Shaobo Zhang , Lujie Zhang , Tao Peng , Qin Liu , Xiong Li
{"title":"VADP: Visitor-attribute-based adaptive differential privacy for IoMT data sharing","authors":"Shaobo Zhang , Lujie Zhang , Tao Peng , Qin Liu , Xiong Li","doi":"10.1016/j.cose.2025.104513","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Medical Things (IoMT) improves medical services by collecting and sharing patient data, but it also increases the risk of sensitive privacy breaches. To mitigate the risks, existing methods based on personalized differential privacy add different noises to the query results of each data visitor. However, these methods require additional computation to assign a constant privacy budget for each visitor, leading to low sharing efficiency and data utility. To overcome these challenges, this paper proposes a visitor-attribute-based adaptive differential privacy (VADP) data-sharing scheme. The scheme first constructs a quantifiable hierarchical access structure to control visitors’ access to data attributes precisely, and adaptively determines the privacy level for each data attribute by quantifying the matching degree between the visitor attributes and the access structure. To enhance sharing efficiency, the scheme devises a lightweight privacy budget calculation matrix to compute privacy budgets efficiently, reducing computational overhead. Additionally, integrating the VIKOR method enables the scheme to balance data privacy and utility flexibly. Experiments show that regarding the data utility, the VADP scheme reduces the average query error by 39.4% compared with non-adaptive differential privacy methods. It also decreases computational overhead in the data-sharing phase by 40.3% compared to the state-of-the-art schemes.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"156 ","pages":"Article 104513"},"PeriodicalIF":4.8000,"publicationDate":"2025-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825002020","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Medical Things (IoMT) improves medical services by collecting and sharing patient data, but it also increases the risk of sensitive privacy breaches. To mitigate the risks, existing methods based on personalized differential privacy add different noises to the query results of each data visitor. However, these methods require additional computation to assign a constant privacy budget for each visitor, leading to low sharing efficiency and data utility. To overcome these challenges, this paper proposes a visitor-attribute-based adaptive differential privacy (VADP) data-sharing scheme. The scheme first constructs a quantifiable hierarchical access structure to control visitors’ access to data attributes precisely, and adaptively determines the privacy level for each data attribute by quantifying the matching degree between the visitor attributes and the access structure. To enhance sharing efficiency, the scheme devises a lightweight privacy budget calculation matrix to compute privacy budgets efficiently, reducing computational overhead. Additionally, integrating the VIKOR method enables the scheme to balance data privacy and utility flexibly. Experiments show that regarding the data utility, the VADP scheme reduces the average query error by 39.4% compared with non-adaptive differential privacy methods. It also decreases computational overhead in the data-sharing phase by 40.3% compared to the state-of-the-art schemes.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.