145
Views
3
CrossRef citations to date
0
Altmetric
Articles

Differentially private model release for healthcare applications

, &
Pages 953-958 | Received 30 Jul 2020, Accepted 20 Dec 2021, Published online: 20 Jan 2022

References

  • Omolara AE, Jantan A, Abiodun OI, et al. Honeydetails: a prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys. Health Inform J. pMID: 31957538. DOI:10.1177/1460458219894479.
  • Omotosho A, Emuoyibofarhe J, Meinel C. Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography. 2017. Available from: http://arxiv.org/abs/1708.01643
  • Omotosho A, Emuoyibofarhe J, Oke A. Securing private keys in electronic health records using session-based hierarchical key encryption. J Appl Secur Res. 2017;12(4):463–477.
  • Sweeney L. K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowledge-Based Syst. 2002;10(5):557–570.
  • Machanavajjhala A, Kifer D, Gehrke J, et al. L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data. 2007;1(1):3–es.
  • Li N, Li T, Venkatasubramanian S. t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering; 2007. p. 106–115. DOI: 10.1109/ICDE.2007.367856.
  • Sangeetha S, Sadasivam GS. Privacy of big data: a review. In: Handbook of big data and IoT security. Cham: Springer; 2019.
  • Virupaksha S, Venkatesulu D. Subspace-based aggregation for enhancing utility, information measures, and cluster identification in privacy preserved data mining on high-dimensional continuous data. Int J Comput Appl. 2019;2(4):1–10.
  • Mehmood A, Natgunanathan I, Xiang Y, et al. Protection of big data privacy. IEEE Access. 2016;4:1821–1834.
  • Karlekar NP, Gomathi N. Ow-svm: ontology and whale optimization-based support vector machine for privacy-preserved medical data classification in cloud. Int J Commun Syst. 2018;31(12):e3700. Available from: https://onlinelibrary.wiley.com/doi/abs/10.1002/dac.3700
  • Babrahem AS, Monowar MM. Preserving confidentiality and privacy of the patient's ehr using the orbac and aes in cloud environment. Int J Comput Appl. 2021;43(1):50–61.
  • Kumari A, Kumar V, Abbasi MY. Eaaf: Ecc-based anonymous authentication framework for cloud-medical system. Int J Comput Appl. 2020;9(13):1–10.
  • Zhu T, Xiong P, Li G, et al. Differentially private model publishing in cyber physical systems. Future Generation Comput Syst. 2020;108:1297–1306. Available from: http://www.sciencedirect.com/science/article/pii/S0167739X17325554
  • Shokri R, Tech C, Stronati M, et al. Membership inference attacks against machine learning models. 2017. (Tech. rep.). Available from: https://cloud.google.com/prediction/docs/gallery
  • Fredrikson M, Jha S, Tech C. Model inversion attacks that exploit confidence information and basic countermeasures Thomas Ristenpart. 2015. DOI:10.1145/2810103.2813677.
  • Dwork C. Differential Privacy. 2006.
  • Apple's Differential Privacy [Internet]. Available from: https://www.wired.com/2016/06/apples-differential-privacy-collecting-data/
  • Uber Releases Open Source Project for Differential Privacy. (n.d.). [Internet], Available from: https://medium.com/uber-security-privacy/differential-privacy-open-source-7892c82c42b6
  • Erlingsson Ú, Pihur V, Korolova A. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. 2014. DOI:10.1145/2660267.2660348
  • Fanti G, Pihur V, Erlingsson Ú. Building a RAPPOR with the unknown: privacy-preserving learning of associations and data dictionaries. Proc Priv Enh Technol. 2015;2016(3):41–61. Available from: http://arxiv.org/abs/1503.01214
  • Shin H, Kim S, Shin J, et al. Privacy enhanced matrix factorization for recommendation with local differential privacy. IEEE Trans Knowl Data Eng. 2018;30(9):1770–1782.
  • Berlioz A, Friedman A, Kaafar MA, et al. Applying differential privacy to matrix factorization. 2015. DOI:10.1145/2792838.2800173
  • Friedman A, Berkovsky S, Kaafar MA. A differential privacy framework for matrix factorization recommender systems. User Model User-Adapt Interact. 2016;26(5):425–458.
  • McSherry F, Mironov I. Differentially private recommender systems: building privacy into the netflix prize contenders. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2009. p. 627–635. DOI:10.1145/1557019.1557090
  • Dwork C, Roth A. The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci. 2013;9(3–4):211–407.
  • Quinlan JR. Induction of decision trees. Mach Learn. 1986;1(1):81–106.
  • Cortes C, Vapnik V. Support-vector networks. Mach Learn. 1995;20(3):273–297.
  • Uci Heart Disease Dataset. Available from: https://archive.ics.uci.edu/ml/datasets/Heart+Disease
  • Guan Z, Sun X, Shi L, et al. A differentially private greedy decision forest classification algorithm with high utility. Comput Secur. 2020;96:101930. Available from: https://www.sciencedirect.com/science/article/pii/S0167404820302054

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.