Skip to main content

Towards a Framework for Privacy Preserving Medical Data Mining Based on Standard Medical Classifications

  • Conference paper
Electronic Healthcare (eHealth 2010)

Abstract

Privacy-preserving data mining often focuses on data alteration but may bias data patterns interpretation and does not offer different levels of access to patterns according to their use. This paper addresses data mining as a prediction tool and proposes to offer several levels of access to data patterns according to users’ trustworthiness. The grounding intuition is that patterns’ predictive value depends on their precision that should thus vary according to their use. The following problem is considered: a medical data holder wants to disclose data or data patterns and still control the meaning of the disclosed patterns or of the patterns that may be mined out of the released dataset. To tackle this issue, we propose a framework compliant with existing data mining techniques by modeling trust in terms of data precision and generalising data according to standard medical classifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: Proceedings of the 20th International Conference on Very Large Data Bases, pp. 487–499. Morgan Kaufmann, Santiago de Chile (1994)

    Google Scholar 

  2. Dasseni, E., Verykios, V.S., Elmagarmid, A.K., Bertino, E.: Hiding association rules by using confidence and support. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, p. 369. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Elfangary, L.M., Atteya, W.A.: Mining databases by means of an incremental asso- ciation rule learner. In: Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology, pp. 891–896. IEEE Computer Society, Washington, DC, USA (2008)

    Chapter  Google Scholar 

  4. Fayyad, U.M.: Knowledge discovery in databases: An overview. In: Džeroski, S., Lavrač, N. (eds.) ILP 1997. LNCS, vol. 1297, pp. 3–16. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  5. Freund, J., Comaniciu, D., Ioannis, Y., Liu, P., McClatchey, R., Morley-Fletcher, E., Pennec, X., Pongiglione, G., Zhou, X.: Health-e-child: An integrated biomedical platform for grid-based paediatric applications. CoRR abs/cs/0603036 (2006)

    Google Scholar 

  6. Hosmer, L.T.: Trust: The connecting link between organizational theory and philosophical ethics. The Academy of Management Review 20(2), 379–403 (1995)

    MathSciNet  Google Scholar 

  7. Kim, D.J., Ferrin, D.L., Rao, H.R.: A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decis. Support Syst. 44(2), 544–564 (2008)

    Article  Google Scholar 

  8. Kosko, B.: Fuzzy cognitive maps. International Journal of Man-Machine Studies 24(1), 65–75 (1986)

    Article  MATH  Google Scholar 

  9. Palaniappan, S., Awang, R.: Intelligent heart disease prediction system using data mining techniques. In: Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications, pp. 108–115. IEEE Computer Society, Washington, DC, USA (2008)

    Chapter  Google Scholar 

  10. Sweeney, L., Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10 (2002)

    Google Scholar 

  11. Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  12. Wang, K.: Bottom-up generalization: a data mining solution to privacy protection. In. In: ICDM, pp. 249–256 (2004)

    Google Scholar 

  13. Wang, S.L., Lai, T.Z., Hong, T.P., Wu, Y.L.: Hiding predictive association rules on horizontally distributed data. In: Chien, B.-C., Hong, T.-P., Chen, S.-M., Ali, M. (eds.) IEA/AIE 2009. LNCS, vol. 5579, pp. 133–141. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Faravelon, A., Verdier, C. (2011). Towards a Framework for Privacy Preserving Medical Data Mining Based on Standard Medical Classifications. In: Szomszor, M., Kostkova, P. (eds) Electronic Healthcare. eHealth 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 69. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23635-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23635-8_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23634-1

  • Online ISBN: 978-3-642-23635-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics