{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:33:22Z","timestamp":1759336402942,"version":"3.40.5"},"reference-count":46,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T00:00:00Z","timestamp":1601337600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,29]]},"abstract":"<p>Information leakage in the medical industry has become an urgent problem to be solved in the field of Internet security. However, due to the need for automated or semiautomated authorization management for privacy protection in the big data environment, the traditional privacy protection model cannot adapt to this complex open environment. Although some scholars have studied the risk assessment model of privacy disclosure in the medical big data environment, it is still in the initial stage of exploration. This paper analyzes the key indicators that affect medical big data security and privacy leakage, including user access behavior and trust, from the perspective of users through literature review and expert consultation. Also, based on the user\u2019s historical access information and interaction records, the user\u2019s access behavior and trust are quantified with the help of information entropy and probability, and a definition expression is given explicitly. Finally, the entire experimental process and specific operations are introduced in three aspects: the experimental environment, the experimental data, and the experimental process, and then, the predicted results of the model are compared with the actual output through the 10-fold cross verification with Matlab. The results prove that the model in this paper is feasible. In addition, the method in this paper is compared with the current more classical medical big data risk assessment model, and the results show that when the proportion of illegal users is less than 15%, the model in this paper is more superior in terms of accuracy and recall.<\/p>","DOI":"10.1155\/2020\/5610839","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T16:50:59Z","timestamp":1601398259000},"page":"1-18","source":"Crossref","is-referenced-by-count":4,"title":["A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4266-4281","authenticated-orcid":false,"given":"Mingyue","family":"Shi","sequence":"first","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, Kunming, China"},{"name":"Key Laboratory of Service Computing and Security Management of Yunnan Provincial Universities, Kunming, China"},{"name":"Kunming Key Laboratory of Information Economy & Information Management, Kunming, China"}]},{"given":"Rong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Sen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"volume-title":"Big Data of Health Care","year":"2018","author":"Jin","key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/icdmw.2011.140"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tcbb.2018.2854782"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0446-0"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0498-7"},{"issue":"9","key":"6","first-page":"3201","article-title":"Review of differential privacy protection research","volume":"29","author":"Li","year":"2014","journal-title":"Journal of Computer Applications"},{"issue":"1","key":"7","first-page":"101","article-title":"Differential privacy protection and application","volume":"37","author":"Xiong","year":"2014","journal-title":"Journal of Computers"},{"issue":"5","key":"8","first-page":"1549","article-title":"Application of differential privacy protection in recommendation system","author":"Xian","year":"2016","journal-title":"Journal of Computer Applications"},{"volume-title":"Research on Privacy Protection and its Key Technologies in Big Data Environment","year":"2017","author":"Wu","key":"9"},{"issue":"24","key":"10","first-page":"163","article-title":"Application of differential privacy protection in medical big data","author":"Bai","year":"2017","journal-title":"Electronic Technology and Software Engineering"},{"issue":"7","key":"11","first-page":"652","article-title":"Research on security and protection system of big data based on cryptography","volume":"3","author":"Zhang","year":"2017","journal-title":"Information Security Research"},{"issue":"7","key":"12","first-page":"2163","article-title":"Attribute-based data access control scheme in wireless body area network","volume":"32","author":"Tian","year":"2015","journal-title":"Journal of Computer Applications"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2016.2544805"},{"volume-title":"Research on Privacy Protection Technology of Wireless Mobile Medical Monitoring Network","year":"2014","author":"Xing","key":"14"},{"key":"15","first-page":"254","article-title":"Research on privacy protection technology of medical grid","volume":"5","author":"Wei","year":"2012","journal-title":"Computer Technology and Development"},{"issue":"31","key":"16","first-page":"181","article-title":"Research on regional health medical data sharing and privacy protection strategy","author":"Wang","year":"2017","journal-title":"Technology Innovation and Application"},{"issue":"16","key":"17","first-page":"51","article-title":"Challenges to privacy protection of medical data in the big data environment and related technologies","author":"Chen","year":"2014","journal-title":"Electronic Technology and Software Engineering"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.387"},{"issue":"9","key":"19","first-page":"7","article-title":"Life cycle and governance of big data in medical industry","volume":"34","author":"Gao","year":"2013","journal-title":"Journal of Medical Information"},{"issue":"6","key":"20","first-page":"119","article-title":"Ethical issues in the construction of medical big data","author":"Liu","year":"2015","journal-title":"Ethics Research"},{"volume-title":"Broader Access Models for Realizing Information DomiCorporation","year":"2004","author":"JASON Report: JSR-04-132","key":"21"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.41"},{"first-page":"250","article-title":"Risk-based access control systems built on fuzzy inferences","author":"Ni","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2007.21"},{"key":"25","first-page":"140","article-title":"Risk aware role-based access control","volume":"7071","author":"Chen","year":"2011","journal-title":"Security and Trust Management"},{"key":"26","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/ECUMN.2007.19","article-title":"Enforcing access control using risk assessment","volume":"2","author":"Diep","year":"2007","journal-title":"Universal Multiservice Networks"},{"first-page":"1047","article-title":"Using risk in access control for cloud-accessed eHealth","author":"Sharma","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966969"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.02.006"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/265132"},{"issue":"12","key":"31","first-page":"190","article-title":"Risk-adaptive access control model for medical big data","volume":"36","author":"Hui","year":"2015","journal-title":"Journal of Communications"},{"volume-title":"Medical Big Data Privacy Security Risk Assessment in Cloud Environment","year":"2018","author":"Zhang","key":"32"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2943547"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2013.66"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/5254.850830"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s10729-019-09490-4"},{"volume-title":"Fuzzy Control Technology","year":"2003","author":"Lian","key":"37"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3574675"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.3390\/pr7040182"},{"volume-title":"Fuzzy Control and MATLAB Simulation","year":"2018","author":"Shi","key":"40"},{"volume-title":"Introduction to Artificial Neural Networks","year":"2001","author":"Jiang","key":"41"},{"volume-title":"MATLAB-aided Fuzzy System Design","year":"2002","author":"Wu","key":"42"},{"volume-title":"Neural, Fuzzy, Predictive Control and Their MATLAB Implementation","year":"2018","author":"Li","key":"43"},{"issue":"6","key":"44","first-page":"117","article-title":"Application research of neural network in information security risk assessment","volume":"28","author":"Niu","year":"2011","journal-title":"Computer Simulation"},{"issue":"2","key":"45","article-title":"Access control scheme based on multi-attribute fuzzy trust evaluation in cloud manufacturing environment","volume":"24","author":"Liu","year":"2018","journal-title":"Computer Integrated Manufacturing Systems"},{"issue":"1","key":"46","first-page":"1","article-title":"Quantitative method of access control risk based on fuzzy neural network","volume":"8","author":"Shi","year":"2018","journal-title":"Intelligent Computer and Application"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5610839.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5610839.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5610839.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T16:51:31Z","timestamp":1601398291000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/5610839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,29]]},"references-count":46,"alternative-id":["5610839","5610839"],"URL":"https:\/\/doi.org\/10.1155\/2020\/5610839","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,9,29]]}}}