A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory

Mingyue Shi,Rong Jiang,Wei Zhou,Sen Liu,Savio Sciancalepore
DOI: https://doi.org/10.1155/2020/5610839
IF: 1.968
2020-09-29
Security and Communication Networks
Abstract:Information leakage in the medical industry has become an urgent problem to be solved in the field of Internet security. However, due to the need for automated or semiautomated authorization management for privacy protection in the big data environment, the traditional privacy protection model cannot adapt to this complex open environment. Although some scholars have studied the risk assessment model of privacy disclosure in the medical big data environment, it is still in the initial stage of exploration. This paper analyzes the key indicators that affect medical big data security and privacy leakage, including user access behavior and trust, from the perspective of users through literature review and expert consultation. Also, based on the user’s historical access information and interaction records, the user’s access behavior and trust are quantified with the help of information entropy and probability, and a definition expression is given explicitly. Finally, the entire experimental process and specific operations are introduced in three aspects: the experimental environment, the experimental data, and the experimental process, and then, the predicted results of the model are compared with the actual output through the 10-fold cross verification with Matlab. The results prove that the model in this paper is feasible. In addition, the method in this paper is compared with the current more classical medical big data risk assessment model, and the results show that when the proportion of illegal users is less than 15%, the model in this paper is more superior in terms of accuracy and recall.
computer science, information systems,telecommunications
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is the privacy leakage risk assessment in the medical big data environment. Specifically, the paper focuses on how to effectively assess and manage the risk of privacy leakage in the medical big data environment, especially in cases where automated or semi - automated authorization management is required to protect privacy. Traditional privacy protection models are difficult to adapt to such a complex open environment. Therefore, this paper proposes a privacy risk assessment model based on the adaptive neuro - fuzzy theory to meet this challenge. ### Main research questions 1. **Security and privacy leakage of medical big data**: With the development of information technology, the application of medical big data is becoming more and more widespread, but the resulting data leakage problem is also becoming more and more serious. By analyzing user access behavior and trustworthiness, the paper proposes a model for assessing the privacy leakage risk of medical big data. 2. **Automated or semi - automated authorization management**: In the big data environment, traditional privacy protection models cannot adapt to the complex open environment, and a new method is required to achieve automated or semi - automated authorization management. 3. **Definition and quantification of risk quantification indicators**: The paper quantifies user access behavior and trustworthiness through mathematical methods such as information entropy and probability, thereby constructing a risk assessment model. ### Solutions 1. **Introducing user trust values**: Due to the particularity of the medical field, it is difficult to judge whether a user is an "illegal user" solely based on the user's access behavior. Therefore, the paper introduces the user's trust value as an important indicator for risk assessment, and jointly assesses the user's access request with the user's access behavior to reduce the possibility of system misjudgment. 2. **Establishing an adaptive fuzzy neural network model**: The paper uses mathematical methods such as information entropy, neural network, fuzzy theory and probability to establish an adaptive fuzzy neural network model. First, use information entropy and probability to quantify risk indicators, and then combine the knowledge expression ability of fuzzy theory and the self - learning ability of neural network to make the data processing process more intuitive and be able to dynamically predict risks according to scene changes. ### Specific steps of the model 1. **Formal definition of risk indicators**: - **User access behavior**: Use information entropy to describe user access behavior, and define the probability of users choosing work goals and accessing medical records through historical access records, and then calculate the information entropy of choosing work goals and accessing medical records. - **User trust**: According to the way of obtaining trust, user trust is divided into direct trust and recommended trust. Direct trust is calculated through historical interaction records between users, and recommended trust is indirectly established by introducing acquaintance relationships. 2. **Quantifying user access behavior**: - **Information entropy of choosing work goals** (EFCWO): \[ H_o(s_j, u_i)=-\sum_{k = 1}^{I_o}P(o_k|u_i, s_j)\times\log P(o_k|u_i, s_j) \] - **Information entropy of accessing medical records** (EATMR): \[ H_m(o_k, u_i)=-\sum_{l = 1}^{I_m}P(m_l|u_i, s_j, o_k)\times\log P(m_l|u_i, s_j, o_k) \] 3. **Quantifying user trust**: - **Direct trust**: \[ DT(u_i, u_j)=\begin{cases}\frac{m}{m + n}\left(\delta\left(\frac{1}{m+1}\right)\right),&\text{if }m + n>\pi\\0.5+\frac{m - n}{2\pi}\left(\delta\left(\frac{1}{m+1}\right)\right),&\text{if }m + n\leq\pi\end{cases} \] - **Recommended trust**: Indirectly establish trust relationships by introducing acquaintance relationships.