[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Reliable medical recommendation systems with patient privacy

Published: 08 October 2013 Publication History

Abstract

One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure that any sensitive medical information collected by the system is properly secured. In this article, we codify these privacy concerns in a privacy-friendly framework and present two architectures that realize it: the Secure Processing Architecture (SPA) and the Anonymous Contributions Architecture (ACA). In SPA, patients submit their ratings in a protected form without revealing any information about their data and the computation of recommendations proceeds over the protected data using secure multiparty computation techniques. In ACA, patients submit their ratings in the clear, but no link between a submission and patient data can be made. We discuss various aspects of both architectures, including techniques for ensuring reliability of computed recommendations and system performance, and provide their comparison.

References

[1]
Armknecht, F. and Strufe, T. 2011. An efficient distributed privacy-preserving recommendation system. In Proceedings of the IEEE Ad Hoc Networking Workshop. 65--70.
[2]
Bankovic, Z., Vallejo, J., Fraga, D., and Moya, J. 2011. Detecting bad-mouthing attacks on reputation systems using self-organizing maps. In Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol. 6694, Springer Verlag, Berlin Heidelberg, 9--16.
[3]
Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., and Poupard, G. 2001. Practical multi-candidate election scheme. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC). 274--283.
[4]
Berjani, B. and Strufe, T. 2011. A recommendation system for spots in location-based online social networks. In Proceedings of the EuroSys Workshop on Social Network Systems.
[5]
Blanton, M. 2008. Online subscriptions with anonymous access. In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS). 217--227.
[6]
Blanton, M. and Gasti, P. 2011. Secure and efficient protocols for iris and fingerprint identification. In Proceedings of the European Symposium on Research in Computer Security (ESORICS). 190--209.
[7]
Boneh, D. and Franklin, M. 1997. Efficient generation of shared RSA keys. In Advances in Cryptology—CRYPTO. Lecture Notes in Computer Science, vol. 1294, Springer Verlag, Berlin Heidelberg, 425--439.
[8]
Boudot, F. 2000. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology—EUROCRYPT. Lecture Notes in Computer Science, vol. 1807, Springer Verlag, Berlin Heidelberg, 431--444.
[9]
Bunn, P. and Ostrovsky, R. 2007. Secure two-party k-means clustering. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). 486--497.
[10]
Burke, R., Mobasher, B., Williams, C., and Bhaumik, R. 2006. Classification features for attack detection in collaborative recommender systems. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 542--547.
[11]
Camenisch, J. and Lysyanskaya, A. 2002. A signature scheme with efficient protocols. In Proceedings of the International Conference on Security in Communication Networks (SCN). Lecture Notes in Computer Science, vol. 2576, Springer Verlag, Berlin Heidelberg, 268--289.
[12]
Camenisch, J. and Lysyanskaya, A. 2004. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology--CRYPTO. Lecture Notes in Computer Science, vol. 3152, Springer Verlag, Berlin Heidelberg, 56--72.
[13]
Camenisch, J. and Stadler, M. 1997. Proof systems for general statements about discrete logarithms. Tech. rep. No. 260, ETH Zurich.
[14]
Canetti, R. 2000. Security and composition of multiparty cryptographic protocols. J. Cryptol. 13, 1, 143--202.
[15]
Canny, J. F. 2002a. Collaborative filtering with privacy. In Proceedings of the IEEE Symposium on Security and Privacy. 45--57.
[16]
Canny, J. F. 2002b. Collaborative filtering with privacy via factor analysis. In Proceedings of the ACM Conference on Research and Development in Information Retrieval (SIGIR). 238--245.
[17]
Chen, S. and Williams, M. A. 2010. Towards a comprehensive requirements architecture for privacy-aware social recommender systems. In Proceedings of the Asia-Pacific Conference on Conceptual Modelling. Vol. 110. 33--42.
[18]
Chirita, P.-A., Nejdl, W., and Zamfir, C. 2005. Preventing shilling attacks in online recommender systems. In Proceedings of the ACM International Workshop on Web Information and Data Management (WIDM). 67--74.
[19]
Cramer, R., Damgård, I., and Nielsen, J. 2001. Multiparty computation from threshold homomorphic encryption. In Advances in Cryptology -- EUROCRYPT. Lecture Notes in Computer Science, vol. 2045, Springer Verlag, Berlin Heidelberg, 280--289.
[20]
Damgård, I., Geisler, M., and Krøigård, M. 2008a. A correction to efficient and secure comparison for on-line auctions. Cryptology ePrint Archive, Report 2008/321.
[21]
Damgård, I., Geisler, M., and Krøigård, M. 2008b. Homomorphic encryption and secure comparison. J. Appl. Cryptol. 1, 1, 22--31.
[22]
Damgård, I. and Jurik, M. 2001. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Proceedings of the International Workshop on Practice and Theory in Public Key Cryptography (PKC). 119--136.
[23]
Damgård, I. and Koprowski, M. 2001. Practical threshold RSA signatures without a trusted dealer. In Advances in Cryptology -- EUROCRYPT. Lecture Notes in Computer Science, vol. 2045, Springer Verlag, Berlin Heidelberg, 152--165.
[24]
Dellarocas, C. 2000. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the ACM Conference on Electronic Commerce (EC). 150--157.
[25]
Dierks, T. and Allen, C. 1999. The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard).
[26]
Dierks, T. and Rescorla, E. 2006. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard).
[27]
Dierks, T. and Rescorla, E. 2008. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard).
[28]
Dwork, C. 2006. Differential privacy. In Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes in Computer Science, vol. 4052, Springer Verlag, Berlin Heidelberg, 1--12.
[29]
Dwork, C. 2008. Differential privacy: A survey of results. In Proceedings of the International Conference on Theory and Applications of Models of Computation (TAMC). Lecture Notes in Computer Science, vol. 4978, Springer Verlag, Berlin Heidelberg, 1--19.
[30]
Fouque, P.-A., Poupard, G., and Stern, J. 2000. Sharing decryption in the context of voting or lotteries. In Proceedings of the International Conference on Financial Cryptography (FC). Lecture Notes in Computer Science, vol. 1962, Springer Verlag, Berlin Heidelberg, 90--104.
[31]
Goldreich, O. 2004. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press.
[32]
Groth, J. 2010. A verifiable secret shuffle of homomorphic encryptions. J. Crypt. 546--579.
[33]
Groth, J. and Ishai, Y. 2008. Sub-linear zero-knowledge argument for correctness of a shuffle. In Advances in Cryptology -- EUROCRYPT. Lecture Notes in Computer Science, vol. 4965, Springer Verlag, Berlin Heidelberg, 379--396.
[34]
Hoens, T. R., Blanton, M., and Chawla, N. 2010a. A private and reliable recommendation system using a social network. In Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). 816--825.
[35]
Hoens, T. R., Blanton, M., and Chawla, N. 2010b. Reliable medical recommendation systems with patient privacy. In Proceedings of the ACM International Health Informatics Symposium (IHI). 173--182.
[36]
Kargupta, H., Datta, S., Wang, Q., and Sivakumar, K. 2003. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the IEEE International Conference on Data Mining (ICDM). 99--106.
[37]
Katzenbeisser, S. and Petkovic, M. 2008. Privacy-preserving recommendation systems for consumer healthcare services. In Proceedings of the IEEE International Conference on Availability, Reliability and Security (ARES). 889--895.
[38]
Lam, S. K. and Riedl, J. 2004. Shilling recommender systems for fun and profit. In Proceedings of the ACM International Conference on World Wide Web (WWW). 393--402.
[39]
Lipmaa, H., Asokan, N., and Niemi, V. 2002. Secure Vickrey auctions without threshold trust. In Proceedings of the 6th International Conference on Financial Cryptography (FC). 87--101.
[40]
McSherry, F. and Mironov, I. 2009. Differentially private recommender systems: Building privacy into the Netflix prize contenders. In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD). 627--636.
[41]
Mehta, B., Hofmann, T., and Fankhauser, P. 2007. Lies and propaganda: Detecting spam users in collaborative filtering. In Proceedings of the International Conference on Intelligent User Interfaces. 14--21.
[42]
Miller, B., Konstan, J., and Riedl, J. 2004. Pocketlens: Toward a personal recommender system. ACM Trans. Inf. Syst. 22, 3, 437--476.
[43]
Mobasher, B., Burke, R., Williams, C., and Bhaumik, R. 2006. Analysis and detection of segment-focused attacks against collaborative recommendation. Adv. Web Mining Web Usage Ana. 96--118.
[44]
Paillier, P. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology -- EUROCRYPT. Lecture Notes in Computer Science, vol. 1592, Springer Verlag, Berlin Heidelberg, 223--238.
[45]
Pedersen, T. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology -- CRYPTO. Lecture Notes in Computer Science, vol. 576, Springer Verlag, Berlin Heidelberg, 129--140.
[46]
Peng, K. and Bao, F. 2010. A shuffling scheme with strict and strong security. In Proceedings of the 4th International Conference on Emerging Security Information, Systems, and Technologies. 201--206.
[47]
Peng, K., Boyd, C., and Dawson, E. 2005. Simple and efficient shuffling with provable correctness and ZK privacy. In Advances in Cryptology -- CRYPTO. Lecture Notes in Computer Science, vol. 3621, Springer Verlag, Berlin Heidelberg, 188--204.
[48]
Polat, H. and Du, W. 2005. SVD-based collaborative filtering with privacy. In Proceedings of the ACM Symposium on Applied Computing (SAC). 791--795.
[49]
Schoenmakers, B. and Tuyls, P. 2006. Efficient binary conversion for Paillier encrypted values. In Advances in Cryptology -- EUROCRYPT. Lecture Notes in Computer Science, vol. 4004, Springer Verlag, Berlin Heidelberg, 522--537.
[50]
Srivatsa, M., Xiong, L., and Liu, L. 2005. Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the International Conference on World Wide Web (WWW). 422--431.
[51]
Zhan, J., Hsieh, C. L., Wang, I. C., Hsu, T. S., Liau, C. J., and Wang, D. W. 2010. Privacy-preserving collaborative recommender systems. Syst. Man, Cybernet. Part C: Appl. Rev. 40, 4, 472--476.
[52]
Zhang, S., Ford, J., and Makedon, F. 2006. A privacy-preserving collaborative filtering scheme with two-way communication. In Proceedings of the ACM Conference on Electronic Commerce (EC). 316--323.

Cited By

View all
  • (2024)Personalized Healthcare in the Era of E-Business 5.0Smart Technologies and Innovations in E-Business10.4018/978-1-6684-7840-0.ch010(186-203)Online publication date: 19-Jul-2024
  • (2024)Recommendation Systems for the Healthcare Domain: A Comprehensive Survey of Evaluation DatasetsVietnam Journal of Computer Science10.1142/S219688882450016711:04(487-529)Online publication date: 31-Aug-2024
  • (2024)DiagNCF: Diagnosis Neural Collaborative Filtering for Accurate Medical RecommendationAdvanced Intelligent Computing in Bioinformatics10.1007/978-981-97-5692-6_10(108-118)Online publication date: 5-Aug-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Intelligent Systems and Technology
ACM Transactions on Intelligent Systems and Technology  Volume 4, Issue 4
Survey papers, special sections on the semantic adaptive social web, intelligent systems for health informatics, regular papers
September 2013
452 pages
ISSN:2157-6904
EISSN:2157-6912
DOI:10.1145/2508037
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 October 2013
Accepted: 01 August 2012
Revised: 01 May 2012
Received: 01 December 2011
Published in TIST Volume 4, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Recommendation systems
  2. framework
  3. privacy

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)4
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Personalized Healthcare in the Era of E-Business 5.0Smart Technologies and Innovations in E-Business10.4018/978-1-6684-7840-0.ch010(186-203)Online publication date: 19-Jul-2024
  • (2024)Recommendation Systems for the Healthcare Domain: A Comprehensive Survey of Evaluation DatasetsVietnam Journal of Computer Science10.1142/S219688882450016711:04(487-529)Online publication date: 31-Aug-2024
  • (2024)DiagNCF: Diagnosis Neural Collaborative Filtering for Accurate Medical RecommendationAdvanced Intelligent Computing in Bioinformatics10.1007/978-981-97-5692-6_10(108-118)Online publication date: 5-Aug-2024
  • (2024)Text Mining for Recommendation Systems/Expert Systems in Health DomainText Mining Approaches for Biomedical Data10.1007/978-981-97-3962-2_19(403-409)Online publication date: 4-Sep-2024
  • (2023)Artificial Intelligence in HealthcarePhilosophy of Artificial Intelligence and Its Place in Society10.4018/978-1-6684-9591-9.ch003(43-55)Online publication date: 30-Jun-2023
  • (2023)Prediction of patient choice tendency in medical decision-making based on machine learning algorithmFrontiers in Public Health10.3389/fpubh.2023.108735811Online publication date: 24-Feb-2023
  • (2023)Web-Based Patient Recommender Systems for Preventive Care: Protocol for Empirical Research PropositionsJMIR Research Protocols10.2196/4331612(e43316)Online publication date: 30-Mar-2023
  • (2023)ALGNet: Attention Light Graph Memory Network for Medical Recommendation SystemProceedings of the 12th International Symposium on Information and Communication Technology10.1145/3628797.3628983(570-577)Online publication date: 7-Dec-2023
  • (2023)ReuseKNN: Neighborhood Reuse for Differentially Private KNN-Based RecommendationsACM Transactions on Intelligent Systems and Technology10.1145/360848114:5(1-29)Online publication date: 11-Aug-2023
  • (2023)Exploring The Role of Big Data Algorithm Recommendation in Smart Cities- Taking Book recommendation As an Example2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)10.1109/ITIKD56332.2023.10099656(1-5)Online publication date: 8-Mar-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media