Author : Shruti B Karki 1
Date of Publication :17th May 2017
Abstract: Clinical Decision Support System, using the advanced Data Mining techniques help the clinicians to make proper decisions, has obtained a huge attention recently. One of the advantages of clinical decision support system include not only promoting diagnosis accuracy but also reducing diagnosis time. Even though the clinical decision support system is quite challenging, the twist of the system still faces many challenges including information security and privacy concerns. In this paper, we propose a new “Privacy Preserving Top-K Disease Names Retrieval Method for Clinical Decision Support System†that helps clinician complementary to diagnose the risk of patient’s disease in a privacy-preserving way. A new cryptographic tool called Additive Homomorphic Proxy Aggregation scheme is designed to protect the privacy of past patient’s historical data. The performance of the Proposed System is efficient in calculating the disease risk of the patients in the privacy preserving way
Reference :
-
- A. Shiryaev, “Bayes formula,” in Encyclopedia of Mathematics. New York, NY, USA: Springer, 2011.
- Y. Lindell and B. Pinkas, “A proof of security of YAOS protocol for two-party computation,” J. Cryptol., vol. 22, no. 2, pp. 161–188, 2009.
- A. Shiryaev, “Bayes formula,” in Encyclopedia of Mathematics. New York, NY, USA: Springer, 2011. [4] Acute inflammations data set, UCI machine learning repository.(2009).
- R. S. Ledley and L. B. Lusted, “Reasoning foundations of medical diagnosis,”Science, vol. 130, no. 3366, pp. 9–21, 1959
- Y. Elmehdwi, B. K. Samanthula, and W. Jiang, “knearest neighbor classification over semantically secure encrypted relational data,
- C. Schurink, P. Lucas, I. Hoepelman, and M. Bonten, “Computer-assisted decision support for the diagnosis and treatment of infectious diseases in intensive care units,” Lancet Infectious Dis., vol. 5, no. 5, pp. 305–312, 2005.
- P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proc. Adv. Cryptol. Int. Conf. Theory Appl. Cryptograp. Techn., Prague, Czech Republic, May 2–6, 1999, pp. 223–238.
- R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, “Toward efficient and privacy-preserving computing in big data era,” IEEE Netw., vol. 28, no. 4, pp. 46–50, Jul./Aug. 2014