. J. Curry, M. ONeil, J. E. Allpress, and et al. Impact of spatial clustering on disease transmission and optimal control. In Proceedings of National Academy Science, 2010.
[29]
C. Wang, K. Ren, S. Yu, and K. M. R. Urs. Achieving usable and privacy-assured similarity search over outsourced cloud data. In INFOCOM, 2012 Proceedings IEEE, pages 451--459. IEEE, 2012.
[30]
C. Wang, B. Zhang, K. Ren, J. M. Roveda, C. W. Chen, and Z. Xu. A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. In INFOCOM, 2014 Proceedings IEEE, pages 2130--2138. IEEE, 2014.
[31]
K. Xu, C. Wen, Q. Yuan, X. He, and J. Tie. A mapreduce based parallel svm for email classi cation. volume 9, pages 1640--1647, 2014.

Cited By

View all
  • (2022)PPDDS: A Privacy-Preserving Disease Diagnosis Scheme Based on the Secure Mahalanobis Distance Evaluation ModelIEEE Systems Journal10.1109/JSYST.2021.309341516:3(4552-4562)Online publication date: Sep-2022
  • (2017)Incentivising high quality crowdsourcing clinical data for disease predictionProceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies10.5555/3204094.3204121(185-194)Online publication date: 17-Jul-2017
  • (2017)Incentivising High Quality Crowdsourcing Clinical Data for Disease Prediction2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)10.1109/CHASE.2017.77(185-194)Online publication date: Jul-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
May 2016
958 pages
ISBN:9781450342339
DOI:10.1145/2897845
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. PHR
  2. cloud computing
  3. data mining
  4. fuzzy keyword
  5. query privacy

Qualifiers

  • Research-article

Funding Sources

  • US National Science Foundation

Conference

ASIA CCS '16
Sponsor:

Acceptance Rates

ASIA CCS '16 Paper Acceptance Rate 73 of 350 submissions, 21%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)2
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)PPDDS: A Privacy-Preserving Disease Diagnosis Scheme Based on the Secure Mahalanobis Distance Evaluation ModelIEEE Systems Journal10.1109/JSYST.2021.309341516:3(4552-4562)Online publication date: Sep-2022
  • (2017)Incentivising high quality crowdsourcing clinical data for disease predictionProceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies10.5555/3204094.3204121(185-194)Online publication date: 17-Jul-2017
  • (2017)Incentivising High Quality Crowdsourcing Clinical Data for Disease Prediction2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)10.1109/CHASE.2017.77(185-194)Online publication date: Jul-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media