1
|
Gokyildirim A, Çiçek S, Calgan H, Akgul A. Fractional-order Sprott K chaotic system and its application to biometric iris image encryption. Comput Biol Med 2024; 179:108864. [PMID: 38991320 DOI: 10.1016/j.compbiomed.2024.108864] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/07/2023] [Revised: 04/26/2024] [Accepted: 07/06/2024] [Indexed: 07/13/2024]
Abstract
Fractional-order (FO) chaotic systems exhibit random sequences of significantly greater complexity when compared to integer-order systems. This feature makes FO chaotic systems more secure against various attacks in image cryptosystems. In this study, the dynamical characteristics of the FO Sprott K chaotic system are thoroughly investigated by phase planes, bifurcation diagrams, and Lyapunov exponential spectrums to be utilized in biometric iris image encryption. It is proven with the numerical studies the Sprott K system demonstrates chaotic behaviour when the order of the system is selected as 0.9. Afterward, the introduced FO Sprott K chaotic system-based biometric iris image encryption design is carried out in the study. According to the results of the statistical and attack analyses of the encryption design, the secure transmission of biometric iris images is successful using the proposed encryption design. Thus, the FO Sprott K chaotic system can be employed effectively in chaos-based encryption applications.
Collapse
Affiliation(s)
- Abdullah Gokyildirim
- Department of Electrical and Electronics Engineering, Faculty of Engineering and Natural Sciences, Bandirma Onyedi Eylul University, Bandirma, 10200, Balikesir, Turkey
| | - Serdar Çiçek
- Department of Electrical and Electronics Engineering, Faculty of Engineering, Tarsus University, Tarsus, 33400, Mersin, Turkey
| | - Haris Calgan
- Department of Electrical and Electronics Engineering, Faculty of Engineering, Balikesir University, Cagis, 10145, Balikesir, Turkey
| | - Akif Akgul
- Department of Computer Engineering, Faculty of Engineering, Hitit University, Corum, 19030, Turkey.
| |
Collapse
|
2
|
Liu J, Chen C, Qu Y, Yang S, Xu L. RASS: Enabling privacy-preserving and authentication in online AI-driven healthcare applications. ISA TRANSACTIONS 2023; 141:20-29. [PMID: 37059673 DOI: 10.1016/j.isatra.2023.03.049] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/29/2022] [Revised: 03/18/2023] [Accepted: 03/31/2023] [Indexed: 06/19/2023]
Abstract
Powered by the rapid progress of analytics techniques and the increasing availability of healthcare data, artificial intelligence (AI) is bringing a paradigm shift to healthcare applications. AI techniques offer considerable advantages for the evaluation and assimilation of large amounts of complex healthcare data. However, to effectively use AI tools in healthcare, key issues need to be considered and several limitations must be addressed, such as privacy-preserving and authentication of the healthcare data for analysis in training and inference procedures. Although various techniques ranging from cryptographic tools to obfuscation mechanisms have been proposed to provide privacy guarantees for data in AI-based services, none of them is applicable to online AI-driven healthcare applications. For they require a heavy computational cost on protecting privacy without offering authentication services for third parties. In this paper, we present RASS, an efficient privacy-preserving and authentication scheme for securing analyzed data in an AI-driven healthcare system. The security proofs of our construction indicate that its unforgeability and multi-show unlinkability can defend against the tempering and collusion attacks respectively. Finally, we conduct sufficient efficiency analysis, and the results show that RASS achieves the above security demands without introducing complex computation and communication costs.
Collapse
Affiliation(s)
- Jianghua Liu
- Nanjing University of Science and Technology, China
| | | | - Youyang Qu
- Data61, Commonwealth Scientific and Industrial Research Organization, Australia
| | | | - Lei Xu
- Nanjing University of Science and Technology, China.
| |
Collapse
|
3
|
Khalid N, Qayyum A, Bilal M, Al-Fuqaha A, Qadir J. Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Comput Biol Med 2023; 158:106848. [PMID: 37044052 DOI: 10.1016/j.compbiomed.2023.106848] [Citation(s) in RCA: 24] [Impact Index Per Article: 24.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/06/2022] [Revised: 03/21/2023] [Accepted: 03/30/2023] [Indexed: 04/14/2023]
Abstract
There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial research worldwide, very few AI-based applications have successfully made it to clinics. Key barriers to the widespread adoption of clinically validated AI applications include non-standardized medical records, limited availability of curated datasets, and stringent legal/ethical requirements to preserve patients' privacy. Therefore, there is a pressing need to improvise new data-sharing methods in the age of AI that preserve patient privacy while developing AI-based healthcare applications. In the literature, significant attention has been devoted to developing privacy-preserving techniques and overcoming the issues hampering AI adoption in an actual clinical environment. To this end, this study summarizes the state-of-the-art approaches for preserving privacy in AI-based healthcare applications. Prominent privacy-preserving techniques such as Federated Learning and Hybrid Techniques are elaborated along with potential privacy attacks, security challenges, and future directions.
Collapse
Affiliation(s)
- Nazish Khalid
- Information Technology University, Lahore, Pakistan.
| | - Adnan Qayyum
- Information Technology University, Lahore, Pakistan.
| | - Muhammad Bilal
- Big Data Enterprise and Artificial Intelligence Lab (Big-DEAL), University of the West England, Bristol, United Kingdom.
| | | | | |
Collapse
|
4
|
Obfuscation Algorithm for Privacy-Preserving Deep Learning-Based Medical Image Analysis. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12083997] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
Abstract
Deep learning (DL)-based algorithms have demonstrated remarkable results in potentially improving the performance and the efficiency of healthcare applications. Since the data typically needs to leave the healthcare facility for performing model training and inference, e.g., in a cloud based solution, privacy concerns have been raised. As a result, the demand for privacy-preserving techniques that enable DL model training and inference on secured data has significantly grown. We propose an image obfuscation algorithm that combines a variational autoencoder (VAE) with random non-bijective pixel intensity mapping to protect the content of medical images, which are subsequently employed in the development of DL-based solutions. A binary classifier is trained on secured coronary angiographic frames to evaluate the utility of obfuscated images in the context of model training. Two possible attack configurations are considered to assess the security level against artificial intelligence (AI)-based reconstruction attempts. Similarity metrics are employed to quantify the security against human perception (structural similarity index measure and peak signal-to-noise-ratio). Furthermore, expert readers performed a visual assessment to determine to what extent the reconstructed images are protected against human perception. The proposed algorithm successfully enables DL model training on obfuscated images with no significant computational overhead while ensuring protection against human eye perception and AI-based reconstruction attacks. Regardless of the threat actor’s prior knowledge of the target content, the coronary vessels cannot be entirely recovered through an AI-based attack. Although a drop in accuracy can be observed when the classifier is trained on obfuscated images, the performance is deemed satisfactory in the context of a privacy–accuracy trade-off.
Collapse
|
5
|
Jordan S, Fontaine C, Hendricks-Sturrup R. Selecting Privacy-Enhancing Technologies for Managing Health Data Use. Front Public Health 2022; 10:814163. [PMID: 35372185 PMCID: PMC8967420 DOI: 10.3389/fpubh.2022.814163] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/12/2021] [Accepted: 02/14/2022] [Indexed: 11/29/2022] Open
Abstract
Privacy protection for health data is more than simply stripping datasets of specific identifiers. Privacy protection increasingly means the application of privacy-enhancing technologies (PETs), also known as privacy engineering. Demands for the application of PETs are not yet met with ease of use or even understanding. This paper provides a scope of the current peer-reviewed evidence regarding the practical use or adoption of various PETs for managing health data privacy. We describe the state of knowledge of PETS for the use and exchange of health data specifically and build a practical perspective on the steps needed to improve the standardization of the application of PETs for diverse uses of health data.
Collapse
Affiliation(s)
- Sara Jordan
- Future of Privacy Forum, Washington, DC, United States
| | - Clara Fontaine
- Centre for Quantum Technologies at the National University of Singapore, Singapore, Singapore
| | | |
Collapse
|
6
|
Privacy-preserving deep learning for pervasive health monitoring: a study of environment requirements and existing solutions adequacy. HEALTH AND TECHNOLOGY 2022; 12:285-304. [PMID: 35136708 PMCID: PMC8813181 DOI: 10.1007/s12553-022-00640-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/29/2021] [Accepted: 01/21/2022] [Indexed: 10/26/2022]
|
7
|
QoS-Ledger: Smart Contracts and Metaheuristic for Secure Quality-of-Service and Cost-Efficient Scheduling of Medical-Data Processing. ELECTRONICS 2021. [DOI: 10.3390/electronics10243083] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/17/2023]
Abstract
Quality-of-service (QoS) is the term used to evaluate the overall performance of a service. In healthcare applications, efficient computation of QoS is one of the mandatory requirements during the processing of medical records through smart measurement methods. Medical services often involve the transmission of demanding information. Thus, there are stringent requirements for secure, intelligent, public-network quality-of-service. This paper contributes to three different aspects. First, we propose a novel metaheuristic approach for medical cost-efficient task schedules, where an intelligent scheduler manages the tasks, such as the rate of service schedule, and lists items utilized by users during the data processing and computation through the fog node. Second, the QoS efficient-computation algorithm, which effectively monitors performance according to the indicator (parameter) with the analysis mechanism of quality-of-experience (QoE), has been developed. Third, a framework of blockchain-distributed technology-enabled QoS (QoS-ledger) computation in healthcare applications is proposed in a permissionless public peer-to-peer (P2P) network, which stores medical processed information in a distributed ledger. We have designed and deployed smart contracts for secure medical-data transmission and processing in serverless peering networks and handled overall node-protected interactions and preserved logs in a blockchain distributed ledger. The simulation result shows that QoS is computed on the blockchain public network with transmission power = average of −10 to −17 dBm, jitter = 34 ms, delay = average of 87 to 95 ms, throughput = 185 bytes, duty cycle = 8%, route of delivery and response back variable. Thus, the proposed QoS-ledger is a potential candidate for the computation of quality-of-service that is not limited to e-healthcare distributed applications.
Collapse
|
8
|
|
9
|
Framework for Privacy-Preserving Wearable Health Data Analysis: Proof-of-Concept Study for Atrial Fibrillation Detection. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11199049] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Medical wearable devices monitor health data and, coupled with data analytics, cloud computing, and artificial intelligence (AI), enable early detection of disease. Privacy issues arise when personal health information is sent or processed outside the device. We propose a framework that ensures the privacy and integrity of personal medical data while performing AI-based homomorphically encrypted data analytics in the cloud. The main contributions are: (i) a privacy-preserving cloud-based machine learning framework for wearable devices, (ii) CipherML—a library for fast implementation and deployment of deep learning-based solutions on homomorphically encrypted data, and (iii) a proof-of-concept study for atrial fibrillation (AF) detection from electrocardiograms recorded on a wearable device. In the context of AF detection, two approaches are considered: a multi-layer perceptron (MLP) which receives as input the ECG features computed and encrypted on the wearable device, and an end-to-end deep convolutional neural network (1D-CNN), which receives as input the encrypted raw ECG data. The CNN model achieves a lower mean F1-score than the hand-crafted feature-based model. This illustrates the benefit of hand-crafted features over deep convolutional neural networks, especially in a setting with a small training data. Compared to state-of-the-art results, the two privacy-preserving approaches lead, with reasonable computational overhead, to slightly lower, but still similar results: the small performance drop is caused by limitations related to the use of homomorphically encrypted data instead of plaintext data. The findings highlight the potential of the proposed framework to enhance the functionality of wearables through privacy-preserving AI, by providing, within a reasonable amount of time, results equivalent to those achieved without privacy enhancing mechanisms. While the chosen homomorphic encryption scheme prioritizes performance and utility, certain security shortcomings remain open for future development.
Collapse
|
10
|
Alharbi A, Abdur Rahman MD. Review of Recent Technologies for Tackling COVID-19. SN COMPUTER SCIENCE 2021; 2:460. [PMID: 34549196 PMCID: PMC8444512 DOI: 10.1007/s42979-021-00841-z] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/26/2020] [Accepted: 08/26/2021] [Indexed: 01/09/2023]
Abstract
The current pandemic caused by the COVID-19 virus requires more effort, experience, and science-sharing to overcome the damage caused by the pathogen. The fast and wide human-to-human transmission of the COVID-19 virus demands a significant role of the newest technologies in the form of local and global computing and information sharing, data privacy, and accurate tests. The advancements of deep neural networks, cloud computing solutions, blockchain technology, and beyond 5G (B5G) communication have contributed to the better management of the COVID-19 impacts on society. This paper reviews recent attempts to tackle the COVID-19 situation using these technological advancements.
Collapse
Affiliation(s)
- Ayman Alharbi
- Department Of Computer Engineering, College of Computer and Information systems, Umm AL-Qura University, Mecca, Saudi Arabia
| | - MD Abdur Rahman
- Department of Cyber Security and Forensic Computing, College of Computer and Cyber Sciences, University of Prince Mugrin, Madinah, 41499 Saudi Arabia
| |
Collapse
|
11
|
B A, S S. A survey on genomic data by privacy-preserving techniques perspective. Comput Biol Chem 2021; 93:107538. [PMID: 34246892 DOI: 10.1016/j.compbiolchem.2021.107538] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/23/2021] [Revised: 06/15/2021] [Accepted: 06/26/2021] [Indexed: 11/27/2022]
Abstract
Nowadays, the purpose of human genomics is widely emerging in health-related problems and also to achieve time and cost-efficient healthcare. Due to advancement in genomics and its research, development in privacy concerns is needed regarding querying, accessing and, storage and computation of the genomic data. While the genomic data is widely accessible, the privacy issues may emerge due to the untrusted third party (adversaries/researchers), they may reveal the information or strategy plans regarding the genome data of an individual when it is requested for research purposes. To mitigate this problem many privacy-preserving techniques are used along with cryptographic methods are briefly discussed. Furthermore, efficiency and accuracy in a secure and private genomic data computation are needed to be researched in future.
Collapse
Affiliation(s)
- Abinaya B
- Kalaignarkarunanidhi Institute of Technology, Coimbatore, India.
| | - Santhi S
- Kalaignarkarunanidhi Institute of Technology, Coimbatore, India.
| |
Collapse
|
12
|
Rahman MA, Hossain MS, Islam MS, Alrajeh NA, Muhammad G. Secure and Provenance Enhanced Internet of Health Things Framework: A Blockchain Managed Federated Learning Approach. IEEE ACCESS : PRACTICAL INNOVATIONS, OPEN SOLUTIONS 2020; 8:205071-205087. [PMID: 34192116 PMCID: PMC8043507 DOI: 10.1109/access.2020.3037474] [Citation(s) in RCA: 37] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2020] [Accepted: 11/09/2020] [Indexed: 05/06/2023]
Abstract
Recent advancements in the Internet of Health Things (IoHT) have ushered in the wide adoption of IoT devices in our daily health management. For IoHT data to be acceptable by stakeholders, applications that incorporate the IoHT must have a provision for data provenance, in addition to the accuracy, security, integrity, and quality of data. To protect the privacy and security of IoHT data, federated learning (FL) and differential privacy (DP) have been proposed, where private IoHT data can be trained at the owner's premises. Recent advancements in hardware GPUs even allow the FL process within smartphone or edge devices having the IoHT attached to their edge nodes. Although some of the privacy concerns of IoHT data are addressed by FL, fully decentralized FL is still a challenge due to the lack of training capability at all federated nodes, the scarcity of high-quality training datasets, the provenance of training data, and the authentication required for each FL node. In this paper, we present a lightweight hybrid FL framework in which blockchain smart contracts manage the edge training plan, trust management, and authentication of participating federated nodes, the distribution of global or locally trained models, the reputation of edge nodes and their uploaded datasets or models. The framework also supports the full encryption of a dataset, the model training, and the inferencing process. Each federated edge node performs additive encryption, while the blockchain uses multiplicative encryption to aggregate the updated model parameters. To support the full privacy and anonymization of the IoHT data, the framework supports lightweight DP. This framework was tested with several deep learning applications designed for clinical trials with COVID-19 patients. We present here the detailed design, implementation, and test results, which demonstrate strong potential for wider adoption of IoHT-based health management in a secure way.
Collapse
Affiliation(s)
- Mohamed Abdur Rahman
- Department of Cyber Security and Forensic ComputingCollege of Computing and Cyber SciencesUniversity of Prince MugrinMadinah41499Saudi Arabia
| | - M. Shamim Hossain
- Department of Software EngineeringCollege of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
| | | | - Nabil A. Alrajeh
- Department of Biomedical EngineeringCollege of Applied Medical SciencesKing Saud UniversityRiyadh11543Saudi Arabia
| | - Ghulam Muhammad
- Department of Computer EngineeringCollege of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
| |
Collapse
|