Enhancing K-Clustering based Privacy Preserving for E-Healthcare IoT Systems

Authors

  • P. Umaeswari Associate Professor, Department of Computer Science and Business Systems, R.M.K. Engineering College, Chennai
  • G. Gayathiri Devi Associate Professor, Department of Science and Humanities, R.M.D. Engineering College, Kavaraipettai, Thiruvallur District, Tamil Nadu, India.
  • Gomathi. C Assistant Professor. Department of AI & DS, Panimalar Engineering College, Chennai.
  • Anusuri Krishna Veni Assistant Professor, Department of Computer Science & Engineering - Data Science, Madanapalle Institute of Technology & Science, Kadiri Road, Angallu, Madanapalle- 517325, Andhra Pradesh, India.
  • K. B. Kishore Mohan Associate Professor, Department of Bio Medical Engineering, Saveetha Engineering College, Chennai

Keywords:

Privacy-Preserving, e-Healthcare, Internet of Things (IoT), Clustering, K-means, K-medoid, K-Anonymity

Abstract

New technologies in the cloud, social media, the Internet of things (IoT), and E-healthcare systems all need privacy protection. Health and medical records, in terms of strategy, include images and health records about patients, and all personal details must be kept private to protect patients' privacy. Standard encryption systems for textual and structural one-dimensional data could not be specifically extended to e-health data due to weaknesses of digital data structures. When medical data is exchanged in the general public for various study purposes, an effective data retention system with minimum information loss is needed. This research has suggested a medical healthcare IoT’s-driven infrastructure with limited access based on the inspiration. Three techniques are used in the infrastructure. The first technique preserves a patient's sensitive information by quantifying the least amount of information lost during the anonymization phase. Based on the clustering principle, the technique has also designed data access that provides the public, doctors, and nurses access to a patient's sensitivity information. K-anonymity privacy protection depends on local encryption, which is based on cell suppression, which is the second suggested technique. This approach employs a mapping approach to divide the data into various regions in such a way that data from the same population is grouped. Finally, data processing techniques (such as k-means) are often used to filter data obtained from wireless sensor networks to make medical recommendations to doctors and patients. Many approaches, on the other hand, face a risk of data loss during the data handling process. Extensive simulations are used to compare the proposed algorithm's efficiency to that of the state-of-the-art algorithm. Simulation findings show that the suggested algorithms are beneficial in terms of an effective cluster forming in a small amount of time, minimal data loss, and data propagation execution time.

Downloads

Download data is not yet available.

References

Guo, X., Lin, H., Wu, Y., & Peng, M. (2020). A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems. Future Generation Computer Systems, 113, 407-417.

Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). Security and privacy in the medical internet of things: a review. Security and Communication Networks, 2018.

Tang, J., Liu, A., Zhao, M., & Wang, T. (2018). An aggregate signature-based trust routing for data gathering in sensor networks. Security and Communication Networks, 2018.

Sun, W., Cai, Z., Liu, F., Fang, S., & Wang, G. (2017, October). A survey of data mining technology on electronic medical records. In 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom) (pp. 1-6). IEEE.

Ullah, F., Ullah, I., Khan, A., Uddin, M. I., Alyami, H., & Alosaimi, W. (2020). Enabling Clustering for Privacy-Aware Data Dissemination Based on Medical-Healthcare-IoTs (MH-IoTs) for Wireless Body Area Network. Journal of Healthcare Engineering, 2020.

Xue, W., Yu, K., Hua, X., Li, Q., Qiu, W., & Zhou, B. (2018). APs’ virtual positions-based reference point clustering and physical distance-based weighting for indoor Wi-Fi positioning. IEEE Internet of Things Journal, 5(4), 3031-3042.

Zhao, P., Jiang, H., Lui, J. C., Wang, C., Zeng, F., Xiao, F., & Li, Z. (2018). P 3-LOC: A privacy-preserving paradigm-driven framework for indoor localization. IEEE/ACM Transactions on Networking, 26(6), 2856-2869.

Saadatfar, H., Khosravi, S., Joloudari, J. H., Mosavi, A., & Shamshirband, S. (2020). A new K-nearest neighbors classifier for big data based on efficient data pruning. Mathematics, 8(2), 286.

Kanungo, T., Mount, D. M., Netanyahu, N. S., Piatko, C. D., Silverman, R., & Wu, A. Y. (2002). An efficient k-means clustering algorithm: Analysis and implementation. IEEE transactions on pattern analysis and machine intelligence, 24(7), 881-892.

Ortiz, A. M., Hussein, D., Park, S., Han, S. N., & Crespi, N. (2014). The cluster between internet of things and social networks: Review and research challenges. IEEE Internet of Things Journal, 1(3), 206-215.

Chen, M., Hao, Y., Hwang, K., Wang, L., & Wang, L. (2017). Disease prediction by machine learning over big data from healthcare communities. Ieee Access, 5, 8869-8879.

Xing, K., Hu, C., Yu, J., Cheng, X., & Zhang, F. (2017). Mutual privacy preserving $ k $-means clustering in social participatory sensing. IEEE Transactions on Industrial Informatics, 13(4), 2066-2076.

Baker, S. B., Xiang, W., & Atkinson, I. (2017). Internet of things for smart healthcare: Technologies, challenges, and opportunities. IEEE Access, 5, 26521-26544.

Vaidya, J., & Clifton, C. (2003, August). Privacy-preserving k-means clustering over vertically partitioned data. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 206-215).

Jha, S., Kruger, L., & McDaniel, P. (2005, September). Privacy preserving clustering. In European symposium on research in computer security (pp. 397-417). Springer, Berlin, Heidelberg.

Bunn, P., & Ostrovsky, R. (2007, October). Secure two-party k-means clustering. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 486-497).

Xing, K., Hu, C., Yu, J., Cheng, X., & Zhang, F. (2017). Mutual privacy preserving $ k $-means clustering in social participatory sensing. IEEE Transactions on Industrial Informatics, 13(4), 2066-2076.

Blum, A., Dwork, C., McSherry, F., & Nissim, K. (2005, June). Practical privacy: the SuLQ framework. In Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (pp. 128-138).

L.I. Yang, Guangzhou, China, research on differential privacy preserving k-means clustering, Comput. Sci. 1 (59) (2013) 1–34.

Chen, X., Ji, J., Luo, C., Liao, W., & Li, P. (2018, December). When machine learning meets blockchain: A decentralized, privacy-preserving and secure design. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 1178-1187). IEEE.

Hamza, R. (2017). A novel pseudo random sequence generator for image-cryptographic applications. Journal of Information Security and Applications, 35, 119-127.

Hu, H., Liu, L., & Ding, N. (2013). Pseudorandom sequence generator based on the Chen chaotic system. Computer Physics Communications, 184(3), 765-768.

Özkaynak, F., & Yavuz, S. (2013). Security problems for a pseudorandom sequence generator based on the Chen chaotic system. Computer Physics Communications, 184(9), 2178-2181.

Hua, Z., & Zhou, Y. (2016). Image encryption using 2D Logistic-adjusted-Sine map. Information Sciences, 339, 237-253.

Muhammad, K., Sajjad, M., & Baik, S. W. (2016). Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. Journal of medical systems, 40(5), 114.

Luo, E., Bhuiyan, M. Z. A., Wang, G., Rahman, M. A., Wu, J., & Atiquzzaman, M. (2018). Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems. IEEE Communications Magazine, 56(2), 163-168.

Samani, A., Ghenniwa, H. H., & Wahaishi, A. (2015). Privacy in Internet of Things: A model and protection framework. Procedia Computer Science, 52, 606-613.

Sharma, S., Chen, K., & Sheth, A. (2018). Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Computing, 22(2), 42-51.

Zhou, W., Jia, Y., Peng, A., Zhang, Y., & Liu, P. (2018). The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal, 6(2), 1606-1616.

Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., & Titouna, F. (2020). A privacy-preserving cryptosystem for IoT E-healthcare. Information Sciences, 527, 493-510.

Xu, J., Xue, K., Li, S., Tian, H., Hong, J., Hong, P., & Yu, N. (2019). Healthchain: A blockchain-based privacy preserving scheme for large-scale health data. IEEE Internet of Things Journal, 6(5), 8770-8781.

Ullah, F., Abdullah, A. H., Kaiwartya, O., Lloret, J., & Arshad, M. M. (2017). EETP-MAC: energy efficient traffic prioritization for medium access control in wireless body area networks. Telecommunication Systems, 1-23.

Ullah, F., Abdullah, A. H., Kaiwartya, O., & Cao, Y. (2017). TraPy-MAC: Traffic priority aware medium access control protocol for wireless body area network. Journal of medical systems, 41(6), 93.

Huang, M., Liu, A., Wang, T., & Huang, C. (2018). Green data gathering under delay differentiated services constraint for internet of things. Wireless Communications and Mobile Computing, 2018.

El Ouazzani, Z., & El Bakkali, H. (2018). A new technique ensuring privacy in big data: K-anonymity without prior value of the threshold k. Procedia Computer Science, 127, 52-59.

Fontaine, C., & Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 1-10.

Laurichesse, D., & Blain, L. (1991). Optimized implementation of RSA cryptosystem. Computers & Security, 10(3), 263-267.

T.-S. Lim, Haberman’s survival data set, 1999, http://archive.ics.uci.edu/ml/datasets/Haberman.

Downloads

Published

07.02.2024

How to Cite

Umaeswari, P. ., Devi, G. G. ., C, G. ., Veni, A. K. ., & Mohan, K. B. K. . (2024). Enhancing K-Clustering based Privacy Preserving for E-Healthcare IoT Systems. International Journal of Intelligent Systems and Applications in Engineering, 12(15s), 165–171. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4730

Issue

Section

Research Article