You are in:Home/Publications/Privacy-Preserving Secure Multiparty Computation on Electronic Medical Records for Star Exchange Topology

Ass. Lect. Ahmed Mohamed Tawfik Ali :: Publications:

Title:
Privacy-Preserving Secure Multiparty Computation on Electronic Medical Records for Star Exchange Topology
Authors: Ahmed M Tawfik, Sahar F Sabbeh, EL-Shishtawy Tarek
Year: 2018
Keywords: Privacy preservation Electronic medical records Secure multiparty computation Star exchange topology Bucketization technique Trusted third party
Journal: Arabian Journal for Science and Engineering
Volume: Not Available
Issue: Not Available
Pages: 1-10
Publisher: Springer Berlin Heidelberg
Local/International: International
Paper Link:
Full paper Not Available
Supplementary materials Not Available
Abstract:

Nowadays, a huge amount of data are available and shared in collaborative scenarios. These scenarios exist due to the need for joint computations of cooperating data owners for the purpose of making analysis and knowledge extraction. This requirement comes together with some privacy issues. One major issue is how to enable query execution, while no party is allowed to see the entire dataset (computational privacy). Thus, secure multiparty computation protocols allow a group of distrustful data owners to jointly cooperate in executing analytical queries against their data while revealing nothing about the entire dataset. In this paper, we propose a technique that enables a privacy-preserving query processing on horizontally partitioned electronic medical records among a set of hospitals, which have no desire to share their confidential data; however, they all need to cooperate to answer global queries about patients’ medical history. The proposed technique depends on a bucketization technique to reduce computational costs. It relies on a head party, which acts as a mediator between the authorized users and the cooperating parties, which are arranged in a star exchange topology. It ensures that the head party learns nothing about the sensitive data. Our experimental results prove that our technique provides a smaller computational cost and better privacy without the need for a trusted third party.

Google ScholarAcdemia.eduResearch GateLinkedinFacebookTwitterGoogle PlusYoutubeWordpressInstagramMendeleyZoteroEvernoteORCIDScopus