2017
DOI: 10.1016/j.future.2016.11.028
|View full text |Cite
|
Sign up to set email alerts
|

Aggregating privatized medical data for secure querying applications

Abstract: My heartfelt gratitude is due to Prof. Lynn Margaret Batten for her guidance throughout my candidature. It is my great honor to be a student of such a fantastic supervisor, an excellent mentor, and a professional scholar. Her kindness, wisdom, strong passion and determination have strongly shaped my attitudes, behaviors, and habits towards both research and life. I have been enjoying every moment since she introduced me to the topics of data aggregation, querying of public data sets in shared environment, priv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 171 publications
(364 reference statements)
0
5
0
Order By: Relevance
“…Dataset anonymization via synthetic data generation attempts to balance disclosure risk and data utility in the final synthetic dataset. The goal is to ensure observations are not identifiable and the relevant data mining tasks are not compromised [108,109].…”
Section: Privacymentioning
confidence: 99%
“…Dataset anonymization via synthetic data generation attempts to balance disclosure risk and data utility in the final synthetic dataset. The goal is to ensure observations are not identifiable and the relevant data mining tasks are not compromised [108,109].…”
Section: Privacymentioning
confidence: 99%
“…Implementation of two fish encryption algorithm is shown in fig 2 . Fig. 2: Implementation of two fish Cryptographic Implementation steps of Two Fish Cryptographic algorithm is given below [28][29][30]:…”
Section: Implementation Of Two Fish Algorithmmentioning
confidence: 99%
“…To guarantee the security and data privacy over a patient's data, we should implement a smart storage method which include the smart IoT-based healthcare architecture is discussed in [27]. Other solutions for sharing delicate medical data on several methods like medical data accumulation of non-standard diagonal method was suggested in [28], sharing of medical data with a cloud-based model used in [29], a hybrid solution of sharing medical data in [30,31], storage structure of scalable privacy with data preserving scheme [32], a secure system using a fog computation technique in [33], and a distributed based architecture with doubles tag micro aggregation scheme in [34] are implemented. The main problems among these techniques are computational complexity and more time consumption.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2010 a survey on PPDP [5] discussed common privacy preservation models and their support for different types of attack, anonymisation techniques and information utility metrics. Anonymisation techniques seek to balance the trade-off between disclosure risk and data utility in the final published data, rendering a modified version of the original dataset in such a way that individuals are no longer identifiable [6,7]. However, the utility of data anonymised using these methods is often adversely impacted and the data remains susceptible to disclosure [8].…”
Section: Introductionmentioning
confidence: 99%