{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T11:06:51Z","timestamp":1769339211007,"version":"3.49.0"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T00:00:00Z","timestamp":1623801600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61902203"],"award-info":[{"award-number":["61902203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Research and Development Plan\u2014Major Scientific and Technological Innovation Projects of ShanDong Province","award":["2019JZZY020101"],"award-info":[{"award-number":["2019JZZY020101"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>The study aims at discussing the security of medical data in the Internet era. By using k-anonymity (K-A) and differential privacy (DP), an algorithm model combining K-A and DP was proposed, which was simulated through the experiments. In the Magic and EIA datasets, the algorithm constructed was compared with K-A and the L-diversity model to verify the performance of the model. The model constructed based on DP had the lowest privacy-leakage risks, which increased with the number of identifiers in the Magic and EIA datasets, and the information disclosure was the least. In addition, in its usability analysis, it was found that its value was the most obviously improved and its operation efficiency was the highest. The K-A-DP algorithm can effectively reduce the risk of privacy leakage and information loss, and has achieved excellent results. Despite the deficiencies in the process of the experiment, the study still provides a reference for solving the problem of medical data security.<\/jats:p>","DOI":"10.1145\/3382769","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:39:34Z","timestamp":1594125574000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["The Security of Medical Data on Internet Based on Differential Privacy Technology"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2525-3074","authenticated-orcid":false,"given":"Zhihan","family":"Lv","sequence":"first","affiliation":[{"name":"Qingdao University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5179-2496","authenticated-orcid":false,"given":"Francesco","family":"Piccialli","sequence":"additional","affiliation":[{"name":"University of Naples Federico II, Naples, Italy"}]}],"member":"320","published-online":{"date-parts":[[2021,6,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1158\/1078-0432.CCR-16-1773"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3899\/jrheum.171361"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2196\/mental.5324"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2016.03.004"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep44128"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41416-018-0334-0"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2337\/dc18-0623"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 2016 International Conference on Intelligent Systems Engineering (ICISE\u201916)","author":"Ullah K.","unstructured":"K. Ullah , M. A. Shah , and S. Zhang . 2016. Effective ways to use Internet of Things in the field of medical and smart health care . In Proceedings of the 2016 International Conference on Intelligent Systems Engineering (ICISE\u201916) . IEEE, Los Alamitos, CA, 372\u2013379. K. Ullah, M. A. Shah, and S. Zhang. 2016. Effective ways to use Internet of Things in the field of medical and smart health care. In Proceedings of the 2016 International Conference on Intelligent Systems Engineering (ICISE\u201916). IEEE, Los Alamitos, CA, 372\u2013379."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2789329"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/431047"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8308687"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 2016 IEEE International Conference on Communication, Networks, and Satellite (COMNETSAT\u201916)","author":"Jusak J.","unstructured":"J. Jusak , H. Pratikno , and V. H. Putra . 2016. Internet of Medical Things for cardiac monitoring: Paving the way to 5G mobile networks . In Proceedings of the 2016 IEEE International Conference on Communication, Networks, and Satellite (COMNETSAT\u201916) . IEEE, Los Alamitos, CA, 75\u201379. J. Jusak, H. Pratikno, and V. H. Putra. 2016. Internet of Medical Things for cardiac monitoring: Paving the way to 5G mobile networks. In Proceedings of the 2016 IEEE International Conference on Communication, Networks, and Satellite (COMNETSAT\u201916). IEEE, Los Alamitos, CA, 75\u201379."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2017.1306152"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2461555"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3332274"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3329189.3329229"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8308687"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.4993"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.6645"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701148"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1158\/1078-0432.CCR-16-0493"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.03.005"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"M. Kantarcioglu and E. Ferrari. 2019. Research challenges at the intersection of big data security and privacy. Frontiers in Big Data 2 1 (2019).  M. Kantarcioglu and E. Ferrari. 2019. Research challenges at the intersection of big data security and privacy. Frontiers in Big Data 2 1 (2019).","DOI":"10.3389\/fdata.2019.00001"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2016070101"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757844"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0110-7"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.008"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep21587"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.23876\/j.krcp.2017.36.1.3"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(17)33095-7"},{"key":"e_1_2_1_34_1","first-page":"11","article-title":"Developing a framework for evaluating the patient engagement, quality, and safety of mobile health applications","volume":"5","author":"Singh K.","year":"2016","unstructured":"K. Singh , K. Drouin , L. P. Newmark , 2016 . Developing a framework for evaluating the patient engagement, quality, and safety of mobile health applications . Issue Brief (Commonw Fund) 5 , 1 (2016), 11 . K. Singh, K. Drouin, L. P. Newmark, et al. 2016. Developing a framework for evaluating the patient engagement, quality, and safety of mobile health applications. Issue Brief (Commonw Fund) 5, 1 (2016), 11.","journal-title":"Issue Brief (Commonw Fund)"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1158\/1078-0432.CCR-16-1293"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/jan.13387"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5603\/CJ.a2017.0137"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12954-017-0135-4"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/0004867418772338"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/2168479018815455"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2830340"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2789329"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3013520"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1067-4"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991561.2991566"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773646"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055527"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2775248"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2830340"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2512282"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525398"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.06.020"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382769","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3382769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:50Z","timestamp":1750197770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,16]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3382769"],"URL":"https:\/\/doi.org\/10.1145\/3382769","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,16]]},"assertion":[{"value":"2019-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}