[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Securing Sensitive Medical Information with Basic and Pre-large Coati Optimization Algorithm for E-Health System Data Sanitation

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Privacy preservation is increasingly crucial in e-Health systems, particularly within the realm of privacy-preserving data mining, which aims to reveal underlying patterns while concealing sensitive information for data sanitization purposes. The need to protect sensitive patient information while complying with regulatory standards as well as the need to analyze meaningful data represents significant challenges in the privacy protection within e-Health systems. Additionally, heuristics have been developed to remove transactions from sensitive data. These heuristic algorithms are slower to adapt and have a shorter convergence time. As a result, reasonable side effects are hard to achieve.To address this, a novel approach based on the Coati optimization algorithm (COA) is introduced in this study. This algorithm facilitates the selection of appropriate transactions for removal, enhancing the effectiveness of data sanitization. With the help of COA, two frameworks are developed, namely the simple COA for removing transactions (sCOA2RT) and the pre-large COA for removing transactions (pCOA2RT). A fitness evaluation algorithm examines four side effects, including hiding failure, artificial costs, missing costs, and database dissimilarities. The effectiveness of these frameworks is demonstrated on three e-Health datasets, demonstrating that they are capable of achieving reasonable side effects compared to previous approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Rehman, A., Naz, S., & Razzak, I. (2022). Leveraging big data analytics in healthcare enhancement: Trends, challenges and opportunities. Multimedia Systems, 28(4), 1339–1371.

    Article  Google Scholar 

  2. Winter, J. S., & Davidson, E. (2022). Harmonizing regulatory regimes for the governance of patient-generated health data. Telecommunications Policy, 46(5), 102285.

    Article  Google Scholar 

  3. Thapa, C., & Camtepe, S. (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in biology and medicine, 129, 104130.

    Article  Google Scholar 

  4. Shrivastava, U., Song, J., Han, B. T., & Dietzman, D. (2021). Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation. International Journal of Medical Informatics, 148, 104401.

    Article  Google Scholar 

  5. Maleki Varnosfaderani, S., & Forouzanfar, M. (2024). The Role of AI in hospitals and clinics: Transforming healthcare in the 21st century. Bioengineering, 11(4), 337.

    Article  Google Scholar 

  6. Vidhyalakshmi, A. & Priya, C., (2020). Medical big data mining and processing in e-health care. In An Industrial IoT Approach for Pharmaceutical Industry Growth 2 (pp. 1–30). Academic Press.

  7. Hulkower, R., Penn, M. & Schmit, C., (2020). Privacy and confidentiality of public health information. Public Health Informatics and Information Systems, pp.147–166

  8. Azad, M. A., Arshad, J., Mahmoud, S., Salah, K., & Imran, M. (2022). A privacy-preserving framework for smart context-aware healthcare applications. Transactions on Emerging Telecommunications Technologies, 33(8), e3634.

    Article  Google Scholar 

  9. Kemper, J., & Kolkman, D. (2019). Transparent to whom? No algorithmic accountability without a critical audience. Information, Communication & Society, 22(14), 2081–2096.

    Article  Google Scholar 

  10. Ashraf, M., Rady, S., Abdelkader, T., & Gharib, T. F. (2023). Efficient privacy preserving algorithms for hiding sensitive high utility itemsets. Computers & Security, 132, 103360.

    Article  Google Scholar 

  11. Darwish, S. M., Essa, R. M., Osman, M. A., & Ismail, A. A. (2022). Privacy preserving data mining framework for negative association rules: An application to healthcare informatics. IEEE Access, 10, 76268–76280.

    Article  Google Scholar 

  12. Wu, J. M. T., Srivastava, G., Jolfaei, A., Fournier-Viger, P., & Lin, J. C. W. (2021). Hiding sensitive information in eHealth datasets. Future Generation Computer Systems, 117, 169–180.

    Article  Google Scholar 

  13. Hamdi, H., Brahmi, Z., Alaerjan, A. S., & Mhamdi, L. (2023). Enhancing security and privacy preservation of sensitive information in e-Health datasets using FCA approach. IEEE Access, 11, 62591–62604. https://doi.org/10.1109/ACCESS.2023.3285407

    Article  Google Scholar 

  14. Jangra, S., & Toshniowal, D. (2020). A Heuristic Approach for Sensitive Pattern Hiding with Improved Data Quality. In M. Ceci, C. Loglisci, G. Manco, E. Masciari, & Z. Ras (Eds.), New Frontiers in Mining Complex Patterns: 8th International Workshop, NFMCP 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Revised Selected Papers (pp. 21–35). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-48861-1_2

    Chapter  Google Scholar 

  15. Sangaiah, A. K., Javadpour, A., Ja’fari, F., Pinto, P., & Chuang, H. M. (2024). Privacy-aware and AI techniques for healthcare based on k-anonymity model in internet of things. IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2023.3271591

    Article  Google Scholar 

  16. Hemeida, A. M., Alkhalaf, S., Mady, A., Mahmoud, E. A., Hussein, M. E., & Eldin, A. M. B. (2020). Implementation of nature-inspired optimization algorithms in some data mining tasks. Ain Shams Engineering Journal, 11(2), 309–318.

    Article  Google Scholar 

  17. Fernandez-Basso, C., Gutiérrez-Batista, K., Morcillo-Jiménez, R., Vila, M. A., & Martin-Bautista, M. J. (2022). A fuzzy-based medical system for pattern mining in a distributed environment: Application to diagnostic and co-morbidity. Applied Soft Computing, 122, 108870.

    Article  Google Scholar 

  18. Sharma, S., & Toshniwal, D. (2020). MR-OVnTSA: A heuristics based sensitive pattern hiding approach for big data. Applied Intelligence, 50(12), 4241–4260.

    Article  Google Scholar 

  19. Sinigaglia, C., Strata, P., Addabbo, M., Bolognini, N., Nava, E., Turati, C., Betti, V., Bevilacqua, V., Bocci, T., Bortoletto, M. and Bove, M., (2023). XXIII National Congress of the Italian Society of Psychophysiology.

Download references

Funding

The authors declare that they have competing interests and funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors read and approved the final manuscript.

Corresponding author

Correspondence to M. Madhavi.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Data Availability

Data sharing is not applicable to this article because of proprietary nature.

Code Availability

Code sharing is not applicable to this article because of proprietary nature.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Madhavi, M., Sasirooba, T. & Kumar, G.K. Securing Sensitive Medical Information with Basic and Pre-large Coati Optimization Algorithm for E-Health System Data Sanitation. Wireless Pers Commun 136, 1261–1281 (2024). https://doi.org/10.1007/s11277-024-11342-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-11342-6

Keywords

Navigation