Skip to main content

2019 | OriginalPaper | Buchkapitel

Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping

verfasst von : Xiaoning Liu, Xun Yi

Erschienen in: Computer Security – ESORICS 2019

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Evaluating medical time series (e.g., physiological sequences) under dynamic time warping (DTW) derives insights assisting biomedical research and clinical decision making. Due to the natural distribution of medical data, a collaboration among multiple healthcare institutes is required to carry out a reliable and quality medical judgment. Yet sharing medical data cross the boundaries of multiple institutions faces widespread privacy threats, along with increasingly stringent laws and privacy regulations nowadays. Addressing such demands, we propose a privacy-preserving system tailored for the DTW-based analysis over the decentralized medical time series sequences. Our system constructs a secure and scalable architecture to deliver comprehensive results from a joint data analytic task with privacy preservation. To accelerate complicated DTW query processing, our system adapts the advancement in secure multi-party computation (MPC) framework to realize encrypted DTW computation, decomposing complicated and iterative operations into atomic functions under suitable MPC primitives and optimized for DTW. Moreover, our system introduces a secure hybrid pruning strategy that diminishes the volume of time series sequences that are submitted before and processed within the encrypted DTW query. We implement a prototype and evaluate its performance on Amazon Cloud. The empirical evaluation demonstrates the feasibility of our system in practice.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
[20] suggests that the OT-based Multiplication Triples generation is faster than the Homomorphic encryption-based protocol by up to three orders of magnitude.
 
2
The DTW query is the process to find the sequences similar to the query based on the DTW distance within a given threshold.
 
3
Another way is building a monolithic circuit to solve a decision tree. This is not under our consideration, since it leads higher latency.
 
Literatur
4.
Zurück zum Zitat Aggarwal, G., et al.: Two can keep a secret: a distributed architecture for secure database services. In: Proceedings of CIDR (2005) Aggarwal, G., et al.: Two can keep a secret: a distributed architecture for secure database services. In: Proceedings of CIDR (2005)
5.
Zurück zum Zitat Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: Proceedings of ACM CCS (2013) Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: Proceedings of ACM CCS (2013)
6.
Zurück zum Zitat Atallah, M., Bykova, M., Li, J., Frikken, K., Topkara, M.: Private collaborative forecasting and benchmarking. In: Proceedings of WPES (2004) Atallah, M., Bykova, M., Li, J., Frikken, K., Topkara, M.: Private collaborative forecasting and benchmarking. In: Proceedings of WPES (2004)
7.
Zurück zum Zitat Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G.: Countering Gattaca: efficient and secure testing of fully-sequenced human genomes. In: Proceedings of ACM CCS (2011) Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G.: Countering Gattaca: efficient and secure testing of fully-sequenced human genomes. In: Proceedings of ACM CCS (2011)
8.
Zurück zum Zitat Barni, M., Failla, P., Lazzeretti, R., Sadeghi, A.R., Schneider, T.: Privacy-preserving ECG classification with branching programs and neural networks. IEEE TIFS 6, 452–468 (2011) Barni, M., Failla, P., Lazzeretti, R., Sadeghi, A.R., Schneider, T.: Privacy-preserving ECG classification with branching programs and neural networks. IEEE TIFS 6, 452–468 (2011)
9.
Zurück zum Zitat Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Proceedings of Crypto (1991) Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Proceedings of Crypto (1991)
10.
Zurück zum Zitat Begum, N., Ulanova, L., Wang, J., Keogh, E.: Accelerating dynamic time warping clustering with a novel admissible pruning strategy. In: Proceedings of ACM SIGKDD (2015) Begum, N., Ulanova, L., Wang, J., Keogh, E.: Accelerating dynamic time warping clustering with a novel admissible pruning strategy. In: Proceedings of ACM SIGKDD (2015)
11.
Zurück zum Zitat Berndt, D.J., Clifford, J.: Using dynamic time warping to find patterns in time series. In: Proceedings of KDD Workshop (1994) Berndt, D.J., Clifford, J.: Using dynamic time warping to find patterns in time series. In: Proceedings of KDD Workshop (1994)
13.
Zurück zum Zitat Bogdanov, D., Laud, P., Randmets, J.: Domain-polymorphic language for privacy-preserving applications. In: Proceedings of the ACM Workshop on Language Support for Privacy-Enhancing Technologies (2013) Bogdanov, D., Laud, P., Randmets, J.: Domain-polymorphic language for privacy-preserving applications. In: Proceedings of the ACM Workshop on Language Support for Privacy-Enhancing Technologies (2013)
14.
Zurück zum Zitat Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Proceedings of ESORICS (2008) Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Proceedings of ESORICS (2008)
15.
Zurück zum Zitat Brickell, J., Porter, D.E., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: Proceedings of ACM CCS (2007) Brickell, J., Porter, D.E., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: Proceedings of ACM CCS (2007)
16.
Zurück zum Zitat Camara, C., Peris-Lopez, P., Tapiador, J.E.: Security and privacy issues in implantable medical devices: a comprehensive survey. J. Biomed. Inform. 55, 272–289 (2015)CrossRef Camara, C., Peris-Lopez, P., Tapiador, J.E.: Security and privacy issues in implantable medical devices: a comprehensive survey. J. Biomed. Inform. 55, 272–289 (2015)CrossRef
17.
Zurück zum Zitat Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067 (2000) Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067 (2000)
18.
Zurück zum Zitat Chen, Y., Hu, B., Keogh, E., Batista, G.E.: DTW-D: time series semi-supervised learning from a single example. In: Proceedings of ACM SIGKDD (2013) Chen, Y., Hu, B., Keogh, E., Batista, G.E.: DTW-D: time series semi-supervised learning from a single example. In: Proceedings of ACM SIGKDD (2013)
19.
Zurück zum Zitat Cho, H., Wu, D.J., Berger, B.: Secure genome-wide association analysis using multiparty computation. Nat. Biotechnol. 36(6), 547–551 (2018)CrossRef Cho, H., Wu, D.J., Berger, B.: Secure genome-wide association analysis using multiparty computation. Nat. Biotechnol. 36(6), 547–551 (2018)CrossRef
20.
Zurück zum Zitat Demmler, D., Schneider, T., Zohner, M.: ABY-a framework for efficient mixed-protocol secure two-party computation. In: Proceedings of NDSS (2015) Demmler, D., Schneider, T., Zohner, M.: ABY-a framework for efficient mixed-protocol secure two-party computation. In: Proceedings of NDSS (2015)
22.
Zurück zum Zitat Huang, Y., Malka, L., Evans, D., Katz, J.: Efficient privacy-preserving biometric identification. In: Proceedings of NDSS (2011) Huang, Y., Malka, L., Evans, D., Katz, J.: Efficient privacy-preserving biometric identification. In: Proceedings of NDSS (2011)
23.
Zurück zum Zitat Keogh, E.: Exact indexing of dynamic time warping. In: Proceedings of VLDB (2002)CrossRef Keogh, E.: Exact indexing of dynamic time warping. In: Proceedings of VLDB (2002)CrossRef
26.
Zurück zum Zitat Malkhi, D., Nisan, N., Pinkas, B., Sella, Y., et al.: Fairplay-secure two-party computation system. In: Proceedings of USENIX Security (2004) Malkhi, D., Nisan, N., Pinkas, B., Sella, Y., et al.: Fairplay-secure two-party computation system. In: Proceedings of USENIX Security (2004)
27.
Zurück zum Zitat Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: Proceedings of IEEE S&P (2017) Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: Proceedings of IEEE S&P (2017)
28.
Zurück zum Zitat Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: Proceedings of IEEE S&P (2013) Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: Proceedings of IEEE S&P (2013)
29.
Zurück zum Zitat Rakthanmanon, T., et al.: Searching and mining trillions of time series subsequences under dynamic time warping. In: Proceedings of ACM SIGKDD (2012) Rakthanmanon, T., et al.: Searching and mining trillions of time series subsequences under dynamic time warping. In: Proceedings of ACM SIGKDD (2012)
30.
Zurück zum Zitat Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492–1496 (2014)CrossRef Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492–1496 (2014)CrossRef
31.
Zurück zum Zitat Salem, A., Berrang, P., Humbert, M., Backes, M.: Privacy-preserving similar patient queries for combined biomedical data. Proc. PETS 2019, 47–67 (2019) Salem, A., Berrang, P., Humbert, M., Backes, M.: Privacy-preserving similar patient queries for combined biomedical data. Proc. PETS 2019, 47–67 (2019)
32.
Zurück zum Zitat Tkachenko, O., Weinert, C., Schneider, T., Hamacher, K.: Large-scale privacy-preserving statistical computations for distributed genome-wide association studies. In: Proceedings of ACM AsiaCCS (2018) Tkachenko, O., Weinert, C., Schneider, T., Hamacher, K.: Large-scale privacy-preserving statistical computations for distributed genome-wide association studies. In: Proceedings of ACM AsiaCCS (2018)
33.
Zurück zum Zitat Wang, X.S., Huang, Y., Zhao, Y., Tang, H., Wang, X., Bu, D.: Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In: Proceedings of ACM CCS (2015) Wang, X.S., Huang, Y., Zhao, Y., Tang, H., Wang, X., Bu, D.: Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In: Proceedings of ACM CCS (2015)
35.
Zurück zum Zitat Yao, A.C.C.: How to generate and exchange secrets. In: Proceedings of IEEE FOCS (1986) Yao, A.C.C.: How to generate and exchange secrets. In: Proceedings of IEEE FOCS (1986)
36.
Zurück zum Zitat Yi, X., Bertino, E., Rao, F.Y., Bouguettaya, A.: Practical privacy-preserving user profile matching in social networks. In: Proceedings of IEEE ICDE (2016) Yi, X., Bertino, E., Rao, F.Y., Bouguettaya, A.: Practical privacy-preserving user profile matching in social networks. In: Proceedings of IEEE ICDE (2016)
37.
Zurück zum Zitat Zheng, W., Popa, R., Gonzalez, J.E., Stoica, I.: Helen: Maliciously secure coopetitive learning for linear models. In: Proceedings of IEEE S&P (2019) Zheng, W., Popa, R., Gonzalez, J.E., Stoica, I.: Helen: Maliciously secure coopetitive learning for linear models. In: Proceedings of IEEE S&P (2019)
38.
Zurück zum Zitat Zheng, Y., Duan, H., Tang, X., Wang, C., Zhou, J.: Denoising in the dark: privacy-preserving deep neural network based image denoising. IEEE TDSC (2019) Zheng, Y., Duan, H., Tang, X., Wang, C., Zhou, J.: Denoising in the dark: privacy-preserving deep neural network based image denoising. IEEE TDSC (2019)
39.
Zurück zum Zitat Zheng, Y., Duan, H., Wang, C.: Learning the truth privately and confidently: encrypted confidence-aware truth discovery in mobile crowdsensing. IEEE TIFS 13(10), 2475–2489 (2018) Zheng, Y., Duan, H., Wang, C.: Learning the truth privately and confidently: encrypted confidence-aware truth discovery in mobile crowdsensing. IEEE TIFS 13(10), 2475–2489 (2018)
40.
Zurück zum Zitat Zhu, H., Meng, X., Kollios, G.: Privacy preserving similarity evaluation of time series data. In: Proceedings of EDBT (2014) Zhu, H., Meng, X., Kollios, G.: Privacy preserving similarity evaluation of time series data. In: Proceedings of EDBT (2014)
Metadaten
Titel
Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping
verfasst von
Xiaoning Liu
Xun Yi
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-29962-0_21

Premium Partner