Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 20 de 84
Filter
1.
2023 IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2023 ; 2023.
Article in English | Scopus | ID: covidwho-2324970

ABSTRACT

The prevalence cloud security has privacy preserving problems that major challenges due to humanity's need protect the sensitive and non-sensitive data to decision-making and resolve data leakage problems. One of the most difficult aspects is the reuse and sharing of accurate and detailed clinical data about PHR collected via Personal Health Records (PHRs) cloud transition is difficult. PHRs are often privacy preserving patient-centric models for exchanging medical information outsourced to third parties, such as Cloud Service Providers (CSP). A unique PHR patient information to ensure security with encryption before storage in the cloud. But still, issues such as security issues, flexible access and a valid user privacy risk management, efficiency and remain an important challenge to achieve better data access sensitive and non-sensitive imposition of control in cloud storage. To achieve high efficiency of PHR and modular data access control, Rail Fence Data Encryption (RFDE) algorithm provided to encrypt the PHR file to make high privacy standards. RFDE is also a form of transposition cipher called zigzag encryption, and the unauthorized user can't access the information. The proposed algorithm encrypts the PHR information it generates the secret key. The receiver decrypts the PHR information using the private key. The proposed algorithm provide efficient performance compared with previous algorithm. © 2023 IEEE.

2.
Healthc Anal (N Y) ; 3: 100192, 2023 Nov.
Article in English | MEDLINE | ID: covidwho-2308914

ABSTRACT

The unexpected and rapid spread of the COVID-19 pandemic has amplified the acceptance of remote healthcare systems such as telemedicine. Telemedicine effectively provides remote communication, better treatment recommendation, and personalized treatment on demand. It has emerged as the possible future of medicine. From a privacy perspective, secure storage, preservation, and controlled access to health data with consent are the main challenges to the effective deployment of telemedicine. It is paramount to fully overcome these challenges to integrate the telemedicine system into healthcare. In this regard, emerging technologies such as blockchain and federated learning have enormous potential to strengthen the telemedicine system. These technologies help enhance the overall healthcare standard when applied in an integrated way. The primary aim of this study is to perform a systematic literature review of previous research on privacy-preserving methods deployed with blockchain and federated learning for telemedicine. This study provides an in-depth qualitative analysis of relevant studies based on the architecture, privacy mechanisms, and machine learning methods used for data storage, access, and analytics. The survey allows the integration of blockchain and federated learning technologies with suitable privacy techniques to design a secure, trustworthy, and accurate telemedicine model with a privacy guarantee.

3.
IEEE Internet of Things Journal ; : 1-1, 2023.
Article in English | Scopus | ID: covidwho-2306501

ABSTRACT

Federated Learning (FL) lately has shown much promise in improving the shared model and preserving data privacy. However, these existing methods are only of limited utility in the Internet of Things (IoT) scenarios, as they either heavily depend on high-quality labeled data or only perform well under idealized conditions, which typically cannot be found in practical applications. In this paper, we propose a novel federated unsupervised learning method for image classification without the use of any ground truth annotations. In IoT scenarios, a big challenge is that decentralized data among multiple clients is normally non-IID, leading to performance degradation. To address this issue, we further propose a dynamic update mechanism that can decide how to update the local model based on weights divergence. Extensive experiments show that our method outperforms all baseline methods by large margins, including +6.67% on CIFAR-10, +5.15% on STL-10, and +8.44% on SVHN in terms of classification accuracy. In particular, we obtain promising results on Mini-ImageNet and COVID-19 datasets and outperform several federated unsupervised learning methods under non-IID settings. IEEE

4.
4th International Conference on Frontiers Technology of Information and Computer, ICFTIC 2022 ; : 146-149, 2022.
Article in English | Scopus | ID: covidwho-2298397

ABSTRACT

The novel coronavirus is spreading rapidly worldwide, and finding an effective and rapid diagnostic method is apriority. Medical data involves patient privacy, and the centralized collection of large amounts of medical data is impossible. Federated learning is a privacy-preserving machine learning paradigm that can be well applied to smart healthcare by coordinating multiple hospitals to perform deep learning training without transmitting data. This paper demonstrates the feasibility of a federated learning approach for detecting COVID-19 through chest CT images. We propose a lightweight federated learning method that normalizes the local training process by globally averaged feature vectors. In the federated training process, the models' parameters do not need to be transmitted, and the local client only uploads the average of the feature vectors of each class. Clients can choose different local models according to their computing capabilities. We performed a comprehensive evaluation using various deep-learning models on COVID-19 chest CT images. The results show that our approach can effectively reduce the communication load of federated learning while having high accuracy for detecting COVID-19 on chest CT images. © 2022 IEEE.

5.
2023 International Conference on Electronics, Information, and Communication, ICEIC 2023 ; 2023.
Article in English | Scopus | ID: covidwho-2272776

ABSTRACT

Federated learning (FL) has received great attention in healthcare primarily due to its decentralized, collaborative nature of building a machine learning (ML) model. Over the years, the FL approach has been successfully applied for enhancing privacy preservation in medical ML applications. This study aims to review prevailing applications in healthcare for the future landing FL application. We identified the emerging applications of FL in key healthcare domains, including COVID-19, brain tumor segmentation, mammogram, sleep quality prediction, and smart healthcare system. Finally, we discuss privacy concerns in federated setting and provide current methods to increase the data privacy capabilities of FL. © 2023 IEEE.

6.
Journal of Information Security and Applications ; 74, 2023.
Article in English | Scopus | ID: covidwho-2268864

ABSTRACT

As the world grapples with the COVID-19 and its variants, multi-user collaboration by means of cloud computing is ubiquitous. How to make better use of cloud resources while preventing user privacy leakage has become particularly important. Multi-key homomorphic encryption(MKHE) can effectively deal with the privacy disclosure issue during the multi-user collaboration in the cloud computing setting. Firstly, we improve the DGHV homomorphic scheme by modifying the selection of key and the coefficients in encryption, so as to eliminate the restriction on the parity of the ciphertext modulus in the public key. On this basis, we further propose a DGHV-type MKHE scheme based on the number theory. In our scheme, an extended key is introduced for ciphertext extension, and we prove that it is efficient in performance analysis. The semantic security of our schemes is proved under the assumption of error-free approximate greatest common divisor and the difficulty of large integer factorization. Furthermore, the simulation experiments show the availability and computational efficiency of our MKHE scheme. Therefore, our scheme is suitable for the multi-user scenario in cloud environment. © 2023 Elsevier Ltd

7.
3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, ICMISC 2022 ; 540:383-396, 2023.
Article in English | Scopus | ID: covidwho-2257310

ABSTRACT

When pandemic rose in 2020, people were fighting against COVID-19 virus and organizations had accelerated their digitization and cloud adoption rapidly (De et al. in Int J Inf Manag 55:102171, 2020 [1]) to meet the online based business during the lockdown. This chaos helped fraudsters and attackers taking advantage of the momentary lack of security controls and oversight. Federal Investigation Bureau (FBI) Internet Crime Compliant Center (IC3) 2020 reported highest number of complaints in 2020 (791 k + ) compared to prior five years (298 k + in 2016), with peak losses reported ($4.2 Billion in 2020 compared to $1.5 Billion in 2016) (Internet Crime Complaint Center in Internet crime report. Federal Bureau of Investigation, Washington, D.C., 2020 [2]). Majority of these incidents were connected to financial fraud, identity fraud, and phishing for personally identifiable information (PII). Considering the severity and impact of personal data exposure over cloud and hybrid environment, this paper provides a brief overview of prior research and discuss technical solutions to protect data across heterogeneous environments and ensure privacy regulations. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

8.
8th Future of Information and Computing Conference, FICC 2023 ; 651 LNNS:195-206, 2023.
Article in English | Scopus | ID: covidwho-2252882

ABSTRACT

Vaccination passports are being issued by governments around the world in order to open up their travel and hospitality sectors. Civil liberty campaigners on the other hand argue that such mandatory instruments encroach upon our fundamental right to anonymity, freedom of movement, and are a backdoor to issuing "identity documents” to citizens by their governments. We present a privacy-preserving framework that uses two-factor authentication to create a unique identifier that can be used to locate a person's vaccination record on a blockchain, but does not store any personal information about them. Our main contribution is the employment of a locality sensitive hashing algorithm over an iris extraction technique, that can be used to authenticate users and anonymously locate vaccination records on the blockchain, without leaking any personally identifiable information to the blockchain. Our proposed system allows for the safe reopening of society, while maintaining the privacy of citizens. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

9.
10th International Conference on Advanced Cloud and Big Data, CBD 2022 ; : 85-90, 2022.
Article in English | Scopus | ID: covidwho-2288879

ABSTRACT

With more and more people turning to online medical pre-diagnosis systems, it becomes increasingly important to protect patient privacy and enhance the accuracy and efficiency of diagnosis. That is because the ever rapidly growing medical records not only contain a large amount of private information but are often highly unequally distributed (e.g., the number of cases and the rate of increase of covid-19 can be much higher than that of common diseases). However, existing methods are not capable of simultaneously boosting the intensity of privacy protection, and the accuracy and efficiency of diagnosis. In this paper, we propose an online medical pre-diagnosis scheme based on incremental learning vector quantization (called WL-OMPD) to achieve the two objectives at the same time. Specifically, within WL-OMPD, we design an efficient algorithm, Wasserstein-Learning Vector Quantization (W-LVQ), to smartly compress the original medical records into hypothetic samples. Then, we transmit these compressed data to the cloud instead of the original records to offer a more accurate pre-diagnosis. Extensive evaluations of real medical datasets show that the WL-OMPD scheme can improve the imbalance ratio of the data to a certain extent and then the intensity of privacy protection. These results also demonstrate that WL-OMPD substantially boost the accuracy of the classification model and increase diagnostic efficiency at a lower compression rate. © 2022 IEEE.

10.
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022 ; 13656 LNCS:15-30, 2023.
Article in English | Scopus | ID: covidwho-2288671

ABSTRACT

Data is an important production factor in the era of digital economy. Privacy computing can ensure that data providers do not disclose sensitive data, carry out multi-party joint analysis and computation, securely and privately complete the full excavation of data value in the process of circulation, sharing, fusion, and calculation, which has become a popular research topic. String comparison is one of the common operations in data processing. To address the string comparison problem in multi-party scenarios, we propose an algorithm for secure string comparison based on outsourced computation. The algorithm encodes the strings with one hot encoding scheme and encrypts the encoded strings using an XOR homomorphic encryption scheme. The proposed algorithm achieves efficient and secure string comparison and counts the number of different characters with the help of a cloud-assisted server. The proposed scheme is implemented and verified using the new coronavirus gene sequence as the comparison string, and the performance is compared with that of a state-of-the-art security framework. Experiments show that the proposed algorithm can effectively improve the string comparison speed and obtain correct comparison results without compromising data privacy. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

11.
37th International Conference on Information Networking, ICOIN 2023 ; 2023-January:224-229, 2023.
Article in English | Scopus | ID: covidwho-2248281

ABSTRACT

The widespread adoption of deep learning (DL) solutions in the healthcare organizations is obstructed by their compute intensive nature and dependability on massive datasets. In this regard, cloud-services such as cloud storage and computational resources are emerging as an effective solution. However, when the image data are outsourced to avail such services, there is a privacy concern that the data should be kept protected not only during transmission but during computations as well. To meet these requirements, this study proposed a privacy-preserving DL (PPDL) scheme that enable computations without the need of decryption. The encryption is based on perceptual encryption (PE) that only hides the perceivable information in an image while preserves other characteristics that are necessary for DL computations. Precisely, we have implemented a binary classifier based on EfficientNetV2 for the COVID-19 screening in the chest X-ray (CXR) images. For the PE algorithm, the suitability of two pixel-based and two block-based PE methods was analyzed. The analysis have shown that when global contents are left unmodified (pixel-based PE), then the DL-based model achieved the classification accuracy same as that of the plain images. On the other hand, for block-based PE algorithms, there is up to 3% drop in the model's accuracy and sensitivity scores. © 2023 IEEE.

12.
Peer Peer Netw Appl ; 16(2): 1257-1269, 2023.
Article in English | MEDLINE | ID: covidwho-2269431

ABSTRACT

Graph Neural Network (GNN) architecture is a state-of-the-art model, which can obtain complete node embedding features and rich data information by aggregating the information of nodes and neighbors. Therefore, GNNs are widely used in electronic shopping, drug discovery (especially for the treatment of COVID-19) and other fields, promoting the explosive development of machine learning. However, user interaction, data sharing and circulation are highly sensitive to privacy, and centralized storage can lead to data isolation. Therefore, Federated Learning with high efficiency and strong security and privacy enhancement technology based on secure aggregation can improve the security dilemma faced by GNN. In this paper, we propose an Efficient Secure Aggregation for Federated Graph Neural Network(ESA-FedGNN), which can efficiently reduce the cost of communication and avoid computational redundancy while ensuring data privacy. Firstly, a novel secret sharing scheme based on numerical analysis is proposed, which employs Fast Fourier Transform to improve the computational power of the neural network in sharing phase, and leverages Newton Interpolation method to deal with the disconnection and loss of the client in reconstruction phase. Secondly, a regular graph embedding based on geometric distribution is proposed, which optimizes the aggregation speed by using data parallelism. Finally, a double mask is adopted to ensure privacy and prevent malicious adversaries from stealing model parameters. We achieve O ( log N log ( log N ) ) improvements compared to O N 2 in state-of-the-art works. This research helps to provide security solutions related to the practical development and application of privacy-preserving graph neural network technology.

13.
Expert Systems with Applications ; 211, 2023.
Article in English | Scopus | ID: covidwho-2244411

ABSTRACT

The outbreak of COVID-19 has exposed the privacy of positive patients to the public, which will lead to violations of users' rights and even threaten their lives. A privacy-preserving scheme involving virus-infected positive patients is proposed by us. The traditional ciphertext policy attribute-based encryption (CP-ABE) has the features of enhanced plaintext security and fine-grained access control. However, the encryption process requires the high computational performance of the device, which puts a high strain on resource-limited devices. After semi-honest users successfully decrypt the data, they will get the real private data, which will cause serious privacy leakage problems. Traditional cloud-based data management architectures are extremely vulnerable in the face of various cyberattacks. To address the above challenges, a verifiable ABE scheme based on blockchain and local differential privacy is proposed, using LDP to perturb the original data locally to a certain extent to resist collusion attacks, outsourcing encryption and decryption to corresponding service providers to reduce the pressure on mobile terminals, and deploying smart contracts in combination with blockchain for fair execution by all parties to solve the problem of returning wrong search results in a semi-honest cloud server. Detailed security proofs are performed through the defined security goals, which shows that the proposed scheme is indeed privacy-protective. The experimental results show that the scheme is optimized in terms of data accuracy, computational overhead, storage performance, and fairness. In terms of efficiency, it greatly reduces the local load, enhances personal privacy protection, and has high practicality as well as reliability. As far as we know, it is the first case of applying the combination of LDP technology and blockchain to a tracing system, which not only mitigates poisoning attacks on user data, but also improves the accuracy of the data, thus making it easier to identify infected contacts and making a useful contribution to health prevention and control efforts. © 2022 Elsevier Ltd

14.
Computer Standards and Interfaces ; 83, 2023.
Article in English | Scopus | ID: covidwho-2242788

ABSTRACT

The COVID-19 pandemic has severely affected daily life and caused a great loss to the global economy. Due to the very urgent need for identifying close contacts of confirmed patients in the current situation, the development of automated contact tracing app for smart devices has attracted more attention all over the world. Compared with expensive manual tracing approach, automated contact tracing apps can offer fast and precise tracing service, however, over-pursing high efficiency would lead to the privacy-leaking issue for app users. By combing with the benign properties (e.g., anonymity, decentralization, and traceability) of blockchain, we propose an efficient privacy-preserving solution in automated tracing scenario. Our main technique is a combination of non-interactive zero-knowledge proof and multi-signature with public key aggregation. By means of aggregating multiple signatures from different contacts at the mutual commitment phase, we only need fewer zero-knowledge proofs to complete the task of identifying contacts. It inherently leads to the benefits of saving storage and consuming less time for running verification algorithm on blockchain. Furthermore, we perform an experimental comparison by timing the execution of signature verification with and without aggregate signature, respectively. It shows that our solution can actually preserve the full-fledged privacy protection property with a lower computational cost. © 2022

15.
Bulletin of Electrical Engineering and Informatics ; 12(1):587-596, 2023.
Article in English | Scopus | ID: covidwho-2238541

ABSTRACT

1226 articles on privacy and COVID-19 were published by authors from 69 countries in this year's issue. COVID 19's privacy is now the focus of many researchers' attention. The present body of knowledge on privacy for COVID-19 digital technologies has been thoroughly analyzed, and a concise overview of research status and future developments can be gleaned. This paper conducted a bibliometric examination of privacy using the Scopus dataset. Utilizing VOSviewer software, the relevant literature papers published on this topic were examined to determine the field's development history, research hotspots, and future directions. Over time, there has been a rise in the number of studies published in privacy for COVID-19, particularly after 2020, and the growth rate has been steadily increasing. Regarding published research, the United States and China lead the pack. These articles appeared in primarily English-language journals and conference proceedings. Privacy and COVID-19 research was mostly computer science. The most used terms in privacy and COVID-19 were data privacy and humans. This paper examines the evolution of privacy and COVID-19 research and indicates current research priorities and future research goals. Furthermore, the privacy and COVID-19 study seem to be a promising sphere as this study identifies 26 domains. © 2023, Institute of Advanced Engineering and Science. All rights reserved.

16.
IEEE Sensors Journal ; 23(2):889-897, 2023.
Article in English | Scopus | ID: covidwho-2246807

ABSTRACT

Human-beings are suffering from the rapid spread of COVID-19 throughout the world. In order to quickly identify, quarantine and cure the infected people, and to stop further infections, it is crucial to expose those origins who have been infected but are asymptomatic. However, this task is not easy, especially when the rigid security and privacy constraints on health records are taken into consideration. In this paper, we develop a new method to solve this problem. In the outbreak of a disease like COVID-19, the proposed method can find hidden infected people (or communities) through volunteered share of health data by some mobile users. Such volunteers only reveal whether they are healthy or infected e.g. through they mobile apps. This approach minimises health data disclosure and preserves privacy for the others. There are three steps in the proposed method. First, we borrow the idea from traditional epidemiology and design a novel algorithm to estimate the number of infection origins based on a Susceptible-Infected model. Second, we introduce the concept of 'heavy centre' to locate those origins. The probability of each node being infected will then be derived by building a spreading model based on the origins. To evaluate our method, we conduct a series of experiments on various networks with different structures. We examine the performance in estimating the number of origins as well as their origins. The results show that the proposed method yields higher accuracies than the existing methods, even when the fraction of volunteers is small. © 2001-2012 IEEE.

17.
2022 IEEE Global Communications Conference, GLOBECOM 2022 ; : 1128-1133, 2022.
Article in English | Scopus | ID: covidwho-2228955

ABSTRACT

With the booming deployment of Internet of Things, health monitoring applications have gradually prospered. Within the recent COVID-19 pandemic situation, interest in permanent remote health monitoring solutions has raised, targeting to reduce contact and preserve the limited medical resources. Among the technological methods to realize efficient remote health monitoring, federated learning (FL) has drawn particular attention due to its robustness in preserving data privacy. However, FL can yield to high communication costs, due to frequent transmissions between the FL server and clients. To tackle this problem, we propose in this paper a communication-efficient federated learning (CEFL) framework that involves clients clustering and transfer learning. First, we propose to group clients through the calculation of similarity factors, based on the neural networks characteristics. Then, a representative client in each cluster is selected to be the leader of the cluster. Differently from the conventional FL, our method performs FL training only among the cluster leaders. Subsequently, transfer learning is adopted by the leader to update its cluster members with the trained FL model. Finally, each member fine-tunes the received model with its own data. To further reduce the communication costs, we opt for a partial-layer FL aggregation approach. This method suggests partially updating the neural network model rather than fully. Through experiments, we show that CEFL can save up to to 98.45% in communication costs while conceding less than 3% in accuracy loss, when compared to the conventional FL. Finally, CEFL demonstrates a high accuracy for clients with small or unbalanced datasets. © 2022 IEEE.

18.
International Journal of Production Research ; 2023.
Article in English | Scopus | ID: covidwho-2237590

ABSTRACT

The use of Artificial Intelligence (AI) for predicting supply chain risk has gained popularity. However, proposed approaches are based on the premise that organisations act alone, rather than a collective when predicting risk, despite the interconnected nature of supply chains. This yields a problem: organisations that have inadequate datasets cannot predict risk. While data-sharing has been proposed to evaluate risk, in practice this does not happen due to privacy concerns. We propose a federated learning approach for collective risk prediction without the risk of data exposure. We ask: Can organisations who have inadequate datasets tap into collective knowledge? This raises a second question: Under what circumstances would collective risk prediction be beneficial? We present an empirical case study where buyers predict order delays from their shared suppliers before and after Covid-19. Results show that federated learning can indeed help supply chain members predict risk effectively, especially for buyers with limited datasets. Training data-imbalance, disruptions, and algorithm choice are significant factors in the efficacy of this approach. Interestingly, data-sharing or collective risk prediction is not always the best choice for buyers with disproportionately larger order-books. We thus call for further research on on local and collective learning paradigms in supply chains. © 2023 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.

19.
Computer Standards & Interfaces ; 84:N.PAG-N.PAG, 2023.
Article in English | Academic Search Complete | ID: covidwho-2236790

ABSTRACT

Smart Health, with its flexibility and efficiency, has been widely deployed, especially during the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not yet well established and still present a number of security issues. Ciphertext-Policy Attribute-Based Encryption (CP-ABE), is identified as the furthest potential approach for constructing privacy-preserving Smart Health. However, traditional CP-ABE is facing some new challenges. On the one hand, access policy is not encrypted, and the identity information of the user could be exposed. On the other hand, Smart Health Records (SHRs) are outsourced to the Cloud Service Providers (CSP) and may be at risk of being tampered with. In this article, we have built a CP-ABE solution (PHCA) that supports policy-hiding and cloud auditing to ensure privacy security for smart health, in which the decryption cost is constant. To ensure data integrity, we securely introduce an effective third-party auditor. In addition, we design and implement safe and effective outsourcing decryption algorithms, which significantly low the decryption costs for users. Performance comparisons and security analysis demonstrate that our solutions function effectively. • We propose a CP-ABE scheme (PHCA) that supports policy-hiding and cloud auditing. • Our scheme ensures data integrity and privacy. • Our scheme is proven secure under dual-system encryption technique. [ FROM AUTHOR]

20.
Transactions on Emerging Telecommunications Technologies ; 2023.
Article in English | Scopus | ID: covidwho-2234536

ABSTRACT

Internet of Medical Things (IoMT) solutions have proliferated rapidly in the COVID-19 pandemic era. The smart medical sensors capture real-time data from remote patients and communicate it to medical servers in a secure and privacy-preserving manner. It is a herculean challenge to guarantee security and privacy in Medical IoT applications. Hence, an improved Gentry–Halevi's fully homomorphic encryption-based (IGHFHE) lightweight privacy preserving user authentication scheme is proposed in this work. The scheme is proposed with an integer matrix computation strategy for securing data computation with privacy protection. It adopts the translation process of Gentry–Halevi's fully homomorphic encryption process for performing homomorphic addition and multiplication, then encrypt an integer matrix modulo that represents a positive integer. Extensive informal investigation and simulation of the proposed IGHFHE scheme shows that it is more resistant to well-known attacks for preventing authentication breaches. Also, the proposed IGHFHE scheme reduced computational and storage overhead by 4.98% and 5.78% respectively on average in comparison to other prevailing schemes. © 2023 John Wiley & Sons Ltd.

SELECTION OF CITATIONS
SEARCH DETAIL