2020
DOI: 10.1155/2020/6647562
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Protection Model for Patients

Abstract: The collection and analysis of patient cases can effectively help researchers to extract case feature and to achieve the objectives of precision medicine, but it may cause privacy issues for patients. Although encryption is a good way to protect privacy, it is not conducive to the sharing and analysis of medical cases. In order to address this problem, this paper proposes a federated learning verification model, which combines blockchain technology, homomorphic encryption, and federated learning technology to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 34 publications
(38 reference statements)
0
13
0
Order By: Relevance
“…However, the extensive users' data processing from the IoT device brings some privacy problems [23]. As the IoTdevices can be deeply involved in users' private data, the data generated by them will contain privacy-sensitive information [24]. To tackle the privacy challenges and encourage clients to proactively participate in IoT services, federated learning enables training a deep learning model across different participants in a collaborative manner.…”
Section: Related Workmentioning
confidence: 99%
“…However, the extensive users' data processing from the IoT device brings some privacy problems [23]. As the IoTdevices can be deeply involved in users' private data, the data generated by them will contain privacy-sensitive information [24]. To tackle the privacy challenges and encourage clients to proactively participate in IoT services, federated learning enables training a deep learning model across different participants in a collaborative manner.…”
Section: Related Workmentioning
confidence: 99%
“…We observe from the summary in Table 1 that existing research either do not or only partially satisfy the key areas of consideration for a complete privacy-preserving scheme for securing IoMT data in a healthcare system. Implementation of homomorphic encryption [21][22][23][24] ensures data privacy stored in local edge nodes and cloud environments. Lin et al [21] performed a hypothesis test to ascertain the reliability of collected data and encrypts each set of grouped information for user privacy at the data fusion center.…”
Section: Discussionmentioning
confidence: 99%
“…Similarly, in [23][24][25][26], the objective of the research and evaluation results focuses on encrypting data for privacy but does not provide masking for computation operations from untrusted service providers such as cloud operators, IoT devices and mobile edge datacenters. Our proposed scheme benefits from secret nodes at the local edge layer, preventing untrusted cloud providers from learning the computation operations.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…An analysis of the leading research fields shows that computer science is still the most popular research direction, and researchers are more interested in computer science, information systems [70][71][72][73][74], engineering electrical & electronic [75][76][77], and telecommunications [78][79][80].…”
Section: Main Research Areasmentioning
confidence: 99%