2022
DOI: 10.3390/s22124432
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine

Abstract: Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the culture of online consultancy. Thus, there is a need to revamp the conventional model of the telemedicine system as per the current challenges and requirements. Security and privacy of data are main aspects to be considered in this era. Data-driven organizations also require compliance with regulatory bodies, such as HIPAA, PHI, and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 33 publications
0
17
0
Order By: Relevance
“…In addition to such centralizeddata settings, differential privacy has also been employed in the federated learning setting [31,33]. However, for remote healthcare applications, only encryption-based methods have been explored [36,37], which are computationally very expensive. It is, therefore, necessary to develop efficient differentially private algorithms and models for applications in remote healthcare systems.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to such centralizeddata settings, differential privacy has also been employed in the federated learning setting [31,33]. However, for remote healthcare applications, only encryption-based methods have been explored [36,37], which are computationally very expensive. It is, therefore, necessary to develop efficient differentially private algorithms and models for applications in remote healthcare systems.…”
Section: Related Workmentioning
confidence: 99%
“…In 2022, Iqbal et al [53] proposed a mechanism to securely search encrypted audio data that has been outsourced to CS in a medical context, and which also performs a sequential scan. Their approach involves using the BGV FHE scheme to encrypt the data files, which are then sent to the cloud server for storage.…”
Section: Search Structurementioning
confidence: 99%
“…In fact, only one article uses a SWHE scheme, more specifically an implementation of the FV scheme [60]. On the other hand, FHE schemes are used in nine articles, where the BGV [7,53,58,68] and BFV [66] are utilized the most, leveraging the open-source software library HElib, which implements some HE schemes. Table 4 lists the selected works and identifies the HE schemes they use.…”
Section: Types Of He Schemes Used In Sementioning
confidence: 99%
See 1 more Smart Citation
“…Multiple applications for homomorphicbased searchable encryption schemes have been proposed in different domains i.e. finance, healthcare, artificial intelligence, blockchain, vehicular ad-hoc networks (VANETS) as well as telemedicine [10]- [13]. While some may propose the capability to search securely over data [14]- [17], many other schemes focus on secure key agreement i.e.…”
Section: Introductionmentioning
confidence: 99%