Please use this identifier to cite or link to this item:
https://doi.org/10.1109/ICDE.2005.111
DC Field | Value | |
---|---|---|
dc.title | Privacy and ownership preserving of outsourced medical data | |
dc.contributor.author | Bertino, E. | |
dc.contributor.author | Yang, Y. | |
dc.contributor.author | Ooi, B.C. | |
dc.contributor.author | Deng, R.H. | |
dc.date.accessioned | 2013-07-04T07:57:23Z | |
dc.date.available | 2013-07-04T07:57:23Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Bertino, E.,Yang, Y.,Ooi, B.C.,Deng, R.H. (2005). Privacy and ownership preserving of outsourced medical data. Proceedings - International Conference on Data Engineering : 521-532. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/ICDE.2005.111" target="_blank">https://doi.org/10.1109/ICDE.2005.111</a> | |
dc.identifier.isbn | 0769522858 | |
dc.identifier.issn | 10844627 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40133 | |
dc.description.abstract | The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing of data have to be addressed: one is the privacy protection for individuals referred to in the data; the other is copyright protection over the data. In this paper, we present a unified framework that seamlessly combines techniques of binning and digital watermarking to attain the dual goals of privacy and copyright protection. Our binning method is built upon an earlier approach of generalization and suppression by allowing a broader concept of generalization. To ensure data usefulness, we propose constraining Binning by usage metrics that define maximal allowable information loss, and the metrics can be enforced off-line. Our watermarking algorithm watermarks the binned data in a hierarchical manner by leveraging on the very nature of the data. The method is resilient to the generalization attack that is specific to the binned data, as well as other attacks intended to destroy the inserted mark. We prove that watermarking could not adversely interfere with binning, and implemented the framework. Experiments were conducted, and the results show the robustness of the proposed framework. © 2005 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/ICDE.2005.111 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1109/ICDE.2005.111 | |
dc.description.sourcetitle | Proceedings - International Conference on Data Engineering | |
dc.description.page | 521-532 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.