2021
DOI: 10.3390/app11188757
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic Encryption Based Privacy-Preservation for IoMT

Abstract: Healthcare applications store private user data on cloud servers and perform computation operations that support several patient diagnoses. Growing cyber-attacks on hospital systems result in user data being held at ransom. Furthermore, mathematical operations on data stored in the Cloud are exposed to untrusted external entities that sell private data for financial gain. In this paper, we propose a privacy-preserving scheme using homomorphic encryption to secure medical plaintext data from being accessed by a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(10 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Transactional data privacy preservation is the practice of preventing unauthorized users from disclosing personal data while processing it via networks 13 . There are five kinds of privacy-preserving approaches: encryption-based 14 , 15 , perturbation-based 16 , 17 , authentication-based 18 , 19 , differential privacy 20 , 21 , and blockchain-based 22 , 23 . Each of them is addressed individually.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Transactional data privacy preservation is the practice of preventing unauthorized users from disclosing personal data while processing it via networks 13 . There are five kinds of privacy-preserving approaches: encryption-based 14 , 15 , perturbation-based 16 , 17 , authentication-based 18 , 19 , differential privacy 20 , 21 , and blockchain-based 22 , 23 . Each of them is addressed individually.…”
Section: Related Workmentioning
confidence: 99%
“…Based on encryption, several privacy-preserving techniques, such as Refs. 14 , 15 , 24 26 , have been developed to allow the encryption of data during message exchange. Most schemes rely on symmetric, asymmetric, or homomorphic encryption techniques 27 .…”
Section: Related Workmentioning
confidence: 99%
“…Because the sensors are from diverse vendors, the system’s anonymity isn’t always guaranteed. Furthermore, securing data security while transferring susceptible data from one node to another remains a difficult task [ 204 ]. However, in order to produce information, the data must travel from one end to the other.…”
Section: Addressing and Defending Challenges On Fl With Ai In Healthc...mentioning
confidence: 99%
“…In 2021, HE was combined with secret sharing and computation was performed on the edge computation layer. Moreover, the mathematical operation was conducted in a distributed manner, but no data leakage happened [181]. A recurrent neural network, CryptoRNN, has been introduced recently, which is mostly focused on the privacy preservation of blockchain technology [182].…”
Section: Homomorphic Encryptionmentioning
confidence: 99%