2021
DOI: 10.1155/2021/4376418
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain‐Based Federated Learning Method for Smart Healthcare

Abstract: The development of artificial intelligence and worldwide epidemic events has promoted the implementation of smart healthcare while bringing issues of data privacy, malicious attack, and service quality. The Medical Internet of Things (MIoT), along with the technologies of federated learning and blockchain, has become a feasible solution for these issues. In this paper, we present a blockchain-based federated learning method for smart healthcare in which the edge nodes maintain the blockchain to resist a single… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 63 publications
(41 citation statements)
references
References 25 publications
0
40
0
1
Order By: Relevance
“…While an alternate block is generated after the verification procedure is completed, the parameters are obtained by the clients or the local models. Thus the medical data through the blockchain and Federated Learning security is ensured, and an efficient model can be assured [232].…”
Section: Applying Fl-blockchain For Accessing Medical Datamentioning
confidence: 99%
“…While an alternate block is generated after the verification procedure is completed, the parameters are obtained by the clients or the local models. Thus the medical data through the blockchain and Federated Learning security is ensured, and an efficient model can be assured [232].…”
Section: Applying Fl-blockchain For Accessing Medical Datamentioning
confidence: 99%
“…The client uses the interface programming environment to form a transaction proposal, which includes the channel name, the chained code name, and the input parameters of the code to be executed. The customer then sends a transaction proposal to all prospective escorts to satisfy the validation policy of that chain code [ 5 , 23 ]. The peers simulate the transaction based on the parameters received by the customer, interacting with the chain code to record the updates and produce results in the form of a read and write set following the set signature and returning the results to the customer.…”
Section: Proposed Prototypementioning
confidence: 99%
“…Differential privacy Differential Privacy (DP) is a technology developed to combine two con icting concepts: privacy and data learning. DP aims to utilize useful information from data, however, it does not focus on learning anything from the data itself [35]. The primary purpose of DP is to share data.…”
Section: Privacy Protection Technologies I Blockchainmentioning
confidence: 99%
“…Research on differential privacy technologies is often aimed at developing privacy capabilities by assisting technologies other than direct and primary use technologies. Major privacy protection technologies include blockchain [35,41], combined learning [35][36][37], deep learning [38,44], binary classi cation [39,42], and data sharing [40,43]. Differential privacy is applied to these technologies in research because each technology has limitations in protecting personal information.…”
Section: Privacy Protection Technologies I Blockchainmentioning
confidence: 99%
See 1 more Smart Citation