[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2141622.2141687acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

Protecting anonymity in wireless medical monitoring environments

Published: 25 May 2011 Publication History

Abstract

Advances in sensor networks and mobile technologies enable the provision of improved medical services through monitoring of patients; however by recording continuously location data there is an increased privacy risk. Recording user related data requires the creation of appropriate privacy preserving policies, which often depend on the good intention of the data collector. Since it is often feasible for a malicious or negligent data provider to expose these data to an unauthorized user, one solution is to protect the patient's privacy by making difficult a linkage between specific measurements with patient's identity. In this paper we present a privacy preserving architecture which builds upon the concept of k-anonymity. While patient vital parameters can be constantly recorded with the use of sensor networks and critical events produce alerts that are notifying the medical personnel, we prevent an outsider to link the signals received with the identity of the user carrying the sensor. The collected data cannot be further used for identification of diseases or other important questions.

References

[1]
P. Samarati and L. Sweeney. "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
[2]
Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Securecomm, pp. 194--205 (2005)
[3]
Abbasi, A., Khonsari, A and Talebi, M. "Source location anonymity for sensor networks". In Proceedings of the 6th IEEE Conference on Consumer Communications and Networking conference (CCNC'09). IEEE Press, Piscataway, NJ, USA, 588--592, 2009
[4]
K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," ICNP, 2007.
[5]
Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D. 2003. Privacy-aware location sensor networks. In Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS'03).
[6]
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," IEEE INFOCOM, 2007.
[7]
Priyantha, N., Chakraborty, A., and Balakrishnan, H. The Cricket Location-Support System. In Proceedings of the sixth annual international conference on Mobile computing and networking, In Proceedings of MOBICOM 2000, pages 32--43, Boston, MA, August 2000.
[8]
DiPietro, R., Mancini, L. V. and Jajodia, S. Providing secrecy in key management protocols for large wireless sensor networks, Journal of AdHoc Networks, 1, 4 (2003), 455--468.
[9]
Newsome, J., Shi, R., Song, D. and Perrig, A. The Sybil attack in sensor networks: Analysis and defenses, In Proceedings of the IEEE International Conference on Information Processing in Sensor Networks, (IPSN 2004) (2004).
[10]
S. Olariu, M. Eltoweissy, and M. Younis, "ANSWER: Autonomous Wireless sensor network," in the Proceedings of the 1st ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet'05), Montreal, Canada, October 2005.
[11]
Pfitzmann, and Köhntopp, M. Anonymity, unobservability, and pseudonymity -- a proposal for terminology. In H. Federrath, editor, DIAU'00, LNCS 2009, 2000, 1--9.
[12]
Sohrabi, K., Gao, J., Ailawadhi, V. and Pottie, G. Protocols for self-organization of a wireless sensor network, IEEE Personal Communications, 7, 5 (2000), 16--27.
[13]
B. Mamalis, D. Gavalas, C. Konstantopoulos and G. Pantziou. "Clustering in Wireless Sensor Networks". In: "RFID and Sensor Networks: Architectures, Protocols, Security and Integrations", Y. Zhang, L. T. Yang, J. Chen (Eds.), CRC Press, pp. 324--353, 2009.
[14]
Ameer Ahmed Abbasi, Mohamed Younis, "A survey on clustering algorithms for wireless sensor networks", Computer Communications 30, pp. 2826--2841, 2007.
[15]
K. Xu, M. Gerla, A heterogeneous routing protocol based on a new stable clustering scheme, in: Proceeding of IEEE Military Communications Conference (MILCOM 2002), Anaheim, CA, October 2002.
[16]
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for network sensors. ASPLOS, pages 93{104, 2000.
[17]
Ouyang Y, Le Z, Xu Z; Triandopoulos, N.; Zhang S; Ford, J.; Makedon, F.;, "Providing Anonymity in Wireless Sensor Networks," Proceedings of the IEEE International Conference on Pervasive Services (ICPS'07), pp. 145--148, Istanbul, Turkey, July 15--20, 2007.
[18]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, SPINS: security protocols for sensor networks, Proceedings of ACM MobiCom'01, Rome, Italy, 2001, pp. 189--199.
[19]
J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan. Building efficient wireless sensor networks with low-level naming. In SOSP, October 2001.

Cited By

View all
  • (2023)Analysis and Protection of Public Medical Dataset: From Privacy PerspectiveHealth Information Science10.1007/978-981-99-7108-4_7(79-90)Online publication date: 11-Oct-2023
  • (2014)A k-anonymity privacy-preserving approach in wireless medical monitoring environmentsPersonal and Ubiquitous Computing10.1007/s00779-012-0618-y18:1(61-74)Online publication date: 1-Jan-2014

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
PETRA '11: Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
May 2011
401 pages
ISBN:9781450307727
DOI:10.1145/2141622
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • NSF: National Science Foundation
  • Foundation of the Hellenic World
  • ICS-FORTH: Institute of Computer Science, Foundation for Research and Technology - Hellas
  • U of Tex at Arlington: U of Tex at Arlington
  • UCG: University of Central Greece
  • Didaskaleio Konstantinos Karatheodoris, University of the Aegean
  • Fulbrigh, Greece: Fulbright Foundation, Greece
  • Ionian: Ionian University, GREECE

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 May 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. medical information systems
  2. security and privacy
  3. wireless sensor networks

Qualifiers

  • Research-article

Conference

PETRA '11
Sponsor:
  • NSF
  • ICS-FORTH
  • U of Tex at Arlington
  • UCG
  • Fulbrigh, Greece
  • Ionian

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Analysis and Protection of Public Medical Dataset: From Privacy PerspectiveHealth Information Science10.1007/978-981-99-7108-4_7(79-90)Online publication date: 11-Oct-2023
  • (2014)A k-anonymity privacy-preserving approach in wireless medical monitoring environmentsPersonal and Ubiquitous Computing10.1007/s00779-012-0618-y18:1(61-74)Online publication date: 1-Jan-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media