Abstract
Privacy preservation is increasingly crucial in e-Health systems, particularly within the realm of privacy-preserving data mining, which aims to reveal underlying patterns while concealing sensitive information for data sanitization purposes. The need to protect sensitive patient information while complying with regulatory standards as well as the need to analyze meaningful data represents significant challenges in the privacy protection within e-Health systems. Additionally, heuristics have been developed to remove transactions from sensitive data. These heuristic algorithms are slower to adapt and have a shorter convergence time. As a result, reasonable side effects are hard to achieve.To address this, a novel approach based on the Coati optimization algorithm (COA) is introduced in this study. This algorithm facilitates the selection of appropriate transactions for removal, enhancing the effectiveness of data sanitization. With the help of COA, two frameworks are developed, namely the simple COA for removing transactions (sCOA2RT) and the pre-large COA for removing transactions (pCOA2RT). A fitness evaluation algorithm examines four side effects, including hiding failure, artificial costs, missing costs, and database dissimilarities. The effectiveness of these frameworks is demonstrated on three e-Health datasets, demonstrating that they are capable of achieving reasonable side effects compared to previous approaches.
Similar content being viewed by others
References
Rehman, A., Naz, S., & Razzak, I. (2022). Leveraging big data analytics in healthcare enhancement: Trends, challenges and opportunities. Multimedia Systems, 28(4), 1339–1371.
Winter, J. S., & Davidson, E. (2022). Harmonizing regulatory regimes for the governance of patient-generated health data. Telecommunications Policy, 46(5), 102285.
Thapa, C., & Camtepe, S. (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in biology and medicine, 129, 104130.
Shrivastava, U., Song, J., Han, B. T., & Dietzman, D. (2021). Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation. International Journal of Medical Informatics, 148, 104401.
Maleki Varnosfaderani, S., & Forouzanfar, M. (2024). The Role of AI in hospitals and clinics: Transforming healthcare in the 21st century. Bioengineering, 11(4), 337.
Vidhyalakshmi, A. & Priya, C., (2020). Medical big data mining and processing in e-health care. In An Industrial IoT Approach for Pharmaceutical Industry Growth 2 (pp. 1–30). Academic Press.
Hulkower, R., Penn, M. & Schmit, C., (2020). Privacy and confidentiality of public health information. Public Health Informatics and Information Systems, pp.147–166
Azad, M. A., Arshad, J., Mahmoud, S., Salah, K., & Imran, M. (2022). A privacy-preserving framework for smart context-aware healthcare applications. Transactions on Emerging Telecommunications Technologies, 33(8), e3634.
Kemper, J., & Kolkman, D. (2019). Transparent to whom? No algorithmic accountability without a critical audience. Information, Communication & Society, 22(14), 2081–2096.
Ashraf, M., Rady, S., Abdelkader, T., & Gharib, T. F. (2023). Efficient privacy preserving algorithms for hiding sensitive high utility itemsets. Computers & Security, 132, 103360.
Darwish, S. M., Essa, R. M., Osman, M. A., & Ismail, A. A. (2022). Privacy preserving data mining framework for negative association rules: An application to healthcare informatics. IEEE Access, 10, 76268–76280.
Wu, J. M. T., Srivastava, G., Jolfaei, A., Fournier-Viger, P., & Lin, J. C. W. (2021). Hiding sensitive information in eHealth datasets. Future Generation Computer Systems, 117, 169–180.
Hamdi, H., Brahmi, Z., Alaerjan, A. S., & Mhamdi, L. (2023). Enhancing security and privacy preservation of sensitive information in e-Health datasets using FCA approach. IEEE Access, 11, 62591–62604. https://doi.org/10.1109/ACCESS.2023.3285407
Jangra, S., & Toshniowal, D. (2020). A Heuristic Approach for Sensitive Pattern Hiding with Improved Data Quality. In M. Ceci, C. Loglisci, G. Manco, E. Masciari, & Z. Ras (Eds.), New Frontiers in Mining Complex Patterns: 8th International Workshop, NFMCP 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Revised Selected Papers (pp. 21–35). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-48861-1_2
Sangaiah, A. K., Javadpour, A., Ja’fari, F., Pinto, P., & Chuang, H. M. (2024). Privacy-aware and AI techniques for healthcare based on k-anonymity model in internet of things. IEEE Transactions on Engineering Management. https://doi.org/10.1109/TEM.2023.3271591
Hemeida, A. M., Alkhalaf, S., Mady, A., Mahmoud, E. A., Hussein, M. E., & Eldin, A. M. B. (2020). Implementation of nature-inspired optimization algorithms in some data mining tasks. Ain Shams Engineering Journal, 11(2), 309–318.
Fernandez-Basso, C., Gutiérrez-Batista, K., Morcillo-Jiménez, R., Vila, M. A., & Martin-Bautista, M. J. (2022). A fuzzy-based medical system for pattern mining in a distributed environment: Application to diagnostic and co-morbidity. Applied Soft Computing, 122, 108870.
Sharma, S., & Toshniwal, D. (2020). MR-OVnTSA: A heuristics based sensitive pattern hiding approach for big data. Applied Intelligence, 50(12), 4241–4260.
Sinigaglia, C., Strata, P., Addabbo, M., Bolognini, N., Nava, E., Turati, C., Betti, V., Bevilacqua, V., Bocci, T., Bortoletto, M. and Bove, M., (2023). XXIII National Congress of the Italian Society of Psychophysiology.
Funding
The authors declare that they have competing interests and funding.
Author information
Authors and Affiliations
Contributions
All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Data Availability
Data sharing is not applicable to this article because of proprietary nature.
Code Availability
Code sharing is not applicable to this article because of proprietary nature.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Madhavi, M., Sasirooba, T. & Kumar, G.K. Securing Sensitive Medical Information with Basic and Pre-large Coati Optimization Algorithm for E-Health System Data Sanitation. Wireless Pers Commun 136, 1261–1281 (2024). https://doi.org/10.1007/s11277-024-11342-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-11342-6