1
|
Hiwale M, Walambe R, Potdar V, Kotecha K. A systematic review of privacy-preserving methods deployed with blockchain and federated learning for the telemedicine. HEALTHCARE ANALYTICS (NEW YORK, N.Y.) 2023; 3:100192. [PMID: 37223223 PMCID: PMC10160179 DOI: 10.1016/j.health.2023.100192] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/25/2023] [Revised: 04/18/2023] [Accepted: 04/30/2023] [Indexed: 05/25/2023]
Abstract
The unexpected and rapid spread of the COVID-19 pandemic has amplified the acceptance of remote healthcare systems such as telemedicine. Telemedicine effectively provides remote communication, better treatment recommendation, and personalized treatment on demand. It has emerged as the possible future of medicine. From a privacy perspective, secure storage, preservation, and controlled access to health data with consent are the main challenges to the effective deployment of telemedicine. It is paramount to fully overcome these challenges to integrate the telemedicine system into healthcare. In this regard, emerging technologies such as blockchain and federated learning have enormous potential to strengthen the telemedicine system. These technologies help enhance the overall healthcare standard when applied in an integrated way. The primary aim of this study is to perform a systematic literature review of previous research on privacy-preserving methods deployed with blockchain and federated learning for telemedicine. This study provides an in-depth qualitative analysis of relevant studies based on the architecture, privacy mechanisms, and machine learning methods used for data storage, access, and analytics. The survey allows the integration of blockchain and federated learning technologies with suitable privacy techniques to design a secure, trustworthy, and accurate telemedicine model with a privacy guarantee.
Collapse
Affiliation(s)
- Madhuri Hiwale
- Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune 412115, India
| | - Rahee Walambe
- Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune 412115, India
- Symbiosis Centre for Applied Artificial Intelligence (SCAAI), Symbiosis International (Deemed University), Pune 412115, India
| | - Vidyasagar Potdar
- Blockchain R&D Lab, School of Management and Marketing, Curtin University, Perth 6107, Australia
| | - Ketan Kotecha
- Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune 412115, India
- Symbiosis Centre for Applied Artificial Intelligence (SCAAI), Symbiosis International (Deemed University), Pune 412115, India
| |
Collapse
|
2
|
Anik FI, Sakib N, Shahriar H, Xie Y, Nahiyan HA, Ahamed SI. Unraveling a blockchain-based framework towards patient empowerment: A scoping review envisioning future smart health technologies. SMART HEALTH (AMSTERDAM, NETHERLANDS) 2023; 29:100401. [PMID: 37200573 PMCID: PMC10102703 DOI: 10.1016/j.smhl.2023.100401] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/21/2022] [Revised: 01/15/2023] [Accepted: 04/10/2023] [Indexed: 05/20/2023]
Abstract
The COVID-19 pandemic shows us how crucial patient empowerment can be in the healthcare ecosystem. Now, we know that scientific advancement, technology integration, and patient empowerment need to be orchestrated to realize future smart health technologies. In that effort, this paper unravels the Good (advantages), Bad (challenges/limitations), and Ugly (lacking patient empowerment) of the blockchain technology integration in the Electronic Health Record (EHR) paradigm in the existing healthcare landscape. Our study addresses four methodically-tailored and patient-centric Research Questions, primarily examining 138 relevant scientific papers. This scoping review also explores how the pervasiveness of blockchain technology can help to empower patients in terms of access, awareness, and control. Finally, this scoping review leverages the insights gleaned from this study and contributes to the body of knowledge by proposing a patient-centric blockchain-based framework. This work will envision orchestrating three essential elements with harmony: scientific advancement (Healthcare and EHR), technology integration (Blockchain Technology), and patient empowerment (access, awareness, and control).
Collapse
Affiliation(s)
- Fahim Islam Anik
- Department of Mechanical Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh
| | - Nazmus Sakib
- Department of Information Technology, Kennesaw State University, GA, USA
| | - Hossain Shahriar
- Department of Information Technology, Kennesaw State University, GA, USA
| | - Yixin Xie
- Department of Information Technology, Kennesaw State University, GA, USA
| | - Helal An Nahiyan
- Department of Mechanical Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh
| | | |
Collapse
|
3
|
Rodrigues VF, da Rosa Righi R, da Costa CA, Zeiser FA, Eskofier B, Maier A, Kim D. Digital health in smart cities: Rethinking the remote health monitoring architecture on combining edge, fog, and cloud. HEALTH AND TECHNOLOGY 2023; 13:449-472. [PMID: 37303980 PMCID: PMC10139834 DOI: 10.1007/s12553-023-00753-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/22/2023] [Accepted: 04/06/2023] [Indexed: 06/13/2023]
Abstract
Purpose Smart cities that support the execution of health services are more and more in evidence today. Here, it is mainstream to use IoT-based vital sign data to serve a multi-tier architecture. The state-of-the-art proposes the combination of edge, fog, and cloud computing to support critical health applications efficiently. However, to the best of our knowledge, initiatives typically present the architectures, not bringing adaptation and execution optimizations to address health demands fully. Methods This article introduces the VitalSense model, which provides a hierarchical multi-tier remote health monitoring architecture in smart cities by combining edge, fog, and cloud computing. Results Although using a traditional composition, our contributions appear in handling each infrastructure level. We explore adaptive data compression and homomorphic encryption at the edge, a multi-tier notification mechanism, low latency health traceability with data sharding, a Serverless execution engine to support multiple fog layers, and an offloading mechanism based on service and person computing priorities. Conclusions This article details the rationale behind these topics, describing VitalSense use cases for disruptive healthcare services and preliminary insights regarding prototype evaluation.
Collapse
Affiliation(s)
- Vinicius Facco Rodrigues
- Applied Computing Graduate Program, Universidade do Vale do Rio dos Sinos (UNISINOS), São Leopoldo, Brazil
| | - Rodrigo da Rosa Righi
- Applied Computing Graduate Program, Universidade do Vale do Rio dos Sinos (UNISINOS), São Leopoldo, Brazil
| | - Cristiano André da Costa
- Applied Computing Graduate Program, Universidade do Vale do Rio dos Sinos (UNISINOS), São Leopoldo, Brazil
| | | | - Bjoern Eskofier
- Friedrich-Alexander-Universität Erlangen-Nürenberg (FAU), Erlangen, Germany
| | - Andreas Maier
- Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea
| | - Daeyoung Kim
- Applied Computing Graduate Program, Universidade do Vale do Rio dos Sinos (UNISINOS), São Leopoldo, Brazil
- Friedrich-Alexander-Universität Erlangen-Nürenberg (FAU), Erlangen, Germany
- Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea
| |
Collapse
|
4
|
Vanin FNDS, Policarpo LM, Righi RDR, Heck SM, da Silva VF, Goldim J, da Costa CA. A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach. SENSORS (BASEL, SWITZERLAND) 2022; 23:14. [PMID: 36616613 PMCID: PMC9823636 DOI: 10.3390/s23010014] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/10/2022] [Revised: 12/09/2022] [Accepted: 12/09/2022] [Indexed: 06/17/2023]
Abstract
Personal health records (PHR) represent health data managed by a specific individual. Traditional solutions rely on centralized architectures to store and distribute PHR, which are more vulnerable to security breaches. To address such problems, distributed network technologies, including blockchain and distributed hash tables (DHT) are used for processing, storing, and sharing health records. Furthermore, fully homomorphic encryption (FHE) is a set of techniques that allows the calculation of encrypted data, which can help to protect personal privacy in data sharing. In this context, we propose an architectural model that applies a DHT technique called the interplanetary protocol file system and blockchain networks to store and distribute data and metadata separately; two new elements, called data steward and shared data vault, are introduced in this regard. These new modules are responsible for segregating responsibilities from health institutions and promoting end-to-end encryption; therefore, a person can manage data encryption and requests for data sharing in addition to restricting access to data for a predefined period. In addition to supporting calculations on encrypted data, our contribution can be summarized as follows: (i) mitigation of risk to personal privacy by reducing the use of unencrypted data, and (ii) improvement of semantic interoperability among health institutions by using distributed networks for standardized PHR. We evaluated performance and storage occupation using a database with 1.3 million COVID-19 registries, which showed that combining FHE with distributed networks could redefine e-health paradigms.
Collapse
Affiliation(s)
- Fausto Neri da Silva Vanin
- Applied Computing Graduate Program—PPGCA, Universidade do Vale do Rio dos Sinos (Unisinos) SOFTWARELAB, São Leopoldo 93022-000, Brazil
| | - Lucas Micol Policarpo
- Applied Computing Graduate Program—PPGCA, Universidade do Vale do Rio dos Sinos (Unisinos) SOFTWARELAB, São Leopoldo 93022-000, Brazil
| | - Rodrigo da Rosa Righi
- Applied Computing Graduate Program—PPGCA, Universidade do Vale do Rio dos Sinos (Unisinos) SOFTWARELAB, São Leopoldo 93022-000, Brazil
| | - Sandra Marlene Heck
- Instituto Colaborativo de Blockchain—Instituto de Gestão Tecnológica e Inovação (ICOLAB), Porto Alegre 90540-010, Brazil
| | | | - José Goldim
- Hospital de Clínicas de Porto Alegre, Porto Alegre 90035-903, Brazil
| | - Cristiano André da Costa
- Applied Computing Graduate Program—PPGCA, Universidade do Vale do Rio dos Sinos (Unisinos) SOFTWARELAB, São Leopoldo 93022-000, Brazil
| |
Collapse
|
5
|
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models. CRYPTOGRAPHY 2022. [DOI: 10.3390/cryptography6030034] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
Abstract
Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers to this challenge. Using homomorphic encryption, this research presents a privacy-preserving federated learning system for medical data. The proposed technique employs a secure multi-party computation protocol to safeguard the deep learning model from adversaries. The proposed approach is tested in terms of model performance using a real-world medical dataset in this paper.
Collapse
|
6
|
Jayaram R, Prabakaran S. Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system. EGYPTIAN INFORMATICS JOURNAL 2021. [DOI: 10.1016/j.eij.2020.12.003] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
7
|
Abbas G, Tanveer M, Abbas ZH, Waqas M, Baker T, Al-Jumeily OBE D. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. PLoS One 2021; 16:e0258279. [PMID: 34748568 PMCID: PMC8575280 DOI: 10.1371/journal.pone.0258279] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/30/2021] [Accepted: 09/22/2021] [Indexed: 11/18/2022] Open
Abstract
One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, from resource-limited network nodes through the public Internet. For this purpose, the users need to establish a secure link with the network nodes. Though the IPv6 over low-power wireless personal area networks (6LoWPAN) adaptation layer standard offers IPv6 compatibility for resource-limited wireless networks, the fundamental 6LoWPAN structure ignores security and privacy characteristics. Thus, there is a pressing need to design a resource-efficient authenticated key exchange (AKE) scheme for ensuring secure communication in 6LoWPAN-based resource-limited networks. This paper proposes a resource-efficient secure remote user authentication scheme for 6LoWPAN-based IoT networks, called SRUA-IoT. SRUA-IoT achieves the authentication of remote users and enables the users and network entities to establish private session keys between themselves for indecipherable communication. To this end, SRUA-IoT uses a secure hash algorithm, exclusive-OR operation, and symmetric encryption primitive. We prove through informal security analysis that SRUA-IoT is secured against a variety of malicious attacks. We also prove the security strength of SRUA-IoT through formal security analysis conducted by employing the random oracle model. Additionally, we prove through Scyther-based validation that SRUA-IoT is resilient against various attacks. Likewise, we demonstrate that SRUA-IoT reduces the computational cost of the nodes and communication overheads of the network.
Collapse
Affiliation(s)
- Ghulam Abbas
- Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Topi, Pakistan
- Telecommunications and Networking Research Center, GIK Institute of Engineering Sciences and Technology, Topi, Pakistan
| | - Muhammad Tanveer
- Telecommunications and Networking Research Center, GIK Institute of Engineering Sciences and Technology, Topi, Pakistan
| | - Ziaul Haq Abbas
- Faculty of Electrical Engineering, GIK Institute of Engineering Sciences and Technology, Topi, Pakistan
| | - Muhammad Waqas
- Engineering Research Center of Intelligent Perception and Autonomous Control, Faculty of Information Technology, Beijing University of Technology, Beijing, China
| | - Thar Baker
- Department of Computer Science, University of Sharjah, Sharjah, United Arab Emirates
| | - Dhiya Al-Jumeily OBE
- School of Computer Science and Mathematics, Liverpool John Moores University, Liverpool, United Kingdom
- * E-mail:
| |
Collapse
|
8
|
Wu Y, Zeng S, Wu B, Yang B, Chen X. Quantitative Weighted Visual Cryptographic (k, m, n) Method. SECURITY AND COMMUNICATION NETWORKS 2021; 2021:1-13. [DOI: 10.1155/2021/9968652] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Abstract
The weighted visual cryptographic scheme (WVCS) is a secret sharing technology, where weights are assigned to each shadow (participant) according to its importance. Among WVCS, the random grid-based WVCS (RGWVCS) is a frequently visited subject. It considers the premise of equality of all participants, without taking into account the existence of privileged people in reality. To address this problem of RGWVCS, this paper designs a new model, named as (k, m, n)-RGWVCS (where
), in which the secret is encrypted into n shares and sent to k participants. In the recovery end, the secret could be reconstructed by minimum m shares when the privileged join in; otherwise, k shares are needed. The experimental results show that our method has the advantage of no pixel expansion and no codebook design by means of random grid. Moreover, the contrast of our model increased by 32.85% on average compared with that of other WVCS.
Collapse
Affiliation(s)
- Yewen Wu
- Institute of Space Weather, Nanjing University of Information Science and Technology, Nanjing, China
| | - Shi Zeng
- College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
| | - Bin Wu
- School of Computer and Big Data Science, Jiujiang University, Jiujiang, Jiangxi 332005, China
| | - Bin Yang
- School of Design, Jiangnan University, Wuxi, China
| | - Xianyi Chen
- School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
| |
Collapse
|