<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Random Projection to Preserve Patient Privacy</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Aris</forename><surname>Anagnostopoulos</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Sapienza University of Rome</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fabio</forename><surname>Angeletti</surname></persName>
							<email>angeletti@diag.uniroma1.it</email>
							<affiliation key="aff1">
								<orgName type="institution">Sapienza University of Rome</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Federico</forename><surname>Arcangeli</surname></persName>
							<email>federico.arcangeli1@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">Sapienza University of Rome</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Chris</forename><surname>Schwiegelshohn</surname></persName>
							<email>schwiegelshohn@diag.uniroma1.it</email>
							<affiliation key="aff3">
								<orgName type="institution">Sapienza University of Rome</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Vitaletti</surname></persName>
							<email>vitaletti@diag.uniroma1.it</email>
							<affiliation key="aff4">
								<orgName type="institution">Sapienza University of Rome</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Random Projection to Preserve Patient Privacy</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">9161F2BE081FFFF107AB68E906C17AA5</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T19:10+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>With the availability of accessible and widely used cloud services, it is natural that large components of healthcare systems migrate to them; for example, patient databases can be stored and processed in the cloud. Such cloud services provide enhanced flexibility and additional gains, such as availability, ease of data share, and so on. This trend poses serious threats regarding the privacy of the patients and the trust that an individual must put into the healthcare system itself. Thus, there is a strong need of privacy preservation, achieved through a variety of different approaches.</p><p>In this paper, we study the application of a random projection-based approach to patient data as a means to achieve two goals:</p><p>(1) provably mask the identity of users under some adversarial-attack settings, (2) preserve enough information to allow for aggregate data analysis and application of machinelearning techniques. As far as we know, such approaches have not been applied and tested on medical data. We analyze the tradeoff between the loss of accuracy on the outcome of machine-learning algorithms and the resilience against an adversary. We show that random projections proved to be strong against known input/output attacks while offering high quality data, as long as the projected space is smaller than the original space, and as long as the amount of leaked data available to the adversary is limited.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>During the recent years, we witnessed the tremendous progress made in the field of wireless sensor networks. This paved the way and facilitated the wide adoption of small electronic devices with interconnection capabilities. These devices composed the majority of the so-called Internet of Things (IoT). The IoT is a highly dynamic and radically distributed networked system, composed of an incredible high number of objects <ref type="bibr" target="#b19">[MSDPC12]</ref>. It is vastly considered as one of the most expanding area within future technologies and it is attracting vast attention in different industry applications <ref type="bibr" target="#b17">[LL15]</ref>, ranging from smart cities to home automation, farming, and many more fields of application. Ubiquitous sensors, smart objects and devices involved in IoT can generate a tremendous amount of data [JDXC + 14]. This flow of data requires robust, available and fast storage solutions and builds the bases to very effective and powerful algorithms in the fields of machine learning and data mining [CDW + 15].</p><p>Electronics health-care solutions and, generally speaking, the Internet of Health Things (IoHT) follows the same trend. About 73% of healthcare executives say that IoHT is a disrupting techology for the next years and it is becoming one of the most funded areas in IoT. Pervasive IoHT enables cost savings for both the administrations and the individuals, but on the other hand it has some barriers, like: privacy and security concerns, lack of skilled workers, poor interoperability and more <ref type="bibr">[acc17]</ref>.</p><p>Given the sensitive nature of healthcare data, there is a strong need to protect the information of the patients. Furthermore, the recent adoption of General Data Protection Regulation (GDPR) strengthens data protection and now it must be applied to any organisation or individual that collects and processes information related to EU citizens, regardless where the data is physically stored or where they are based <ref type="bibr">[Alb16,</ref><ref type="bibr" target="#b26">Tan16]</ref>. At the same time, analysis of such data are crucial for medical research and the drug industry. Consequently, there is a need to design approaches that allow data processing without exposing the personal underlying information.</p><p>For this reason, there has been a series of techniques for perturbing data such that information on individual data points cannot be leaked, while aggregate information is preserved. Examples of such approaches are k-anonymity <ref type="bibr" target="#b25">[SS98]</ref> and differential privacy <ref type="bibr">[Dwo06]</ref>. The various approaches put different importance on the privacy requirements; for instance, differential privacy attempts to alter the data such as to provide very strong privacy guarantees, typically, without specifying the usefulness of the resulting data. for general-purpose data analysis.</p><p>In this paper we apply a method, which can be found in <ref type="bibr" target="#b14">[Liu07a]</ref>, where the explicit goal is to obtain a dataset that remains useful after the perturbation (still providing some privacy guarantees). More specifically, our approach is based on random projections (RP), a technique that is typically applied primarily for efficiency reasons. It is based on a fundamental result from the work of Johnson and Lindenstrauss <ref type="bibr" target="#b5">[JL84]</ref> and the idea is the following: Assume that we have large amounts of data (n datapoints), lying on a high-dimensional space. Then, if we project each point to a random subspace of dimension O(log n/ 2 ), with high probability all pairwise distances between the data points are preserved within a factor of 1 ± . This technique has found multiple applications in streaming algorihtms, in finding nearest neighbors in high-dimensional spaces, in reducing the dimension of databases, and so on.</p><p>Our idea of applying a random projection approach on privacy-preserving data mining is the following. Assume that we have the records of multiple patients. Then we can consider a random projection of these data. The result of Johnson and Lindenstrauss guarantees that if we execute algorithms that depend on the pairwise distances on the data (e.g., several clustering or classification algorithms), then the results obtained are with high probability similar to those obtained on the real data set (and the error can be quantified). Furthermore, because the projections are ran-dom, one cannot use the projected data to obtain the real data: each datapoint appears to be random. This, unless the attacker has some significant power. This trade off is studied in previous works (e.g. [BBM16], <ref type="bibr" target="#b14">[Liu07a]</ref>).</p><p>It is not clear a priori that this approach could work in the application on medical dataset that interests us. For instance, the lemma by Johnson and Lindenstrauss is typically applied on settings where the original data lie on a very high-dimensional space. However, in practice, the original dimension may be low (for instance in our dataset it is about 50). In this paper we look at this and other issues by applying the random projection to a dataset containing information about 70K cases of diabetes [SDG + 14]. We show that it is possible to reduce the dimensionality of the data and still obtain accuracy scores that are comparable with the ones obtained from the original non-projected data. At the same time, we also show how sensible and private patient information such their age or gender are safe against attacks that try to reconstruct the mapping between the original data and the projected data after applying random projections.</p><p>Structure of the paper. The rest of this paper is organized as follows. In Section 2 we present current solutions and the state of the art on random projections and other privacy-preserving techniques. In Section 3 we present the goals of our work and the approach we used for achieving them, leveraging random projections. In Section 4 we show our experimental results, where we explore the limits of our approach both in terms of accuracy and privacy protection. We conclude in Section 5 where we also propose future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">State of the art</head><p>Data leakages are very common <ref type="bibr" target="#b27">[Wik14]</ref>. In this work, we are more interested in reducing the ability of an attacker to reconstruct non-yet-leaked data from the leaked one. Within medical premises, there are multiple individuals who could obtain access to protected information from the rightous doctor to untrustful workers. This could lead to multiple entities knowing protected personal health information.</p><p>Before 2003, with the enforcing of HIPAA rules, some private medical information were regularly shared among professional [Bro00]. Following the guidelines from Health Insurance Portability and Accountability Act (HIPAA) [fDCP + 03], the US government made the first concrete attempt to mitigate the chance of re-identification of patients. In 2009, it was clear that HIPAA is not sufficient to protect the privacy of an individual. In fact, the HIPAA was not able to protect the user personal information after the anonimization process that substituted HIPAA parameters with IDs. In a famous case <ref type="bibr" target="#b20">[New09]</ref>, some researchers were able to re-identify users and also their sexual orientation and other information. Moreover, the availability of correlated data (coming from the same source or other sources) could greatly help to identify a patient. Data breaches continue to increase year after year, between 2005 and 2014, only in the US, more than 26 million of people had some form of personal health information leaked <ref type="bibr" target="#b27">[Wik14]</ref>.</p><p>Therefore, more elaborate tecniques, which add noise to the data, have been developed in the last years to protect users' privacy and still maintain a good level of accuracy when exploring and analyzing the data. One of these is differential privacy [Dwo06]. This approach focuses on providing statistically coherent responses querying a database, i.e. third parties are interested to query for information about a sample of a population, not a single individual. Instead, we are interested also in providing data about a specific individual, for example investigating if he or she is suitable for a clinical trial.</p><p>In <ref type="bibr" target="#b9">[KKMM12a]</ref> the authors proved that the Johnson-Lindenstrauss transform can be used as an alternative approach to achieve differential privacy. The method is then compared against other techniques, such as adding Gaussian noise to data or randomized response. The proposed approach has superior accuracy bounds than the others, while still keeping secure the privacy of the records. The authors also criticize the work of Liu et al. about releasing data to third parties after applying random projections in order to protect sensitive information while still preserving accuracy of different data mining algorithms: an adversary that has some background knowledge can infer approximations of the original data. We address this issue in the scenario of known input-output data (section 3.2) and show how in real world scenario regarding medical data, under reasonable assumptions for the power of the adversary, it is difficult for an attacker to discover private information from projected records.</p><p>In the literature there exist a very large number of works regarding the re-identification of person starting from various data, within some degree it is called "breaking the k-anonimity". For example in <ref type="bibr" target="#b21">[NS08]</ref> the authors presents a method to re-identify a user from its preferences.</p><p>In this paper, we aim at investigating to what extent RPs can provide useful data for machine learning algorithms (e.g. classification) on a group of potential patients while preserving at the same time the privacy of individuals. RPs have been employed in a number of healthcare applications, for example to segment tumor areas <ref type="bibr" target="#b8">[KEDR12]</ref>, to enhance tomography <ref type="bibr" target="#b2">[FMR10]</ref>, to cluster DNA microarrays[AV09] or to classify cancer <ref type="bibr" target="#b28">[XLZW16]</ref>.</p><p>In <ref type="bibr" target="#b16">[LKR06]</ref>, RPs were used to mask clear data projecting them in smaller spaces, while in [BBM16] and <ref type="bibr" target="#b10">[KKMM12b]</ref>, similarly to our work, the authors discuss how to exploit RPs to enhance data privacy. The authors in <ref type="bibr" target="#b16">[LKR06]</ref> also discuss the utility of the RP in reducing complexity of problems while maintaining the usefulness of the projected data for algorithms. It is anticipated that by 2020 there will be more than 26 billion devices involved in IoT related applications <ref type="bibr" target="#b23">[RvdM14]</ref>. Surely, not all of them will be part of the healthcare field, however we expect a very large amount of information to process. The usefulness of RP in reducing problem complexity (or resource requirements) is well understood and exploited as useful resource in the literature [CEM + 15, LKR06, FB03, BZD10, AWY + 99]. For example, in [FB03], the authors explore some ways to reduce high dimensional data for clustering while, in <ref type="bibr" target="#b12">[LF12]</ref>, is presented a work on classification of small patches of images from a very large database that takes advantage of the properties offered by RPs.</p><p>During the last two decades, the contribution of machine learning and data mining algorithms in healthcare applications became more frequent year after year. This is well demonstrated in the literature, for example in [CHH + 17, MP99, ZWC + 09, HHC + 14]. One last aspect to consider is the chance to link together multiple datasets. For example in [LJJ + 09], the authors presented the infrastructure of a databank in order to enable record-linkage research studies. This linkage on one hand could deeply help the development of newer treatments or drugs, but on the other hand poses threats to the privacy of the individuals.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Problem Formulation</head><p>We consider a reference scenario in which a group of users, characterized by private features, are potentially suitable for a clinical trial. Only a limited number of users in the group will be actually enrolled in the trial. For the enrolled users, namely the patients, the private features will be eventually made public to participate to the clinical trial in the most effective way. Some knowledge on the group is of primary importance for the researchers to understand the size and the characteristics of potential patients. In general, users are well disposed to support this need of the researchers provided that their privacy is preserved. The main problem we want to address in this paper is:</p><p>Can we learn something on the group of users as a whole, while preserving the privacy of the individuals who will not participate in the trial?</p><p>More formally, we consider a group of n users, where each user u is characterized by m features. We represent the corresponding dataset as a matrix X ∈ R m×n , with m rows (the features) and n columns (the users). As already observed, in the era of big data, m and n can be particularly big.</p><p>Giannella et al. <ref type="bibr" target="#b3">[GLH13]</ref> show how it is possible to break the privacy in some contexts of distance preserving mappings. Liu <ref type="bibr" target="#b15">[Liu07b]</ref> instead, highlights how mappings that do preserve distances within certain bounds like random projections can boost the privacy guarantees. We will apply these techniques in order to prove that users' privacy can be kept safe against malicious attackers.</p><p>We are interested in understanding to what extent the random projection technique, which has been originally conceived to reduce the dimensionality of a dataset, can also be used to preserve the privacy of the users. In particular, we apply a random projection to X, such that if R ∈ R k×m is the random-projection matrix Y = RX is the transformed matrix after applying the random projection, with Y ∈ R k×n . We denote by x u i the column in X associated to user u i , and with y u i the corresponding column in Y . In the scenario we are describing the projected matrix Y is known to the public, it is indeed the dataset on which researchers try to distill information on the group; the transformation matrix R and the original data X are private. Some columns of X may become public once the corresponding users will eventually decide to participate to a clinical trial, in other words some pairs (x u i , y u i ) will become public. We can now better describe the problem, splitting it into two sub-problems:</p><p>Accuracy. Can we learn something on the group exploiting Y ? Here we want to understand if the results of some machine-learning algorithms on Y are a good approximation of the ones obtained on X. If we answer positively to this question, we can at least conclude that what can be learned from the original data can be also learned from the projected data.</p><p>Privacy. Can we preserve the privacy of the individuals that will not participate in the trial? As already observed, Y is public whereas only some columns of X will eventually become public when the corresponding users will decide to participate in a clinical trial. Consequently, some pairs (x u i , y u i ) will become public. Here we want to understand if an attacker knowing Y and the some pairs (x u i , y u i ) can possibly know something about the other users that do not participate in the trial.</p><p>We now elaborate on these two dimensions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Accuracy</head><p>Lemma 3.1 provides a technique to generate a lowdimensional representation of the original data maintaining the pairwise distance within an error . Since the pairwise distance is the key ingredient for many classification tasks performed by machine learning algorithms, this property allow us to have some guarantees that the solution found in the low-dimensional space is a good approximation of the solution in the original and higher dimensional space. Furthermore, reducing the size of the input data speeds-up the execution time of the algorithms and limits the amount of resources needed.</p><p>Lemma 3.1 (Johnson and Lindenstrauss) Given &gt; 0 and an integer n let k be a positive integer such that</p><formula xml:id="formula_0">k ≥ k 0 = O( log(n) 2 ).</formula><p>For every set P of n points in R m there exists a mapping f : R m → R k such that for all u, v ∈ P</p><formula xml:id="formula_1">(1 − ) u − v 2 ≤ f (u) − f (v) 2 ≤ (1 + ) u − v 2</formula><p>It can be proved that a random projection, is a mapping f that fulfills the previous lemma with positive probability. This is often referred as JL-embeddings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Privacy: Known Input-Output Attack</head><p>We now try to answer one of the questions we raised in the previous section: Can a a malicious third party who knows some pairs (x u i , y u i ) (i.e. that a particular record x u i is associated to y u i after its projection) learn information about other records?</p><p>Liu in his Ph.D. thesis <ref type="bibr" target="#b15">[Liu07b]</ref> describes a Bayes privacy model to measure the privacy offered by a perturbation technique. The model considers the attacker's apriori and a posteriori beliefs about the data and uses Bayesian inference to evaluate the privacy. For completeness, we repeat his framework here.</p><p>Let x be the unknown private data, y the perturbed data and θ the attacker's additional knowledge about the data. Then the MAP estimate of x given y and θ is xMAP (y, θ) = arg max</p><formula xml:id="formula_2">x f x|y,θ (x|y, θ)</formula><p>with f x|y,θ the conditional probability density of x given y and θ. Let X p denote the first p columns of X and X n−p the remaining columns. We define similarly Y p and Y n−p . We further assume that the columns of X p are linearly independent and that X p is known to the attacker (i.e., the attacker has full knowledge of p patients). Y is entirely known to the attacker, because as we stated before, it is publicly available to conduct experiments on the projected data.</p><p>For the next reasoning the following hypothesis must be verified:</p><p>• The original data arose from as a sample from a matrix variate distribution.</p><p>• The projection matrix R is a k × m random matrix with each entry indipendent and identically distributed with 0 mean and unit variance. R has a matrix variate Gaussian distribution with mean matrix M = 0 and covariance matrix Σ = I k ⊗I n . 1</p><p>• Y has a matrix variate Gaussian distribution with mean matrix M = 0 and covariance matrix Σ = I k ⊗ 1 k X T X The attacker will try to produce xi , with 1 ≤ i ≤ m−p, such that xi is a good estimate of the undisclosed private record x i . In other words the attacker's target is to try to give an estimation of one of the records contained in X n−p , given that he knows the records in X p and their randomly projected counterpart in Y p .</p><p>We now derive the MAP estimate of x given y = Rx and the known matrices X p and Y p xMAP (y, θ) = arg max</p><formula xml:id="formula_3">x f x|y,θ (x = x| 1 √ k Rx = y, 1 √ k RX p = Y p )</formula><p>which can be simplified in arg max</p><formula xml:id="formula_4">x f x,y,θ ( 1 √ k RX = Y ) where X = [xX p ] and Y = [yY p ].</formula><p>We further suppose that the attacker has no other background knowledge about the private data, so we can assume that θ = 0.</p><p>The previous result can be written as arg max</p><formula xml:id="formula_5">x f x,y ( 1 √ k RX = Y ) = arg max x f 1 √ k RZ|Z ( 1 √ k RZ = Y |Z = X)f Z (Z = X)</formula><p>If we assume that f Z is distributed uniformly over an interval, we finally get</p><formula xml:id="formula_6">xMAP (y) = arg max x f 1 √ k RZ|Z ( 1 √ k RZ = Y |Z = X)</formula><p>In [Liu07b, Theorem 5.3.8] is shown that the probability density function we obtained has the following form</p><formula xml:id="formula_7">(2π) − 1 2 k(p+1) det( 1 k X T X) − 1 2 k etr{− 1 2 Y ( 1 k X T X) −1 Y T }</formula><p>1 ⊗ indicates the Kroenecker product of two matrices <ref type="bibr" target="#b15">[Liu07b]</ref> We want to maximize this function in order to solve the problem of finding the best estimate of x given the observation of X p .</p><p>Liu proposes an algorithm to estimate the nondisclosed records of a certain dataset. Experimental results have shown that while decreasing the number of column records known to the attacker (denoted by p) the relative error of the estimation increases. The error in the estimation increases also decreasing the dimensionality of the projected subspace (denoted by k). In particular the algorithm uses the Nelder-Mead simplex algorithm to find the optimal solution of the maximization problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Experimental results</head><p>In this section, we present experimental results obtained on a dataset containing information about 70000 cases of diabetes diagnosticated in 130 US hospitals during the decade 1999-2008 [SDG + 14]<ref type="foot" target="#foot_0">2</ref> . From now on we will refer to this dataset as the diabetes dataset.</p><p>We focus on the classification of patients based on their privatized data. Following the work in [DMS + 17, HXY + 16], we choose to use random forest classifier in our dataset to classify the users. Moreover, from the work in <ref type="bibr" target="#b7">[Jol17]</ref>, we know that random forest classifiers works really well with random projections. In Figure <ref type="figure">1</ref> we report the effectiveness in terms of accuracy running the random forest classifier <ref type="bibr" target="#b22">[Pal05]</ref> on the original data and on the projected data in multiple lower dimensional spaces. To run and validate the classification algorithm, we divided the whole dataset into two parts: train and test. In the dataset we decided to predict the range of glucose level in the blood. So that, the algorithm was firstly trained with the records within the train part of the diabetes dataset, providing all the target values. Thus, we made the random forest classifier algorithm predicts the target values in the test part giving its features as input. Moreover, we tested the effectiveness of RPs also with k-nearest neighbors (k-NN) classifier, the results were reported in Figure <ref type="figure">2</ref>. Our approach was inspired by <ref type="bibr" target="#b0">[AC06]</ref>. The results are quite different because in the first experiment we taken a feature of the dataset (the range of glucose level in the blood) as the value to predict, instead with the second experiment we choose to run firstly a kMeans clustering algorithm (on the whole dataset) to obtain labeled groups and then, with the k-nearest neighbors (k-NN) classifier we predicted the values.</p><p>The blue line represents the accuracy of the machine learning algorithm on the original data. The orange line, instead, represents the accuracy of the same algorithm on the projected (obfuscated) data. We tested the classification algorithm on projected spaces in different sizes, starting from only 2 components up to 10 components.</p><p>Figure <ref type="figure">1</ref>: Accuracy of the random forest classifier algorithm on the original data (blue line) and on the projected data (orange line), varying the projection space (# of components). Mean values are reported as lines and 95% confidence intervals are reported as vertical lines.</p><p>Figure <ref type="figure">2</ref>: Accuracy of the k-nearest neighbors (k-NN) algorithm on the original data (blue line) and on the projected data (orange line), varying the projection space (# of components). Mean values are reported as lines and 95% confidence intervals are reported as vertical lines.</p><p>The lines plotted in Figure <ref type="figure">1</ref> presents the average values for each projection space, while the vertical wiskers represent the confidence interval corresponding to a specific projection space. For the baseline (classification on the clear data) we ran the classification algorithm 50 times, in each round starting from a random state of the random forest classifier. Since the original data is not projected into any space, we have only a baseline with the associated mean value and confidence interval. Thus, we reported the confidence interval only at the lefties part of line using wisker again. Instead, for the accuracy of classification on the projected data, we ran the algorithm more than 100 times. In each round the algorithm generated a value for each projected space. The results were obtained using the scikit-learn package on Python 3.6.</p><p>In <ref type="bibr" target="#b11">[KLR06,</ref><ref type="bibr" target="#b13">LGK06]</ref> the authors explore the security of such techniques: they show how it is possible to use data dimensionality reduction techniques to lower the complexity of data mining algorithms while preserving their accuracy and how those techniques preserve the privacy of users.</p><p>The authors start from the same privacy hypothesis we have presented in 3.2 and study how an attacker in possession of a collection of linearly independent private data records and their corresponding transformed part can gather some insight about other records.</p><p>We present the results we got running the algorithm of <ref type="bibr" target="#b15">[Liu07b]</ref> on this dataset. After choosing a number p of record pairs (x p , y p ) we select a record x for which we do not know the mapping; the algorithm we are using will try to give an estimation x of the original record x.</p><p>We used two techniques to evaluate how similar to the original records the algorithm's estimations were. We measured the distance between the estimation x provided by the algorithm and the original record x. We compute the relative error between the two vectors with the following:</p><formula xml:id="formula_8">E(x, x) = ||x − x|| 2 ||x|| 2</formula><p>The error E increases with the Euclidean distance between the two. Notice that with this notation it may happen that the error is greater than one: this could verify in the case that the distance between x and its estimations x is high and the norm of x is a small value. This could happen if the algorithm's estimation is very far off from the original record. This measuring has the drawback to lack an upper bound for the dissimilarity. Neither the cosine similarity helps, since in our case we are not interested only in the direction of vectors but also in their magnitude.</p><p>A solution is provided in <ref type="bibr" target="#b6">[JNY07]</ref>, where a radial basis function kernel can be used for representing similarities: we are going to use 1 − 1 e dist(x,x) as a similarity function between x and its estimation x, where dist(x, x) = ||x − x|| 2 . The bigger the Euclidean distance between two vectors, the bigger the error e dist(x,x) will be. In this way we have a [0, 1) bound for the similarity of the estimations. By applying the inverse we get a value in the range [0,1): if x and x are the same vector (perfect reconstruction performed by the algorithm) then 1 e dist(x,x ) = 1. Our workplan is the following: for every subspace of dimensionality k we apply the algorithm with differ-ent knowledge about the number of pairs (x p , y p ) the attacker knows. We go from p = k − 1 to p = 1. In the next figures we display the results of our experiments, with the two different measuring techniques we used to quantify the similarity between the original records and the estimated ones. We report the mean of the errors for every pair (k, p) and the variance. On the X axis are placed the tuples (k, p) for which we have conducted the experiments, on the Y axis we placed the reconstruction errors. On low-dimensionality subspaces we get a high relative error, meaning that it is not possible to give an effective approximation of the original (private) data records. In higher dimensions the approximation is closer to the original data. We ran our experiments with 10 features of the dataset, since with vectors of higher dimensionality it becomes more difficult to run the reconstruction algorithm in reasonable times; also with higher dimensionalities the algorithm we are using outputs vector reconstructions that are very dissimilar from the original ones.</p><p>We applied the random projection to reduce the feature space in different dimensions, from 10 to 3. Notice, however, that even when the projected space has the same dimension of the original space, we already get a significant relative error, meaning that on the average it is not possible for the attacker to extrapolate any useful information about the patients' records. So for records of higher dimensionality there is already a safe privacy bound when applying random projection to them, at least against this kind of attacks.</p><p>We assigned an increasing numerical value to nominal features, that is, we assigned 0 to the text male and 1 to text female in the gender feature.</p><p>We applied random projection to this records, from k = 10 (no dimensionality reduction) to k = 3; the number p of pairs (original record, projected record) known to the attacker is in the range k − 1 ≤ p ≤ 1.</p><p>With k = 2 we obviously have only p = 1: we omit this result since it is not meaningful with respect the other results we get for higher k and p, because it does not show how knowing less (or more) information about the original data changes the reliability of the reconsturction we get.</p><p>In the next figures we show the mean and variances of the errors for every tuple (k, p) for which we have conducted the experiment. It can be seen from the charts that as the number of known input-output pairs p decreases, the reconstruction error increases. Together with the dimensionality reduction, disclosing a scarce number of known input-output pairs can help with the task of preserving the privacy of users involved in clinical trials.</p><p>In this case we are projecting low dimensionality vectors (k = 10) but we still get high reconstruction er- rors when applying the techniques we have explained. This is another confirmation of the thesis that random projections help keep the privacy of users when their information is shared among research institutes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>In this work, we applied an random-projections approach to privacy-preserving data mining of medical data.</p><p>First we demonstrated the usefulness of RP in increasing privacy of personal health data. The projected data are useful for machine learning algorithms (for example, in clustering) while allows the sharing of information between parties without revealing the patients' clear data. In this particular application, this is of notable importance since allows entities involved in different health branches to cooperate effectively without sharing clear data. Second, we investigated to what extent an attacker can discover additional information starting from leaked data. As long as the projected space is smaller than the original space, and as long as the amount of data leaked is small, than the proposed approach is robust and mantains very good performance in both accuracy and privacy.</p><p>We analyzed the ratio behind and the performances (in terms of accuracy) of the RP applied on sensible healthcare data. The results shows that the use of RP offers great enhancements in privacy protection. This was a first step into developing a full-fledged platform that allows the effective share of medical data. In future we are planning a bigger real-world deployment of such platform to further validate our results, plus an audit to check privacy protection against real third parties.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 3 :Figure 4 :</head><label>34</label><figDesc>Figure 3: Mean and variance of the relative error while using the formula ||x−x||2 ||x||2</figDesc><graphic coords="7,316.80,281.15,234.00,175.50" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">The dataset is called "Diabetes 130-US hospitals for years 1999-2008 Data Set" and is available at https://archive.ics.uci.edu/ml/datasets/diabetes+130-us+hospitals+for+ye</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0" />			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Approximate nearest neighbors and the fast Johnson-Lindenstrauss transform</title>
		<author>
			<persName><forename type="first">Nir</forename><surname>Ailon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bernard</forename><surname>Chazelle</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 38th Annual ACM Symposium on Theory of Computing</title>
				<meeting>the 38th Annual ACM Symposium on Theory of Computing<address><addrLine>Seattle, WA, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">May 21-23, 2006. 2006</date>
			<biblScope unit="page" from="557" to="563" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m">Internet of health things survey</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
		<respStmt>
			<orgName>accentureconsulting</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Estimating view parameters from random projections for tomography using spherical mds</title>
		<author>
			<persName><forename type="first">Yi</forename><surname>Fang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Karthik</forename><surname>Sundar Murugappan</surname></persName>
		</author>
		<author>
			<persName><surname>Ramani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">BMC medical imaging</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">12</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Correction: Interpretation of type 2 diabetes mellitus relevant gc-ms metabolomics fingerprints by using random forests</title>
		<author>
			<persName><forename type="first">C</forename><surname>Giannella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kargupta</forename><forename type="middle">H</forename><surname>Shu-Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yingchieh</forename><surname>Hsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Po-Yao</forename><surname>Ho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chauchin</forename><surname>Chang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chen-Yi Lee ; Jian ; Hua</forename><surname>Su</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hua-Lin</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jun</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dong-Sheng</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hong-Mei</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Qing-Song</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yi-Zeng</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><surname>Liang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Journal of Solid-State Circuits</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1950" to="1951" />
			<date type="published" when="2013">2013. 2014. 2016</date>
		</imprint>
	</monogr>
	<note>Analytical Methods</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">An iot-oriented data storage framework in cloud computing platform</title>
		<author>
			<persName><surname>Jdxc + ; Lihong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Li</forename><forename type="middle">Da</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hongming</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zuhai</forename><surname>Cai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fenglin</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Boyi</forename><surname>Bu</surname></persName>
		</author>
		<author>
			<persName><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Industrial Informatics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1443" to="1451" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Extensions of lipschitz mappings into a hilbert space</title>
		<author>
			<persName><forename type="first">Johnson</forename><surname>William</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joram</forename><surname>Lindenstrauss</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Contemporary mathematics</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="page">1</biblScope>
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Towards optimal bag-offeatures for object categorization and semantic video retrieval</title>
		<author>
			<persName><forename type="first">Yu-Gang</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chong-Wah</forename><surname>Ngo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jun</forename><surname>Yang</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>ACM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Exploiting random projections and sparsity with random forests and gradient boosting methodsapplication to multi-label and multioutput learning, random forest model compression and leveraging input sparsity</title>
		<author>
			<persName><forename type="first">Arnaud</forename><surname>Joly</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1704.08067</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Ranpec: Random projections with ensemble clustering for segmentation of tumor areas in breast histology images</title>
		<author>
			<persName><forename type="first">Adnan</forename><surname>Mujahid Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hesham</forename><surname>El-Daly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nasir</forename><surname>Rajpoot</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Medical Image Understanding and Analysis</title>
		<imprint>
			<biblScope unit="page" from="17" to="23" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Privacy via the Johnson-Lindenstrauss Transform</title>
		<author>
			<persName><forename type="first">K</forename><surname>Kenthapadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Korolova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Mironov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mishra</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012-04">April 2012</date>
		</imprint>
	</monogr>
	<note>ArXiv eprints</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Privacy via the johnsonlindenstrauss transform</title>
		<author>
			<persName><forename type="first">Krishnaram</forename><surname>Kenthapadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Aleksandra</forename><surname>Korolova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ilya</forename><surname>Mironov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nina</forename><surname>Mishra</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1204.2606</idno>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Random projection-based multiplicative data perturbation for privacy preserving distributed data mining</title>
		<author>
			<persName><forename type="first">H</forename><surname>Kargupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ryan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Knowledge &amp; Data Engineering</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="92" to="106" />
			<date type="published" when="2006-01">01 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Texture classification from random features</title>
		<author>
			<persName><forename type="first">Li</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paul</forename><surname>Fieguth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Pattern Analysis and Machine Intelligence</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="574" to="586" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">An attacker&apos;s view of distance preserving maps for privacy preserving data mining</title>
		<author>
			<persName><forename type="first">Kun</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chris</forename><surname>Giannella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hillol</forename><surname>Kargupta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th European Conference on Principle and Practice of Knowledge Discovery in Databases, PKDD&apos;06</title>
				<meeting>the 10th European Conference on Principle and Practice of Knowledge Discovery in Databases, PKDD&apos;06<address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="297" to="308" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Multiplicative Data Perturbation for Privacy Preserving Data Mining</title>
		<author>
			<persName><forename type="first">Kun</forename><surname>Liu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
		<respStmt>
			<orgName>University of Maryland</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Multiplicative Data Perturbation for Privacy Preserving Data Mining</title>
		<author>
			<persName><forename type="first">Kun</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">;</forename><surname>Ronan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lyons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kerina</forename><forename type="middle">H</forename><surname>Jones</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gareth</forename><surname>John</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Caroline</forename><forename type="middle">J</forename><surname>Brooks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jean-Philippe</forename><surname>Verplancke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">V</forename><surname>Ford</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ginevra</forename><surname>Brown</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ken</forename><surname>Leake</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">BMC medical informatics and decision making</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">3</biblScope>
			<date type="published" when="2007">2007. 2009</date>
		</imprint>
		<respStmt>
			<orgName>University of Maryland</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
	<note>The sail databank: linking multiple health and social care datasets</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Random projection-based multiplicative data perturbation for privacy preserving distributed data mining</title>
		<author>
			<persName><forename type="first">Kun</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hillol</forename><surname>Kargupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jessica</forename><surname>Ryan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on knowledge and Data Engineering</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="92" to="106" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">The internet of things (iot): Applications, investments, and challenges for enterprises</title>
		<author>
			<persName><forename type="first">Lee</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Kyoochun</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business Horizons</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="431" to="440" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Machine learning in medical applications</title>
		<author>
			<persName><forename type="first">D</forename><surname>George</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andriana</forename><surname>Magoulas</surname></persName>
		</author>
		<author>
			<persName><surname>Prentza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advanced Course on Artificial Intelligence</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="300" to="307" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Internet of things: Vision, applications and research challenges</title>
		<author>
			<persName><forename type="first">Daniele</forename><surname>Miorandi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sabrina</forename><surname>Sicari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Francesco</forename><forename type="middle">De</forename><surname>Pellegrini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Imrich</forename><surname>Chlamtac</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Ad hoc networks</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Netflix sued for largest voluntary privacy breach to date</title>
		<author>
			<persName><surname>Newman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Natalie Privacy Law Blog</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Robust de-anonymization of large sparse datasets</title>
		<author>
			<persName><forename type="first">Arvind</forename><surname>Narayanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vitaly</forename><surname>Shmatikov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Security and Privacy</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2008">2008. 2008</date>
			<biblScope unit="page" from="111" to="125" />
		</imprint>
	</monogr>
	<note>IEEE Symposium on</note>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Random forest classifier for remote sensing classification</title>
		<author>
			<persName><forename type="first">Mahesh</forename><surname>Pal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ternational Journal of Remote Sensing</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="217" to="222" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Gartner says the internet of things will transform the data center</title>
		<author>
			<persName><forename type="first">J</forename><surname>Rivera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Van Der Meulen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Retrieved</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page">2014</biblScope>
			<date type="published" when="2014-08">August. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">clinical database patient records</title>
		<author>
			<persName><surname>Sdg + ; Beata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jhonathan</forename><forename type="middle">P</forename><surname>Strack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chris</forename><surname>Deshazo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Juan</forename><forename type="middle">L</forename><surname>Gennings</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sebastian</forename><surname>Olmo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Krzysztof</forename><forename type="middle">J</forename><surname>Ventura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><forename type="middle">N</forename><surname>Cios</surname></persName>
		</author>
		<author>
			<persName><surname>Clore</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Impact of hba1c measurement on hospital readmission rates: Analysis of 70</title>
				<imprint>
			<publisher>BioMed Research International</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page">0</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Generalizing data to provide anonymity when disclosing information (abstract)</title>
		<author>
			<persName><forename type="first">Pierangela</forename><surname>Samarati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Latanya</forename><surname>Sweeney</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS &apos;98</title>
				<meeting>the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS &apos;98<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page">188</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">What the gdpr means for businesses</title>
		<author>
			<persName><forename type="first">Colin</forename><surname>Tankard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Network Security</title>
		<imprint>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="5" to="8" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">What caused the breach? an examination of use of information technology and health data breaches</title>
		<author>
			<persName><forename type="first">Suanu</forename><surname>Bliss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wikina</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Perspectives in health information management</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<date type="published" when="2014">Fall. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Comparison among dimensionality reduction techniques based on random projection for cancer classification</title>
		<author>
			<persName><forename type="first">Haozhe</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jie</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Qiaosheng</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yadong</forename><surname>Wang ; Evangelia I Zacharaki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sumei</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sanjeev</forename><surname>Chawla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dong</forename><forename type="middle">Soo</forename><surname>Yoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ronald</forename><surname>Wolf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elias</forename><forename type="middle">R</forename><surname>Melhem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christos</forename><surname>Davatzikos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computational biology and chemistry</title>
		<imprint>
			<biblScope unit="volume">65</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1609" to="1618" />
			<date type="published" when="2009">2016. 2009</date>
		</imprint>
	</monogr>
	<note>Magnetic resonance in medicine</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
