4.5 Article

An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services

Journal

PEER-TO-PEER NETWORKING AND APPLICATIONS
Volume 14, Issue 3, Pages 1629-1649

Publisher

SPRINGER
DOI: 10.1007/s12083-021-01077-7

Keywords

Privacy-preserving; IoT; Healthcare data; Anonymization; K-anonymity; Data collection

Ask authors/readers for more resources

The healthcare services industry has undergone significant changes with the rise of IoT, leading to concerns about privacy of patient data. By utilizing a clustering-based anonymity model, an efficient privacy-preserving scheme has been proposed to address privacy concerns and prevent various attacks in healthcare IoT systems.
The healthcare services industry has seen a huge transformation since the prominent rise of the Internet of Things (IoT). IoT in healthcare services includes a large number of unified and interconnected sensors, and medical devices that generate and exchange sensitive information. Thus, an enormous amount of data is transmitted through the network which raises an alarming concern for the privacy of patient information. Therefore, privacy preserving data collection (PPDC) is on-demand to ensure the privacy of patient data. Several pieces of research on PPDC have been proposed recently. However, the research literatures have fallen short in privacy requirements and are prone to various privacy attacks. In this paper, we propose a novel privacy-preserving data collection scheme for IoT based healthcare services systems. A clustering-based anonymity model is utilized to develop an efficient privacy-preserving scheme to meet privacy requirements and to prevent healthcare IoT from various privacy attacks. We formulated the threat model as client-server-to-user to ensure privacy on both ends. On the client-side, a modified clustering-based k-anonymity model with alpha-deassociation is used to anonymize the data generated from the IoT nodes. The base-level privacy is then ensured through a bottom-up clustering method which generates clusters of records as per the privacy requirements. On the server-side, the cluster-combination method-UPGMA is utilized to reduce communication costs and to achieve a better level of privacy. The proposed scheme is efficient in tackling privacy attacks such as attribute disclosure, identity disclosure, membership disclosure, sensitivity attacks, similarity attacks, and skewness attacks. The effectiveness and efficiency of the proposed scheme are proven through theoretical and experimental analyses.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available