Your browser doesn't support javascript.
loading
: 20 | 50 | 100
1 - 13 de 13
1.
PeerJ Comput Sci ; 9: e1255, 2023.
Article En | MEDLINE | ID: mdl-37346655

With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development. However, an individual's personal privacy is a big concern because of the trust issue across organizations. At the same time, the utility of the shared data that is required for its favorable use is also important. Studies show that plenty of conventional work is available where an individual has only one record in a dataset (1:1 dataset), which is not the case in many applications. In a more realistic form, an individual may have more than one record in a dataset (1:M). In this article, we highlight the high utility loss and inapplicability for the 1:M dataset of the θ-Sensitive k-Anonymity privacy model. The high utility loss and low data privacy of (p, l)-angelization, and (k, l)-diversity for the 1:M dataset. As a mitigation solution, we propose an improved (θ∗, k)-utility algorithm to preserve enhanced privacy and utility of the anonymized 1:M dataset. Experiments on the real-world dataset reveal that the proposed approach outperforms its counterpart, in terms of utility and privacy for the 1:M dataset.

2.
PeerJ Comput Sci ; 8: e892, 2022.
Article En | MEDLINE | ID: mdl-36262157

The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes.

3.
Wirel Pers Commun ; 126(3): 2379-2401, 2022.
Article En | MEDLINE | ID: mdl-36059591

With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The biomedical data produced is highly confidential and private. Unfortunately, conventional health systems cannot support such a colossal amount of biomedical data. Hence, data is typically stored and shared through the cloud. The shared data is then used for different purposes, such as research and discovery of unprecedented facts. Typically, biomedical data appear in textual form (e.g., test reports, prescriptions, and diagnosis). Unfortunately, such data is prone to several security threats and attacks, for example, privacy and confidentiality breach. Although significant progress has been made on securing biomedical data, most existing approaches yield long delays and cannot accommodate real-time responses. This paper proposes a novel fog-enabled privacy-preserving model called δ r sanitizer, which uses deep learning to improve the healthcare system. The proposed model is based on a Convolutional Neural Network with Bidirectional-LSTM and effectively performs Medical Entity Recognition. The experimental results show that δ r sanitizer outperforms the state-of-the-art models with 91.14% recall, 92.63% in precision, and 92% F1-score. The sanitization model shows 28.77% improved utility preservation as compared to the state-of-the-art.

4.
Sensors (Basel) ; 22(7)2022 Apr 06.
Article En | MEDLINE | ID: mdl-35408425

Protecting the privacy of individuals is of utmost concern in today's society, as inscribed and governed by the prevailing privacy laws, such as GDPR. In serial data, bits of data are continuously released, but their combined effect may result in a privacy breach in the whole serial publication. Protecting serial data is crucial for preserving them from adversaries. Previous approaches provide privacy for relational data and serial data, but many loopholes exist when dealing with multiple sensitive values. We address these problems by introducing a novel privacy approach that limits the risk of privacy disclosure in republication and gives better privacy with much lower perturbation rates. Existing techniques provide a strong privacy guarantee against attacks on data privacy; however, in serial publication, the chances of attack still exist due to the continuous addition and deletion of data. In serial data, proper countermeasures for tackling attacks such as correlation attacks have not been taken, due to which serial publication is still at risk. Moreover, protecting privacy is a significant task due to the critical absence of sensitive values while dealing with multiple sensitive values. Due to this critical absence, signatures change in every release, which is a reason for attacks. In this paper, we introduce a novel approach in order to counter the composition attack and the transitive composition attack and we prove that the proposed approach is better than the existing state-of-the-art techniques. Our paper establishes the result with a systematic examination of the republication dilemma. Finally, we evaluate our work using benchmark datasets, and the results show the efficacy of the proposed technique.


Privacy , Records , Benchmarking , Humans , Probability
5.
PeerJ Comput Sci ; 7: e649, 2021.
Article En | MEDLINE | ID: mdl-34435097

Digital fraud has immensely affected ordinary consumers and the finance industry. Our dependence on internet banking has made digital fraud a substantial problem. Financial institutions across the globe are trying to improve their digital fraud detection and deterrence capabilities. Fraud detection is a reactive process, and it usually incurs a cost to save the system from an ongoing malicious activity. Fraud deterrence is the capability of a system to withstand any fraudulent attempts. Fraud deterrence is a challenging task and researchers across the globe are proposing new solutions to improve deterrence capabilities. In this work, we focus on the very important problem of fraud deterrence. Our proposed work uses an Intimation Rule Based (IRB) alert generation algorithm. These IRB alerts are classified based on severity levels. Our proposed solution uses a richer domain knowledge base and rule-based reasoning. In this work, we propose an ontology-based financial fraud detection and deterrence model.

6.
Sensors (Basel) ; 21(15)2021 Jul 28.
Article En | MEDLINE | ID: mdl-34372333

Smart devices have accentuated the importance of geolocation information. Geolocation identification using smart devices has paved the path for incentive-based location-based services (LBS). However, a user's full control over a smart device can allow tampering of the location proof. Witness-oriented location proof systems (LPS) have emerged to resist the generation of false proofs and mitigate collusion attacks. However, witness-oriented LPS are still susceptible to three-way collusion attacks (involving the user, location authority, and the witness). To overcome the threat of three-way collusion in existing schemes, we introduce a decentralized consensus protocol called MobChain in this paper. In this scheme the selection of a witness and location authority is achieved through a distributed consensus of nodes in an underlying P2P network that establishes a private blockchain. The persistent provenance data over the blockchain provides strong security guarantees; as a result, the forging and manipulation of location becomes impractical. MobChain provides secure location provenance architecture, relying on decentralized decision making for the selection of participants of the protocol thereby addressing the three-way collusion problem. Our prototype implementation and comparison with the state-of-the-art solutions show that MobChain is computationally efficient and highly available while improving the security of LPS.


Blockchain , Consensus , Humans
7.
Sensors (Basel) ; 21(14)2021 Jul 20.
Article En | MEDLINE | ID: mdl-34300673

With the advent of smart health, smart cities, and smart grids, the amount of data has grown swiftly. When the collected data is published for valuable information mining, privacy turns out to be a key matter due to the presence of sensitive information. Such sensitive information comprises either a single sensitive attribute (an individual has only one sensitive attribute) or multiple sensitive attributes (an individual can have multiple sensitive attributes). Anonymization of data sets with multiple sensitive attributes presents some unique problems due to the correlation among these attributes. Artificial intelligence techniques can help the data publishers in anonymizing such data. To the best of our knowledge, no fuzzy logic-based privacy model has been proposed until now for privacy preservation of multiple sensitive attributes. In this paper, we propose a novel privacy preserving model F-Classify that uses fuzzy logic for the classification of quasi-identifier and multiple sensitive attributes. Classes are defined based on defined rules, and every tuple is assigned to its class according to attribute value. The working of the F-Classify Algorithm is also verified using HLPN. A wide range of experiments on healthcare data sets acknowledged that F-Classify surpasses its counterparts in terms of privacy and utility. Being based on artificial intelligence, it has a lower execution time than other approaches.


Artificial Intelligence , Privacy , Algorithms , Fuzzy Logic , Models, Theoretical
8.
IEEE J Biomed Health Inform ; 25(10): 3804-3811, 2021 10.
Article En | MEDLINE | ID: mdl-34310332

The growing use of electronic health records in the medical domain results in generating a large amount of medical data that is stored in the form of clinical notes. These clinical notes are enriched with clinical entities like disease, treatment, tests, drugs, genes, and proteins. The extraction of clinical entities from clinical notes is a challenging task as clinical notes are written in the form of natural language. The extraction of clinical entities has many useful applications such as clinical notes analysis, medical data privacy, decision support systems, and disease analysis. Although various machine learning and deep learning models are developed to extract clinical entities from clinical notes, developing an accurate model is still challenging. This study presents a novel deep learning-based technique to extract the clinical entities from clinical notes. The proposed model uses local and global context to extract clinical entities in contrast to existing models that use only global context. The combination of CNN, Bi-LSTM, and CRF with non-complex embedding (proposed model) outperforms existing models by a margin of 4-10% and 5-12% in terms of F1-score on i2b2-2010 and i2b2-2012 data. The accurate detection of clinical entities can be helpful in the privacy preservation of medical data that increases the user's and medical organization's trust in sharing medical data.


Deep Learning , Electronic Health Records , Humans , Machine Learning , Natural Language Processing , Privacy
9.
PeerJ Comput Sci ; 7: e516, 2021.
Article En | MEDLINE | ID: mdl-34084926

The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in all working states. Remote authentication is required to perform different administrative operations in an information system, and Administrators have full access to the system and may pose insider threats. Superusers and administrators are the most trusted persons in an organisation. "Trust but verify" is an approach to have an eye on the superusers and administrators. Distributed ledger technology (Blockchain-based data storage) is an immutable data storage scheme and provides a built-in facility to share statistics among peers. Distributed ledgers are proposed to provide visible security and non-repudiation, which securely records administrators' authentications requests. The presence of security, privacy, and accountability measures establish trust among its stakeholders. Securing information in an electronic data processing system is challenging, i.e., providing services and access control for the resources to only legitimate users. Authentication plays a vital role in systems' security; therefore, authentication and identity management are the key subjects to provide information security services. The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats. In this regard, visible security measures have more deterrence than other schemes. In this paper, an authentication scheme, "VisTAS," has been introduced, which provides visible security and trusted authentication services to the tenants and keeps the records in the blockchain.

10.
Microsc Res Tech ; 82(6): 803-811, 2019 Jun.
Article En | MEDLINE | ID: mdl-30768835

Automatic medical image analysis is one of the key tasks being used by the medical community for disease diagnosis and treatment planning. Statistical methods are the major algorithms used and consist of few steps including preprocessing, feature extraction, segmentation, and classification. Performance of such statistical methods is an important factor for their successful adaptation. The results of these algorithms depend on the quality of images fed to the processing pipeline: better the images, higher the results. Preprocessing is the pipeline phase that attempts to improve the quality of images before applying the chosen statistical method. In this work, popular preprocessing techniques are investigated from different perspectives where these preprocessing techniques are grouped into three main categories: noise removal, contrast enhancement, and edge detection. All possible combinations of these techniques are formed and applied on different image sets which are then passed to a predefined pipeline of feature extraction, segmentation, and classification. Classification results are calculated using three different measures: accuracy, sensitivity, and specificity while segmentation results are calculated using dice similarity score. Statistics of five high scoring combinations are reported for each data set. Experimental results show that application of proper preprocessing techniques could improve the classification and segmentation results to a greater extent. However, the combinations of these techniques depend on the characteristics and type of data set used.


Brain Neoplasms/diagnosis , Brain Neoplasms/pathology , Image Processing, Computer-Assisted/methods , Optical Imaging/methods , Automation, Laboratory/methods , Biostatistics/methods , Humans , Sensitivity and Specificity
11.
Microsc Res Tech ; 82(6): 775-785, 2019 Jun.
Article En | MEDLINE | ID: mdl-30697861

The advancement of computer- and internet-based technologies has transformed the nature of services in healthcare by using mobile devices in conjunction with cloud computing. The classical phenomenon of patient-doctor diagnostics is extended to a more robust advanced concept of E-health, where remote online/offline treatment and diagnostics can be performed. In this article, we propose a framework which incorporates a cloud-based decision support system for the detection and classification of malignant cells in breast cancer, while using breast cytology images. In the proposed approach, shape-based features are used for the detection of tumor cells. Furthermore, these features are used for the classification of cells into malignant and benign categories using Naive Bayesian and Artificial Neural Network. Moreover, an important phase addressed in the proposed framework is the grading of the affected cells, which could help in grade level necessary medical procedures for patients during the diagnostic process. For demonstrating the e effectiveness of the proposed approach, experiments are performed on real data sets comprising of patients data, which has been collected from the pathology department of Lady Reading Hospital of Pakistan. Moreover, a cross-validation technique has been performed for the evaluation of the classification accuracy, which shows performance accuracy of 98% as compared to physical methods used by a pathologist for the detection and classification of the malignant cell. Experimental results show that the proposed approach has significantly improved the detection and classification of the malignant cells in breast cytology images.


Breast Neoplasms/diagnosis , Breast Neoplasms/pathology , Cloud Computing , Cytological Techniques/methods , Decision Support Techniques , Image Processing, Computer-Assisted/methods , Female , Humans , Neoplasm Grading/methods , Pakistan
12.
Microsc Res Tech ; 82(4): 361-372, 2019 Apr.
Article En | MEDLINE | ID: mdl-30677193

Atomic recognition of the Exudates (EXs), the major symbol of diabetic retinopathy is essential for automated retinal images analysis. In this article, we proposed a novel machine learning technique for early detection and classification of EXs in color fundus images. The major challenge observed in the classification technique is the selection of optimal features to reduce computational time and space complexity and to provide a high degree of classification accuracy. To address these challenges, this article proposed an evolutionary algorithm based solution for optimal feature selection, which accelerates the classification process and reduces computational complexity. Similarly, three well-known classifiers that is, Naïve Bayes classifier, Support Vector Machine, and Artificial Neural Network are used for the classification of EXs. Moreover, an ensemble-based classifier is used for the selection of best classifier on the basis of majority voting technique. Experiments are performed on three well-known benchmark datasets and a real dataset developed at local Hospital. It has been observed that the proposed technique achieved an accuracy of 98% in the detection and classification of EXs in color fundus images.


Algorithms , Diabetic Retinopathy/diagnostic imaging , Diabetic Retinopathy/diagnosis , Fundus Oculi , Optic Disk , Diabetic Retinopathy/pathology , Early Diagnosis , Exudates and Transudates , Humans , Image Interpretation, Computer-Assisted/methods , Image Processing, Computer-Assisted/methods , Machine Learning , Pattern Recognition, Automated/methods , Support Vector Machine
13.
Microsc Res Tech ; 82(3): 283-295, 2019 Mar.
Article En | MEDLINE | ID: mdl-30575213

Visual inspection for the quantification of malaria parasitaemiain (MP) and classification of life cycle stage are hard and time taking. Even though, automated techniques for the quantification of MP and their classification are reported in the literature. However, either reported techniques are imperfect or cannot deal with special issues such as anemia and hemoglobinopathies due to clumps of red blood cells (RBCs). The focus of the current work is to examine the thin blood smear microscopic images stained with Giemsa by digital image processing techniques, grading MP on independent factors (RBCs morphology) and classification of its life cycle stage. For the classification of the life cycle of malaria parasite the k-nearest neighbor, Naïve Bayes and multi-class support vector machine are employed for classification based on histograms of oriented gradients and local binary pattern features. The proposed methodology is based on inductive technique, segment malaria parasites through the adaptive machine learning techniques. The quantification accuracy of RBCs is enhanced; RBCs clumps are split by analysis of concavity regions for focal points. Further, classification of infected and non-infected RBCs has been made to grade MP precisely. The training and testing of the proposed approach on benchmark dataset with respect to ground truth data, yield 96.75% MP sensitivity and 94.59% specificity. Additionally, the proposed approach addresses the process with independent factors (RBCs morphology). Finally, it is an economical solution for MP grading in immense testing.


Erythrocytes/parasitology , Malaria/blood , Malaria/pathology , Parasite Load/methods , Parasitemia/parasitology , Plasmodium/growth & development , Automation/methods , Blood Specimen Collection/methods , Humans , Image Processing, Computer-Assisted , Life Cycle Stages , Malaria/parasitology
...