245 141
Full Length Article
Volume 4 , Issue 2 : Special Issue-RIDAPPH, PP: 16-30 , 2021

Title

A review on Privacy-Preserving Data Preprocessing

Authors Names :   Mukesh Soni1 *   1 *     YashKumar Barot2   2     S. Gomathi3   3  

1  Affiliation :  1*Smt. S. R. Patel Engineering College, Unjha , Gujarat, INDIA;

    Email :  soni.mukesh15@gmail.com


2  Affiliation :  2Smt. S. R. Patel Engineering College, Unjha , Gujarat, INDIA

    Email :  yashbarot6312@gmail.com


3  Affiliation :  3Research scholar, Research & Development Centre, Bharathiar University, Coimbatore INDIA

    Email :  gomathisrinivasan@gmail.com



Doi   :  DOI: 10.5281/zenodo.4014237

Received: May 7, 2020 Revised: July 30, 2020 Accepted: September 1, 2020

Abstract :

 

Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.

 

Keywords :

Privacy; information security; risk management; confidentiality; integrity; availability; HIPAA; anonymity; privacy appliance;

References :

 [1]Alberts C, Doroffe A. (2003). Managing Information Security Risks: The OCTAVE Approach.   Boston, MA, Addison-Wesley.

[2]Behlen, F.M., Johnson, S.B. (1999). "Multicenter Patient Records Research: Security Policies and Tools," JAm Med Inform Assoc. 6(6) 435-43.

[3]Berman, J.J. (2002). "Confidentiality Issues for Medical Data Miners," Artif Intell Med. 26(1-   2):25-36

[4]California Healthcare Foundation (1999). Medical Privacy and Confidentiality Survey Summary and Overview, http://www.chcf.org/documents/ihealth/survey.pdf

[5]Defense Advanced Research Project Agency (July 19, 2002). "Total Information Awareness Program (TIA) System Description Document (SDD)," Version 1.1.

[6]Department of Health and Human Services (July 13, 2004). Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule, (NIH Publication Number 03-5388), http://privacyruleandresearch.nih.gov/pr~02.asp

[7]Ferris, T.A., Garrison, G.M., Lowe, H.J. (2002). "A Proposed Key Escrow System for Secure Patient Information Disclosure in Biomedical Research Databases," in Proc AMIA Symp. 245-9.

[8]Goldman, J. and Hudson, Z. (2000). "Perspective Virtually Exposed: Privacy and E-Health," Health Affairs, 19(6), 140-8.

[9]Goodwin, L.K. and Prather, J.C. (2002). "Protecting Patient Privacy in Clinical Data Mining," J Healthc Inf Manag, 16(4):62-7.

[10]Islan, M.Z., and Brankovic, L., A. (2004). "Framework for Privacy Preserving Classification in Data Mining, School of Electrical Engineering and Computer Science," Australasian Computer Science Week.

[11]Lowrance, W. (2002). "Learning from Experience: Privacy and the Secondary Use of Data in Health Research," The Nuffield Trust; www.mffield trust.0rg.uk

[12]Meany, M.E. (2001). "Data Mining, Dataveillance, and Medical Information Privacy," in Privacy in Health Care. J, Humber, ed., Humana Press, pp. 145-164.

[13]Murphy, S.N., Chueh, H.C. (2002). "A Security Architecture for Query Tools Used to Access Large Biomedical Databases," in Proc AMIA Symp. 552-6.

[14]Oliveira, S.R.M., Zalane, O.R. (2003). "Protecting Sensitive Knowledge by Data Sanitization," in Proceedings of the Third ZEEE International Conference on Data Mining, Melbourne, Florida, USA, 613-616

[15]Burghard C. Big data and analytics key to accountable care success. Framingham: IDC Health Insights; 2012

[16]Fernandes L, O’Connor M, Weaver V. Big data, bigger outcomes. J AHIMA. 2012;83:38–42.

[17]David Houlding, MSc, CISSP. Health Information at Risk: Successful Strategies for Healthcare Security and Privacy. Healthcare IT Program Of ce Intel Corporation, white paper. 2011.

[18]South Tyneside NHS Foundation Trust. Harnessing analytics for strategic planning, operational decision making and end‑to‑end improvements in patient care. IBM Smarter Planet brief. 2013.

[19]Indiana Health Information Exchange. http://www.ihie.org/. Accessed 24 Mar 2016.

[20]Transforming healthcare through big data, strategies for leveraging big data in the healthcare industry. Institute for Health. 2013.

[21]General Dynamics Health Solutions white paper UK. “Securing Big Health Data”©2015. http://gdhealth.com/globalassets/health‑solutions/documents/brochures/securing‑big‑health‑data_‑white‑paper_UK.pdf.

[22]Zhang R, Liu L. Security models and requirements for healthcare application clouds. In: IEEE 3rd international confer‑ ence on cloud computing. 2010

[23]Linden H, Kalra D, Hasman A, Talmon J. Inter‑organization future proof HER systems—a review of the security and privacy related issues. Int J Med Inform. 2009;78:141–60.

[24]Marchal S, Xiuyan J, State R, Engel T. “A big data architecture for large scale security monitoring”, Big Data (BigData Congress), Anchorage, AK. 2014. p. 56–63.

[25]Duygu ST, Ramazan T, Seref S. A survey on security and privacy issues in big data. In: The 10th international confer‑ ence for internet technology and secured transactions (ICITST‑2015).

[26]Liu L, Lin J. Some special issues of network security monitoring on big data environments. Dependable, Autonomic and Secure Computing (DASC), Chengdu. 2013. p. 10–5.

[27]Big Data security and privacy issues in healthcare—Harsh KupwadePatil, Ravi Seshadri. 2014.

[28]Sectoral healthcare strategy 2012–2016‑Moroccan healthcare ministry.

[29]Patil P, Raul R, Shroff R, Maurya M. Big data in healthcare. 2014.

[30]Samrati P. Protecting respondents identities in microdata release. IEEE Trans Knowl Data Eng. 2001;13:1010–27.

[31]Samarati P. Protecting respondent’s privacy in microdata release. IEEE Trans Knowl Data Eng. 2001;13(6):1010–27.

[32]Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. L‑diversity: privacy beyond k‑anonymity. In: Proc. 22nd international conference data engineering (ICDE). 2006. p. 24.

[33]Chawala S, Dwork C, Sheny FM, Smith A, Wee H. Towards privacy in public databases. In: Proceedings on second theory of cryptography conference. 2005.

[34]Sweeney L. K‑anonymity: a model for protecting privacy. Int J Uncertain Fuzziness. 2002;10(5):557–70.

[35]Meyerson A, Williams R. On the complexity of optimal k‑anonymity. In: Proc. of the ACM Symp. on principles of database systems. 2004.

[36]Mehmood A, Natgunanathan I, Xiang Y, Hua G, Guo S. Protection of big data privacy. In: IEEE translations and con‑ tent mining are permitted for academic research. 2016.

[37]Mohammadian E, Noferesti M, Jalili R. FAST: fast anonymization of big data streams. In: ACM proceedings of the 2014 international conference on big data science and computing, article 1. 2014.

[38]Xu K, Yue H, Guo Y, Fang Y. Privacy‑preserving machine learning algorithms for big data systems. In: IEEE 35th international conference on distributed systems. 2015.

[39]Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV. Security and privacy for storage and computation in cloud computing. Inf Sci. 2014;258:371–86.

[40]Behlen FM, Johnson SB. Multicenter patient records research security policies and tools. J Am Med Inform Assoc 1999;6(6):435–43.

[41]Berman JJ, Moore GW, Hutchins GM. Maintaining patient confidentiality in the public domain internet autopsy database. J Am Med Inform Assoc (JAMIA), Symp. Suppl. 1996;328–32.

[42]Bouzelat H, Quantin C, Dusserre L. Extraction and anonymity protocol of medical file. Proc AMIA Annu Fall Symp 1996;323–27.

[43]Department of Health and Human Services. 45 CFR (Code of Federal Regulations), Parts 160 through 164. Standards for Privacy of Individually Identifiable Health Information (Final Rule). Federal Register: vol. 65, number 250, 28 December 2000. p. 82461–510.

[44]Department of Health and Human Services. 45 CFR (Code of Federal Regulations), 46. Protection of Human Subjects (Common Rule). Federal Register, vol. 56, 18 June 1991. p. 28003.

[45]Duygu ST, Ramazan T, Seref S. A survey on security and privacy issues in big data. In: The 10th international confer‑ ence for internet technology and secured transactions (ICITST‑2015).

[46]Li N, et al. t‑Closeness: privacy beyond k‑anonymity and L‑diversity. In: Data engineering (ICDE) IEEE 23rd interna‑ tional conference. 2007

[47]Ton A, Saravanan M. Ericsson research. http://www.ericsson.com/research‑blog/data‑knowledge/big‑data‑privacy‑preservation/2015

[48]Samarati P. Protecting respondent’s privacy in microdata release. IEEE Trans Knowl Data Eng. 2001;13(6):1010–27.

[49]Sweeney L. K‑anonymity: a model for protecting privacy. Int J Uncertain Fuzziness. 2002;10(5):557–70.

[50]Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. L‑diversity: privacy beyond k‑anonymity. In: Proc. 22nd international conference data engineering (ICDE). 2006. p. 24.

[51]Samarati P, Sweeney L. Protecting privacy when disclosing information: k‑anonymity and its enforcement through generalization and suppression. Technical Report SRI‑CSL‑98‑04, SRI Computer Science Laboratory. 1998.

[52]Samarati P. Protecting respondent’s privacy in microdata release. IEEE Trans Knowledge Data Eng. 2001;13(6):1010–27.

[53]Abhishek Anand, Abhishek Raj, Rashi Kohli, Dr. Vimal Bibhu: Proposed Symmetric Key Cryptography Algorithm for Data Security.In:1st International Conference on Innovation and Challenges in Cyber Security (ICECCS 2016).

[54]Deeksha Priya Jha, Rashi Kohli, Archana Gupta: Proposed Encryption Algorithm for Data Security Using Matrix Properties.In: 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016).

[55]Garima arora, P.Lakshmi Pavani, Rashi Kohli, Dr. Vimal Bibhu: Multimodal Biometrics For Improvised Security.In: 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016).

[56]Preeti Chourasia, Rashi Kohli, Archal Garg:Biometrics Minutiae Detection and Feature Extraction, In: Lambert Academic Publishing.