Cargando…
Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms
With the rapid development of mobile medical care, medical institutions also have the hidden danger of privacy leakage while sharing personal medical data. Based on the k-anonymity and l-diversity supervised models, it is proposed to use the classified personalized entropy l-diversity privacy protec...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8970892/ https://www.ncbi.nlm.nih.gov/pubmed/35371203 http://dx.doi.org/10.1155/2022/9985933 |
_version_ | 1784679532127584256 |
---|---|
author | Khan, Shakir Saravanan, V. N, Gnanaprakasam C. Lakshmi, T. Jaya Deb, Nabamita Othman, Nashwan Adnan |
author_facet | Khan, Shakir Saravanan, V. N, Gnanaprakasam C. Lakshmi, T. Jaya Deb, Nabamita Othman, Nashwan Adnan |
author_sort | Khan, Shakir |
collection | PubMed |
description | With the rapid development of mobile medical care, medical institutions also have the hidden danger of privacy leakage while sharing personal medical data. Based on the k-anonymity and l-diversity supervised models, it is proposed to use the classified personalized entropy l-diversity privacy protection model to protect user privacy in a fine-grained manner. By distinguishing solid and weak sensitive attribute values, the constraints on sensitive attributes are improved, and the sensitive information is reduced for the leakage probability of vital information to achieve the safety of medical data sharing. This research offers a customized information entropy l-diversity model and performs experiments to tackle the issues that the information entropy l-diversity model does not discriminate between strong and weak sensitive features. Data analysis and experimental results show that this method can minimize execution time while improving data accuracy and service quality, which is more effective than existing solutions. The limits of solid and weak on sensitive qualities are enhanced, sensitive data are reduced, and the chance of crucial data leakage is lowered, all of which contribute to the security of healthcare data exchange. This research offers a customized information entropy l-diversity model and performs experiments to tackle the issues that the information entropy l-diversity model does not discriminate between strong and weak sensitive features. The scope of this research is that this paper enhances data accuracy while minimizing the algorithm's execution time. |
format | Online Article Text |
id | pubmed-8970892 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-89708922022-04-01 Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms Khan, Shakir Saravanan, V. N, Gnanaprakasam C. Lakshmi, T. Jaya Deb, Nabamita Othman, Nashwan Adnan Comput Intell Neurosci Research Article With the rapid development of mobile medical care, medical institutions also have the hidden danger of privacy leakage while sharing personal medical data. Based on the k-anonymity and l-diversity supervised models, it is proposed to use the classified personalized entropy l-diversity privacy protection model to protect user privacy in a fine-grained manner. By distinguishing solid and weak sensitive attribute values, the constraints on sensitive attributes are improved, and the sensitive information is reduced for the leakage probability of vital information to achieve the safety of medical data sharing. This research offers a customized information entropy l-diversity model and performs experiments to tackle the issues that the information entropy l-diversity model does not discriminate between strong and weak sensitive features. Data analysis and experimental results show that this method can minimize execution time while improving data accuracy and service quality, which is more effective than existing solutions. The limits of solid and weak on sensitive qualities are enhanced, sensitive data are reduced, and the chance of crucial data leakage is lowered, all of which contribute to the security of healthcare data exchange. This research offers a customized information entropy l-diversity model and performs experiments to tackle the issues that the information entropy l-diversity model does not discriminate between strong and weak sensitive features. The scope of this research is that this paper enhances data accuracy while minimizing the algorithm's execution time. Hindawi 2022-03-24 /pmc/articles/PMC8970892/ /pubmed/35371203 http://dx.doi.org/10.1155/2022/9985933 Text en Copyright © 2022 Shakir Khan et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Khan, Shakir Saravanan, V. N, Gnanaprakasam C. Lakshmi, T. Jaya Deb, Nabamita Othman, Nashwan Adnan Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms |
title | Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms |
title_full | Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms |
title_fullStr | Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms |
title_full_unstemmed | Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms |
title_short | Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms |
title_sort | privacy protection of healthcare data over social networks using machine learning algorithms |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8970892/ https://www.ncbi.nlm.nih.gov/pubmed/35371203 http://dx.doi.org/10.1155/2022/9985933 |
work_keys_str_mv | AT khanshakir privacyprotectionofhealthcaredataoversocialnetworksusingmachinelearningalgorithms AT saravananv privacyprotectionofhealthcaredataoversocialnetworksusingmachinelearningalgorithms AT ngnanaprakasamc privacyprotectionofhealthcaredataoversocialnetworksusingmachinelearningalgorithms AT lakshmitjaya privacyprotectionofhealthcaredataoversocialnetworksusingmachinelearningalgorithms AT debnabamita privacyprotectionofhealthcaredataoversocialnetworksusingmachinelearningalgorithms AT othmannashwanadnan privacyprotectionofhealthcaredataoversocialnetworksusingmachinelearningalgorithms |