Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.5.1187

Privacy-Preserving Outlier Detection in Healthcare Services  

Lee, Bo Young (Graduate School of Information Security, Korea University)
Choi, Wonsuk (Graduate School of Information Security, Korea University)
Lee, Dong Hoon (Graduate School of Information Security, Korea University)
Abstract
Recently, as high-quality sensors are being developed, it is available to conveniently measure any kind of data. Healthcare services are being combined with Internet of things (IoTs). And applications that use user's data which are remotely measured, such as heart rate, blood oxygen level, temperature are emerging. The typical example is applications that find ideal spouse by using a user's genetic information, or indicate the presence or absence of a disease. Such information is closely related to the user's privacy, so biometric information must be protected. That is, service provider must provide the service while preserving user's privacy. In this paper, we propose a scheme which enables privacy-preserving outlier detection in Healthcare Service.
Keywords
Privacy-preserving Analysis; IoT; Emergency Medical Service; Security;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Yeongju Jeon, "Utilization of electronic medical records (EMR) and protection of patient information," Korea Society of Health Service Management, 7(3), pp. 213-224, Sep. 2013.   DOI
2 Jonghyeok Im, Jeongeun Song, and Mungyu Lee, "Speeding up encryption operation for a somewhat homomorphic encryption scheme over the integers," Korean Institute of Next Generation Computing, 10(2), pp. 6-18, Apr. 2014.
3 Myeongin Jeong, "Technical Trend of Fully Homomorphic Encryption, Journal of Korea Contents Association," 13(8), pp 36-43, Jul. 2013.   DOI
4 Monghyeon Lee, "Multivariate Spatial Cluster Analysis Using Mahalanobis Distance," The Korean Cartographic Association, 12(2), pp 37-46, Aug. 2012.
5 Adreas Peter, Erik Tews, and Stefan Katzenbeisser. "Efficiently outsourcing multiparty computation under multiple keys," Information Forensics and Security IEEE Transactions, vol. 8, no. 12, pp. 2046-2058, Dec. 2013.   DOI
6 Osman Salem, Yaning Liu, and Ahmed Mehaoua. "Anomaly detection in medical wireless sensor networks," The Korean Institute of Information Science and Engineering, 7(4), pp. 272-284. Oct. 2013.
7 Jihye Kim, "Prosecution.Police controversial of 3000 people kakaotalk dialogue recording inspection," SISA Focus, Oct. 2014.
8 www.Physionet.org, [accessed Aug-2015]
9 https://en.wikipedia.org/wiki/Golden__hour_(medicine), [accessed Aug-2015]
10 Byeongman Cho and Dongyun Kim, "A Study of the Utility of Mahalanobis Distance for Decision of the Results of Health Examination," Journal of Korea industrial medicine, 6(2), pp 270-275, Sep. 1994.
11 Sejin Park, Hogyu Lee, Jongseon Park, and Cheolu Kim, "Analog Front-End Design Techniques and Method for Saturation of Hemoglobin with Oxygen Sensor," Journal of Institute of Electrical and electronic engineers, 18(48), pp. 172-178, Mar. 2014.
12 http://h21.hani.co.kr/arti/special/special_general/33985.html, hani.co.kr, Mar. 2013.
13 Kyoung Sik Min, "Internet of Things," KISA NetTerm, Jun. 2013.
14 Huijeong Hwang, "U-health system example based on standard," 2013 Health ICT Seminar, Oct. 2013.
15 Seonhui Lee and Seonsil Yoo, "Status and View of Mobile Healthcare Application," 26(17), KISDI, Sep. 2014.