Literature DB >> 30496200

Privacy-preserving aggregation of personal health data streams.

Jong Wook Kim1, Beakcheol Jang1, Hoon Yoo2.   

Abstract

Recently, as the paradigm of medical services has shifted from treatment to prevention, there is a growing interest in smart healthcare that can provide users with healthcare services anywhere, at any time, using information and communications technologies. With the development of the smart healthcare industry, there is a growing need for collecting large-scale personal health data to exploit the knowledge obtained through analyzing them for improving the smart healthcare services. Although such a considerable amount of health data can be a valuable asset to the smart healthcare fields, they may cause serious privacy problems if sensitive information of an individual user is leaked to outside users. Therefore, most individuals are reluctant to provide their health data to smart healthcare service providers for data analysis and utilization purpose, which is the biggest challenge in smart healthcare fields. Thus, in this paper, we develop a novel mechanism for privacy-preserving collection of personal health data streams that is characterized as temporal data collected at fixed intervals by leveraging local differential privacy (LDP). In particular, with the proposed approach, a data contributor uses a given privacy budget of LDP to report a small amount of salient data, which are extracted from an entire health data stream, to a data collector. Then, a data collector can effectively reconstruct a health data stream based on the noisy salient data received from a data contributor. Experimental results demonstrate that the proposed approach provides significant accuracy gains over straightforward solutions to this problem.

Entities:  

Mesh:

Year:  2018        PMID: 30496200      PMCID: PMC6264901          DOI: 10.1371/journal.pone.0207639

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


Introduction

In recent years, with the development of information and communications technologies, smart healthcare services, focused on disease prevention and health promotion by continuously monitoring users’ health and providing real-time customized service, are receiving significant attention. The basic structure of smart healthcare is that service providers collect data generated by individual users in their daily lives and by medical institutions about patients and then provide customized advice and treatment to users based on the knowledge obtained through analyzing a large amount of collected data. With a rapidly aging society, increased medical burden due to chronic illnesses and increased interest in health due to abnormal climate conditions around the world, the demand for smart healthcare service is expected to continue to increase in the future. Along with the development of the internet of things (IoT) technology, wearable devices based on IoT are being actively developed and used. In particular, the technology development of wearable devices that can continuously monitor human activity and bio-signals using sensors has played a major role in the development of the smart healthcare industry. For example, with the wide spread use of wearable devices having various bio sensors, it is possible to easily measure and monitor diverse health data such as blood glucose levels, blood pressure, oxygen saturation, heart rate, and body temperature of individuals. This, in turn, makes it possible to provide an alarm service, notifying in advance the risk of disease outbreak to users by collecting and analyzing vast amount of health data based on individual activities of daily living. The development of the smart healthcare industry brings forth a need for collecting large-scale personal health data in order to leverage the knowledge obtained through analyzing such data for improving smart healthcare services. For example, Apple Health [1], Google Fit [2], and Samsung S-Health [3] aggregate vast amounts of health-related data using smartphones and wearable devices such as a smartwatch and smartband. A telecare medicine information system, which is widely used to provide remote medical care to a patient [4], continuously monitors and collects the patient’s health data through various physiological signal monitoring systems. Serious concerns of data privacy have been raised in many areas over the past few years. One of the most representative areas is that of privacy in a cloud environment. In this environment, user data are typically stored on cloud servers, which are often outside of a trusted domain [5]. Even though a large collection of health data is a valuable asset to the smart healthcare field, similar data privacy concerns are raised. That is, indiscriminate collection of personal health data can cause significant privacy issues; sensitive information of individual users can be deduced by tracking and analyzing health data. Hence, most users do not agree to their health data being collected for the purposes of data analysis and utilization. This presents a major obstacle for the development of smart healthcare services. Fig 1 illustrates the motivational scenario of this research where a smart healthcare service provider wants to collect and analyze a large volume of health data to obtain heart rate changes of individuals with desk jobs with the aim of enhancing the quality of healthcare service customized for them. However, considering that individual are reluctant to provide their sensitive health data, to support such a service provider’s requirement, it is essential to develop methods capable of collecting individuals’ health data, while preserving their privacy.
Fig 1

A motivational example.

The goal in this paper is to develop a novel mechanism for privacy-preserving collection of individual health data streams generated from smart healthcare sensors by leveraging local differential privacy (LDP). LDP is a state-of-the-art approach that is used to protect individual privacy during the process of data collection [6]. The basic idea of the LDP is that a data contributor adds carefully designed random noises to the original data and sends the noisy data to a data collector, guaranteeing that the data contributor’s original data is not leaked during the data collection process. With the growing popularity of LDP, there have been extensive studies to leverage LDP for collecting individuals’ sensitive data, generated in diverse application domains, in a privacy-preserving manner [7-16]. However, these existing approaches focus on the collection of individual data represented as bit-strings where each bit corresponds to either 0 or 1, and thus they are not applicable for collecting individual health data that is usually represented as a stream (or time series). Thus, in this paper, we propose a novel mechanism for collecting individual health data, which is characterized as temporal data collected at fixed intervals, by leveraging LDP.

Related work

Recently, LDP has begun to attract attention as a promising way of guaranteeing individual privacy in the process of data collection. RAPPOR, which is one of the most representative data collection mechanisms based on LDA, was implemented in Google Chrome to collect user data [6]. Fanti et al. introduced a new algorithm to estimate the joint distribution between unknown variables by extending RAPPOR [7]. Apple has also leveraged LDP to collect user data, including new words, emojis, deeplinks, and lookup hints inside notes [8]. Recently, the differential privacy team in Apple introduced details of LDP deployment, which enabled the collection of large scale user data, including emojis, health data, and media playback preferences [9]. Ding et al. presented new LDP mechanisms for the repeated collection of counter data, which has been deloyed with Microsoft Windows Insiders [10]. LDP can be used for diverse application domains to collect user data while preserving privacy. [11-13] proposed a method for estimating heavy hitters over set-valued data. The proposed method in [12] consists of two phases: a candidate set selection phase that uses a portion of the privacy budget, and a refining phase that selects heavy hitters from the candidate set by leveraging the remaining privacy budget. In [13], LDP protocols to find out heavy hitters in a large domain was presented, where user are divided into groups, and each group reports a prefix of her value. [14] proposed the optimized local hashing protocol that can provides better accuracy than RAPPOR. Harmony, an advanced data analytics tool, based on LDP, supports the collection and analysis of user data in Samsung smartphones [15]. Kim et al. presented a method to estimate the density of a specific location in an indoor space by leveraging LDP [16]. [17] introduced a new technique for LDP to collect and track evolving local data, making it possible to maintain up-to-date statistics over time. In [18], the method for releasing low-order (2-way and 3-way) marginal statistic on population under LDP was developed. With a growing need to share big data containing information regarding an individual entity, privacy-preserving data publishing (PPDP) has been extensively studied to share big data containing personal information for public use, while preserving the privacy of the individual. Various privacy models have been studied, including k-anonymity [19], l-diversity [20], and t-closeness [21]. Accordingly, research on privacy preserving data publishing methods for electronic health data has been actively conducted during the past decade. Kim et al. presented a delay-free method for publishing electronic health data streams, while preserving the privacy [22]. In [23], a utility-preserving anonymization method for PPDP was proposed. The proposed method in [23] preserves the utility of health data by inserting counterfeit record and creating catalog of the counterfeit records in the process of data anonymization. [24] presented the cost model that quantifies the trade-off between privacy and data utility in health data publishing. A comprehensive survey of privacy-preserving health data publishing can be found in [25].

Background: Local differential privacy

Unlike differential privacy (DP) which was designed for the data-sharing purpose [26-33], LDP is the state-of-the-art approach to protect individual privacy in the process of data collection. The basic concept of LDP is that a data contributor adds carefully designed noises to her/his original data and sends the noisy data to a data collector, guaranteeing that the data contributor’s original data is not exposed to the outside of the data contributor devices. LDP is formally defined as follows: A randomized algorithm A satisfies ϵ-differential privacy, if and only if for (1) all pairs of data contributor’s data v and v, and (2) any output O of A, the following equation holds [6]: That is, regardless of the data that a data collector receives from a data contributor, the collector is not possible to speculate with high confidence whether the contributor has sent v or v. The privacy budget, ϵ, controls the level of privacy such that smaller values of ϵ enforce a stronger privacy guarantee, adding larger noises to the original data, while larger values of ϵ provide a weaker privacy guarantee, adding smaller noises to the original data. LDP follows the sequential composition property of differential privacy [12]. That is, given an available privacy budget ϵ, the data contributor can partition it into w smaller privacy budgets, ϵ1, ϵ2, ⋯, ϵ, such that and use each smaller privacy budget to report his/her local data to a data collector.

Problem definition and straightforward solution

Health data generated from wearable health devices are generally characterized as temporal data collected at fixed intervals. For example, the blue plot in Fig 2 represents the heart rate data of a person collected at fixed intervals over a certain period of time. Formally, let U = {u1, u2, ⋯, u} be the set of users (i.e., data contributors). Here, w corresponds to the total number of users. Then, the health data stream of the i-th user, u, can be represented as a sequence (or time series) s = ((t1, x1), (t2, x2), ⋯, (t, x)) of length n. Here, (t, x) represents the d-th point in the stream where x denotes the value measured by the wearable health device at timestamp, t. We further assume that x, which is measured by the specific sensor in a wearable health device, is within the predefined range [x, x].
Fig 2

An example of salient points extracted from a given sequence.

The blue curve represents the sequence of original health data. The point at which each red line parallel to the y-axis intersects the blue curve corresponds to a salient point.

An example of salient points extracted from a given sequence.

The blue curve represents the sequence of original health data. The point at which each red line parallel to the y-axis intersects the blue curve corresponds to a salient point. In this paper, we focus on the scenario of collecting health data streams measured at the same fixed intervals during the same period (e.g., collecting heart rates measured every minute during business hours) using LDP. In this case, a straightforward solution is that each user, u ∈ U, partitions the privacy budget, ϵ, into n smaller privacy budgets, , and uses each smaller privacy budget to generate a noisy sequence . Here, is obtained using the Laplace mechanism as follows: Note that Δs corresponds to the predefined sensitivity that is computed as Δs = x − x. Let be a set of (noisy) sequences received from w users. Once the data collector received the noisy sequences from all the users, she/he can estimate the average value of x at timestamp, t, by averaging all the noisy values of x in S: The expected error incurred by this estimation is known as [15], which is linearly proportional to the sequence length n. Thus, this scheme is not suitable when the sequence length, n, is large. Considering that the length of the sequence of a health data stream is typically large, this straightforward scheme is not suitable for our problem, owing to the high expected error.

Proposed approach

In this section, we describe the proposed scheme for collecting health data streams using LDP. As pointed earlier, the straightforward scheme may have an excessively high expected error, when the sequence length is large. To overcome this problem, in this paper, we propose a novel mechanism for collecting health data streams by leveraging LDP. Fig 3 shows an overview of the proposed approach that consists of the data contributor’s device-side and the data collection server-side processing.
Fig 3

An overview of the proposed approach.

The proposed approach can avoid a high expected error caused by the large sequence length by selecting and reporting a small amount of salient points to a data collector.

An overview of the proposed approach.

The proposed approach can avoid a high expected error caused by the large sequence length by selecting and reporting a small amount of salient points to a data collector. Data contributor’s device: The proposed method first identifies a small number of salient points from the sequence of a given health data stream, and then perturbs those points under LDP and reports noisy salient points to a data collection server. Data collection server: The proposed method reconstructs the sequence based on the noisy salient points received from the data contributor and stores it into a database for later use. We note that the proposed approach avoids a high expected error caused by the large sequence length by selecting a small number of salient points from the health data stream and applying the LDP mechanism to those points alone. We now explain and describe each of these steps in detail.

Data contributor’s device-side processing

Searching for salient points

Health data monitored by sensors in a wearable device are generally characterized as either remaining nearly constant or gradually increasing (or decreasing). For example, heart rate, oxygen saturation, and blood pressure of human beings remain nearly unchanged over long time periods of normal daily activities but gradually increase during unstable periods and then slowly decrease afterwards. Thus, given the sequence of health data, the objective of the first phase is to search for salient points where changes in the trends start. Given the sequence of the health data stream of the i-th user, s = ((t1, x1), (t2, x2), ⋯, (t, x)), let ds = ((t1, dx1), (t2, dx2), ⋯, (t, dx)) be a corresponding sequence of the same length, obtained by taking a first-order derivative on s. That is, dx (where 1 ≤ h ≤ n) is the first-order derivative of the sequence s at timestamp t. By taking the first-order derivative of the sequence, we can differentiate points belonging to increasing or decreasing periods (i.e., dx < 0 or dx > 0) from the ones that are in constant periods (i.e., dx = 0). As the objective of this phase is to search for salient points in the given sequence, we are interested in the case of dx ≠ 0 where 1 ≤ h ≤ n. However, given a sequence s of the length n, the number of points that satisfy the above condition can still be large. For example, Fig 2 illustrates the example of salient points extracted from a sequence of length 5,000. Here, the blue curve represents the sequence of original health data, s. In the figure, the point at which each red line parallel to the y-axis intersects the blue curve corresponds to a salient point. Note that in Fig 2(a), salient points are simply obtained by searching for points that satisfy the condition, dx ≠ 0 (where 1 ≤ h ≤ n), after taking a first-order derivative on s. As can be seen in this figure, the number of salient points identified using this scheme is still large. Thus, the next step minimizes the number of salient points by iteratively merging time intervals belonging to the same trend (i.e, either an increasing or a decreasing trend), which is presented in Fig 4. The algorithm starts with the sequence ds. In the initialization step, the algorithm sequentially scans each point in the sequence ds and inserts it into the list C, if the first-order derivative at that point is not zero (lines 1-7). Note that the points in C is sorted by timestamp in ascending order because points in ds are scanned in timestamp order in the initialization step.
Fig 4

Pseudo-code for searching salient points in a given sequence.

Given two adjacent points, (t, dx) and (t, dx), in C, the corresponding time interval between these two point is defined as |t − t|. The main idea of the algorithm in Fig 4 is to iteratively find and merge two adjacent time intervals belonging to the same trend (i.e, either an increasing or a decreasing trend), the summation of which is the shortest (lines 9-25). The iteration is terminated if the algorithm cannot find any two adjacent time intervals belonging to the same trend (lines 22-23). Finally, the algorithm returns the list, C, that contains salient points. Fig 2(b) shows salient points obtained by further merging time intervals belonging to the same trend using the algorithm in Fig 4. As can be seen in the figure, the number of salient points can be significantly reduced by the method described in Fig 4.

Reporting noisy salient points

Once the salient points are identified, the next step is to add random noise to each salient point based on the LDP mechanism, and then send the noisy salient points to the data collection server. Let be the set of salient points extracted from the sequence s as explained in the previous phase. Let further assume that the timestamp of salient points in SP satisfies the condition, . Then, this phase first partitions the privacy budget, ϵ, into r smaller privacy budgets, such as ϵ1, ϵ2, ⋯, ϵ, and then adds random noise, sampled from the Laplace distribution, to each salient point by consuming each partitioned privacy budget. As the probability density function of the Laplace distribution from which random noises are sampled is dependent on each privacy budget, ϵ (where 1 ≤ h ≤ r), in this paper, we introduce two different privacy budget partition schemes: uniform- and adaptive privacy budget partition. Uniform privacy budget partition: Given a privacy budget, ϵ, and a set of salient points , this scheme uniformly partitions the privacy budget into ϵ1, ϵ2, ⋯, ϵ such that the following condition holds: Adaptive privacy budget partition: Unlike uniform privacy budget partition, this scheme adaptively partitions a privacy budget based on the temporal scale of each salient point. As can be seen in Fig 2, each salient point covers a different temporal range. Let us consider three consecutive salient points, , , and . Then, the temporal scale, μ, of the h-th salient point, , is computed as Here, α is a predefined system parameter. Let further assume that μ is the summation of the temporal scale of each salient point in SP (i.e., μ = ∑1≤ μ). Then, this scheme partitions the privacy budget into ϵ1, ϵ2, ⋯, ϵ as following: Here, it is obvious that ϵ = ∑1≤ ϵ. The intuition of this scheme is that larger the temporal scale of a salient point, more the privacy budget it is assigned to. Once the privacy is partitioned into r smaller privacy budgets, next we use each smaller privacy budget to generate the set of noisy salient points, . Here, is obtained using the Laplace mechanism as follows: That is, is computed by adding a random noise sampled from a Laplace distribution with mean μ = 0 and scale to the original value of . Note that as explained earlier, Δs corresponds to the predefined sensitivity that is computed as Δs = x − x. Note that in the case of uniform privacy budget partition, the same probability density function of the Laplace distribution is used for adding a random noise to each salient point, owing to the condition, ϵ1 = ϵ2 = ⋯ = ϵ. On the other hands, in the case of adaptive privacy budget partition, different probability density functions of the Laplace distribution are used for each salient point because the privacy budgets allocated for perturbing each salient point are different from each other. As the Laplace scale factor decreases (increases), which corresponds to the case where the privacy budget ϵ increases (decreases), the magnitude of the noise drawn from the Laplace distribution tends to decrease (increase). Thus, the adaptive privacy budget partition scheme ensures that smaller noises are added to more important salient points having larger temporal scales. However, less important salient points whose temporal scale is small are perturbed with larger noises. Finally, the set of noisy salient points, , is directly sent to a data collection server, guaranteeing that the original data of the data contributor is not exposed to outside users. In this paper, we assume that the set of noisy salient points is transmitted through secure channels established between the data contributor’s device and the data collection server. We also note that sending noisy salient points to a data collection server may raise a possible privacy issue in certain applications. That is, by observing the reported timestamps, the adversary may infer certain information about the pattern of the data contributor’s health data stream. One possible solution to such privacy concerns is to add dummy salient points to the set of noisy salient points, and thus, the adversary cannot differentiate between real and dummy salient points.

Data collection server-side processing

Upon receiving the set of noisy salient points, from the i-th user, u, the first step of a data collection server-side processing is to reconstruct the health data stream based on the received salient points. In this subsection, we present two different methods to rebuild the health data stream: linear and nonlinear estimation. Linear estimation: The first scheme is to use a straight line connecting two adjacent salient points to rebuild the data stream. Let us consider the case of two adjacent salient points, , and . Then, the slope, a, and the y-intercept, b, of the straight line connecting these saline points are respectively computed as Then, a stream segment between and is estimated with the line connecting these two adjacent salient points. Nonlinear estimation: Unlike the first method, the second approach exploits prior information regarding the privacy budget partition of the data contributor’s device-side processing. Given two adjacent salient points, and , the ratio of time scale of these two points is computed as . In the case of adaptive privacy budget partition scheme, if μ is greater than 1, it is likely that the gap between and the corresponding original value (i.e, ) is smaller than the gap between and the corresponding original value (i.e, ). This is because more privacy budget is used for adding random noise to than to . In such scenarios, a more reasonable solution to rebuild a stream segment between and is to leverage a nonlinear curve biased to . The case where μ < 1 is similarly explained. If μ = 1, then the linear estimation scheme is used to rebuild a stream segment. Based on the above intuition, we use the following logistic function, f(t), and its symmetric function, f′(t) (Fig 5(a)): where the curve’s maximum value, L, is defined as and the steepness of the curve, β, is a predefined system parameter. Then, as can be seen in Fig 5(a), given two functions, f(t) and f′(t), the entire space is divided into four subspaces, generating four different biased curves that are used to rebuild the stream segment between and , depending on the values of μ and . For example, if μ is greater than 1, the nonlinear curve biased to is used to rebuild the stream segment between and , which corresponds to the top-left and bottom-left cases in Fig 5(b). On the other hands, if μ is less than 1, the nonlinear curve biased to is used to rebuild the stream segment between and which corresponds to the top-right and bottom-right cases in the figure.
Fig 5

(a) Logistic curve and its symmetric curve for two salient points, and , and (b) four different curves that are used to rebuild a stream segment depending on the values of μ and .

(a) Logistic curve and its symmetric curve for two salient points, and , and (b) four different curves that are used to rebuild a stream segment depending on the values of μ and . Then, the i-th data contributor’s reconstructed health data stream, , is stored into a database. Let be the set of sequences stored in the database. Then, the average value of x at the timestamp, t, is estimated as We note that unlike the straightforward solution, the proposed approach avoids high expected errors caused by large sequence lengths, as such the data contributor reports a small number of salient points to a data collector who then estimates the original health data stream based on the salient points received from the data contributor.

Experiment

In this section, we describe the experiments we carried out to evaluate the effectiveness of the proposed approach. First we describe the experimental setup and thereafter we discuss the results.

Experimental setup

We evaluated the proposed approach with the PAMAP2 physical activity monitoring dataset [34] that contains the set of sensory data from nine subjects wearing three inertial measurement units and a heart rate monitor. We note that the PAMAP2 dataset contains a heart rate monitoring dataset that is collected using sensors, which is well suited for our experiments. We first extracted eight heart rate data streams whose length is 3,000 from the PAMAP2 datasets. To investigate the effect of the collected data size on the performance, we generated large synthetic data sets using these eight real heart rate data streams. Given a real heart rate data stream, a synthetic data stream was generated by adding a random noise, which was sampled from a Laplace distribution with mean μ = 0 and scale b = 1, to each point in the real heart rate data stream. For experiments in this section, we generated four different sizes of data sets: 80K, 160K, 320K, and 640K. In the experiments, we report results for the following alternatives: ldp_full corresponds to the straightforward solution that reports all points in a health data stream. ldp_ul is the proposed approach of using the uniform privacy budget partition scheme (data contributor’s device-side) and linear estimation method (data collection server-side). ldp_al is the proposed approach of using the adaptive privacy budget partition scheme and linear estimation method. ldp_an is the proposed approach of using the adaptive privacy budget partition scheme and nonlinear estimation method. ldp_rl corresponds to a method based on randomly selected salient points and the linear estimation method. That is, unlike ldp_ul, ldp_al, and ldp_an, in which salient points are identified by the proposed algorithm shown in Fig 4, given the number of salient points (sp), ldp_rl randomly (but uniformly) selects sp points from a health data stream and uses these randomly selected points as salient points. Here, sp, is determined by averaging the number of salient points identified from each health data stream used in the experiment using the proposed algorithm shown in Fig 4. Note that the purpose of reporting the results of ldp_rl is to experimentally evaluate the usefulness of the proposed salient point searching algorithm. To compare the five schemes, we use an error rate, e: Here, AVG(x) and AVG(x) is the estimated- and the actual average value of x at the timestamp, t, respectively, and n denotes the sequence length. The parameters, α, and β, are set to 0.5, which provides considerably good estimation performances. We run each experiment three times and the error rates reported in the experiment are the averages of all runs.

Results and discussion

We first compare the error rate of two different categories of methods: ldp_full that uses a privacy budget to report all points in a health data stream under LDP and ldp_ul and ldp_rl that consume a privacy budget to report only salient points (or randomly selected points) under LDP. To compare these three schemes, in Fig 6, we use the relative error ratio: The relative error ratio being greater than 1 means that the approach reporting only salient points (or randomly selected points) outperforms the method reporting all points. In Fig 6(a), the privacy budget, ϵ, varies from 0.25 to 2.0, while the data size is set to 640K. On the other hands, in Fig 6(b), the data size varies from 80K to 640K, while the privacy budget is fixed at 0.5. As can be seen from the figure, both ldp_ul and ldp_rl significantly outperform ldp_full. In particular, with the proposed ldp_ul, performance gains from 60X to 90X are possible. The experiment results in Fig 6 verify that when collecting health data streams, characterized as long in length, under LDP, it is much more effective for reporting only small number of points than reporting all points in the stream. The experimental results in Fig 6 further show that the proposed ldp_ul outperforms ldp_rl, at all privacy budgets and data sizes. This verifies that given a health data stream, it is more effective to report carefully selected salient points using the method presented in this paper than randomly selected points.
Fig 6

Relative error ratio for varying privacy budget ϵ and data size.

Fig 7 shows the error rate for varying (a) privacy budget, ϵ, and (b) data size for three different schemes, ldp_ul, ldp_al, and ldp_an, proposed in the paper. The data size is set to 640K in Fig 7(a) and the privacy budget is fixed to 0.5 in Fig 7(b). Key observations based on Fig 7 can be summarized as follows:
Fig 7

Error rate for varying privacy budget ϵ and data size.

As expected, the error rate decreases, as the data size increases, which indicates that the proposed approach well exploits the collected data. As the privacy budget, ϵ, increases, the error rate decreases. This is because, as the privacy budget increases, noises added by the data contributor’s device-side decrease, and thus the level of privacy decreases. This, in turn, results in increased estimation accuracy at the data collection server-side. Among three different schemes, ldp_an, which is based on the adaptive privacy budget partition scheme and nonlinear estimation method, produces slightly better results than the other approaches, ldp_ul and ldp_al, which implies that ldp_an is suitable for applications that require high level of estimation accuracy. To further investigate the effects of collected data size on the estimation accuracy, we plot the stream of average heart rates for varying data sizes in Fig 8. In this experiment, data size varies from 160K to 640K, while the value of ϵ is fixed to 1.0. In this experiment, the estimated stream is obtained using ldp_an. As the collected data size increases, the estimated stream (orange plot in Fig 8) obtained with ldp_an becomes similar to the actual one (blue plot in Fig 8). With a 160K collected data set, a good estimation cannot be achieved because the collected data size is insufficient. However, with a 640K collected data set, the proposed approach in this paper produces a fairly good estimation. This experiment result indicates that the proposed method well exploits the collected data set.
Fig 8

Actual vs. estimated stream of the average heart rates for varying data size (ϵ = 1.0).

Conclusion and future work

In this study, we developed a novel mechanism to collect individual health data streams generated from various smart healthcare sensors in a privacy-preserving manner using LDP. Our proposed approach first identifies a small number of salient data points from an entire health data stream of a data contributor, perturbs these identified salient data points under LDP, and then reports the perturbed salient data to a data collector, instead of reporting all the data in the stream. Furthermore, we presented an effective method that enables a data collector to reconstruct the health data stream from the perturbed data set received from the data contributor. Experiments demonstrated that the proposed method provides a significant improvement in results when compared with the straightforward solutions to this problem. In a future work, we are planning to extend the proposed data collection framework such that it is possible to compute marginal statistics with multiple types of health data streams.
  6 in total

1.  Quantifying the costs and benefits of privacy-preserving health data publishing.

Authors:  Rashid Hussain Khokhar; Rui Chen; Benjamin C M Fung; Siu Man Lui
Journal:  J Biomed Inform       Date:  2014-04-24       Impact factor: 6.317

2.  A framework to preserve the privacy of electronic health data streams.

Authors:  Soohyung Kim; Min Kyoung Sung; Yon Dohn Chung
Journal:  J Biomed Inform       Date:  2014-04-04       Impact factor: 6.317

Review 3.  Publishing data from electronic health records while preserving privacy: a survey of algorithms.

Authors:  Aris Gkoulalas-Divanis; Grigorios Loukides; Jimeng Sun
Journal:  J Biomed Inform       Date:  2014-06-14       Impact factor: 6.317

4.  Smart environment as a service: three factor cloud based user authentication for telecare medical information system.

Authors:  Zeeshan Siddiqui; Abdul Hanan Abdullah; Muhammad Khurram Khan; Abdullah S Alghamdi
Journal:  J Med Syst       Date:  2013-12-07       Impact factor: 4.460

5.  DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing.

Authors:  Haoran Li; Li Xiong; Lifan Zhang; Xiaoqian Jiang
Journal:  Proceedings VLDB Endowment       Date:  2014-08

6.  Utility-preserving anonymization for health data publishing.

Authors:  Hyukki Lee; Soohyung Kim; Jong Wook Kim; Yon Dohn Chung
Journal:  BMC Med Inform Decis Mak       Date:  2017-07-11       Impact factor: 2.796

  6 in total
  6 in total

1.  Anomaly detection over differential preserved privacy in online social networks.

Authors:  Randa Aljably; Yuan Tian; Mznah Al-Rodhaan; Abdullah Al-Dhelaan
Journal:  PLoS One       Date:  2019-04-25       Impact factor: 3.240

Review 2.  Illuminating the dark spaces of healthcare with ambient intelligence.

Authors:  Albert Haque; Arnold Milstein; Li Fei-Fei
Journal:  Nature       Date:  2020-09-09       Impact factor: 49.962

3.  Privacy-preserving federated neural network learning for disease-associated cell classification.

Authors:  Sinem Sav; Jean-Philippe Bossuat; Juan R Troncoso-Pastoriza; Manfred Claassen; Jean-Pierre Hubaux
Journal:  Patterns (N Y)       Date:  2022-04-18

Review 4.  Differential privacy in health research: A scoping review.

Authors:  Joseph Ficek; Wei Wang; Henian Chen; Getachew Dagne; Ellen Daley
Journal:  J Am Med Inform Assoc       Date:  2021-09-18       Impact factor: 7.942

5.  Local Differential Privacy in the Medical Domain to Protect Sensitive Information: Algorithm Development and Real-World Validation.

Authors:  MinDong Sung; Dongchul Cha; Yu Rang Park
Journal:  JMIR Med Inform       Date:  2021-11-08

6.  Local differential privacy protection for wearable device data.

Authors:  Zhangbing Li; Baichuan Wang; Jinsheng Li; Yi Hua; Shaobo Zhang
Journal:  PLoS One       Date:  2022-08-17       Impact factor: 3.752

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.