Body Sensor Network Processing Mechanism for Micro-Data Security Publishing

Article Preview

Abstract:

Individuals’ privacy protection when publishing data for research has recently put great attention on data mining and information resources sharing fields. Privacy preservation is an important and challenging problem in micro-data publishing. This paper aimed to find an available directly way protect patient privacy. Processing numeric values which got from body sensor network (BSN). Firstly, we analyze the characteristics of medical data which collected from BSN, and then the records will be grouped according to the Quasi-identifier. The last step is to inspect the diversity of sensitive attributes.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1049-1050)

Pages:

1536-1539

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] FAN Yong-Jian, CHEN Hong, ZHANG Xiao-Ying Data Privacy Preservation in Wireless Sensor Networks, vol. 35. Chinese journal of computers, (2012).

Google Scholar

[2] F. Kohlmayer et al., Highly efficient optimal k-anonymity for biomedical datasets, in Proc. 25th IEEE Int. Symp. on Computer-Based Medical Systems, (2012).

DOI: 10.1109/cbms.2012.6266366

Google Scholar

[3] Smith, B., Austin, A., Brown, M., King, J., Lankford, J., Meneely, A., Williams, L. (2010).

Google Scholar

[4] Weber-Jahnke, J. H. And Obry, C. (2011) Protecting Privacy During Peer-To-Peer Exchange of Medical Documents, Info Syst Front, LLC (2011).

DOI: 10.1007/s10796-011-9304-2

Google Scholar

[5] F. K. Dankar and K. E. Emam, The application of differential privacy to health data, in EDBT/ICDT Workshops: The 5th Int. Workshop on Privacy and Anonymity in the Infrom. Soc., (2012).

DOI: 10.1145/2320765.2320816

Google Scholar

[6] Perera, G., Holbrook, A., Thabane L., Foster, G., and Willison, D. J. (2011).

Google Scholar

[7] Groat M M, He W B, Forrest S, KIPAD: k-indistinguishable privacy-preserving data aggregation in wireless sensor network/Proceedings of 30th IEEE International Conference on Computer Communications . Shanghai, China, 2011: 2014-(2032).

DOI: 10.1109/infcom.2011.5935010

Google Scholar

[8] Stavros Papadopoulos, Aggelos Kiayias, Dimitris Papadias. Secure and efficient in-network processing of exact SUM queries/Procesdings of the 27th International Conference on Data Engineering. Hannover, Germany, 2011: 517-528.

DOI: 10.1109/icde.2011.5767886

Google Scholar