Abstract

There is a need to develop an effective data preservation scheme with minimal information loss when the patient's data are shared in public interest for different research activities. Prior studies have devised different approaches for data preservation in healthcare domains; however, there is still room for improvement in the design of an elegant data preservation approach. With that motivation behind, this study has proposed a medical healthcare-IoTs-based infrastructure with restricted access. The infrastructure comprises two algorithms. The first algorithm protects the sensitivity information of a patient with quantifying minimum information loss during the anonymization process. The algorithm has also designed the access polices comprising the public access, doctor access, and the nurse access, to access the sensitivity information of a patient based on the clustering concept. The second suggested algorithm is K-anonymity privacy preservation based on local coding, which is based on cell suppression. This algorithm utilizes a mapping method to classify the data into different regions in such a manner that the data of the same group are placed in the same region. The benefit of using local coding is to restrict third-party users, such as doctors and nurses, when trying to insert incorrect values in order to access real patient data. Efficiency of the proposed algorithm is evaluated against the state-of-the-art algorithm by performing extensive simulations. Simulation results demonstrate benefits of the proposed algorithms in terms of efficient cluster formation in minimum time, minimum information loss, and execution time for data dissemination.

Highlights

  • Academic Editor: Shah Nazir ere is a need to develop an effective data preservation scheme with minimal information loss when the patient’s data are shared in public interest for different research activities

  • Different biomedical sensors (BMSs) are installed on the patient’s body and inside the patient’s body, and some BMSs are placed around the patient’s body to monitor different physical activities. ese BMSs monitor patient’s vital signs, and the monitored data are transmitted to the body coordinator, which is responsible to immediately transmit all the patient’s health information to the physicians in real time, and if an emergency situation is detected, the physician will instantly inform the patient through the computer system by sending suitable messages or alarms. e whole scenario is implemented on the Journal of Healthcare Engineering

  • This paper proposes a clustering mechanism for privacy-aware data dissemination based on medical healthcare-IoTs (MH-IoTs) for wireless body area network. e proposed mechanism is compared with different machine learning algorithms using standard datasets for patient’s data privacy when a medical doctor reviews her health report

Read more

Summary

Related Work

Numerous studies have been presented on patient data privacy based on the medical healthcare-IoTs (MH-IoTs) infrastructure. is paper [7] has focused on data privacy issues in social networks. e study highlighted the privacy issues of the nodes deployed in the networks. E patient’s data privacy problem has been handled with cloud computing by sharing the reading of vital signs to medical staff via the protected IoT environment. The implementation of fog computing has improved the connectivity problems, but there is a need to efficiently handle data privacy in fog-based IoT deployment. E efficient design of MAC superframe structure is presented in [28] for controlling the nonemergency data with enhanced performances These papers have not considered handling the patients’ data from multiple environments. Us, the existing studies on the data privacy of patient’s health monitoring-based IoT dissemination have motivated to design and develop efficient mechanisms with required minimum time for data transmission with high data privacy These papers have not considered handling the patients’ data from multiple environments. e anonymization problem has validated through mathematical testing for cluster formation and information exchange [29, 30]. us, the existing studies on the data privacy of patient’s health monitoring-based IoT dissemination have motivated to design and develop efficient mechanisms with required minimum time for data transmission with high data privacy

The Proposed Work
K-medoid cost is given as follows:
Phase 2
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call