Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 20 de 57
Filter
1.
2023 IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2023 ; 2023.
Article in English | Scopus | ID: covidwho-2324970

ABSTRACT

The prevalence cloud security has privacy preserving problems that major challenges due to humanity's need protect the sensitive and non-sensitive data to decision-making and resolve data leakage problems. One of the most difficult aspects is the reuse and sharing of accurate and detailed clinical data about PHR collected via Personal Health Records (PHRs) cloud transition is difficult. PHRs are often privacy preserving patient-centric models for exchanging medical information outsourced to third parties, such as Cloud Service Providers (CSP). A unique PHR patient information to ensure security with encryption before storage in the cloud. But still, issues such as security issues, flexible access and a valid user privacy risk management, efficiency and remain an important challenge to achieve better data access sensitive and non-sensitive imposition of control in cloud storage. To achieve high efficiency of PHR and modular data access control, Rail Fence Data Encryption (RFDE) algorithm provided to encrypt the PHR file to make high privacy standards. RFDE is also a form of transposition cipher called zigzag encryption, and the unauthorized user can't access the information. The proposed algorithm encrypts the PHR information it generates the secret key. The receiver decrypts the PHR information using the private key. The proposed algorithm provide efficient performance compared with previous algorithm. © 2023 IEEE.

2.
IEEE Internet of Things Journal ; : 1-1, 2023.
Article in English | Scopus | ID: covidwho-2306501

ABSTRACT

Federated Learning (FL) lately has shown much promise in improving the shared model and preserving data privacy. However, these existing methods are only of limited utility in the Internet of Things (IoT) scenarios, as they either heavily depend on high-quality labeled data or only perform well under idealized conditions, which typically cannot be found in practical applications. In this paper, we propose a novel federated unsupervised learning method for image classification without the use of any ground truth annotations. In IoT scenarios, a big challenge is that decentralized data among multiple clients is normally non-IID, leading to performance degradation. To address this issue, we further propose a dynamic update mechanism that can decide how to update the local model based on weights divergence. Extensive experiments show that our method outperforms all baseline methods by large margins, including +6.67% on CIFAR-10, +5.15% on STL-10, and +8.44% on SVHN in terms of classification accuracy. In particular, we obtain promising results on Mini-ImageNet and COVID-19 datasets and outperform several federated unsupervised learning methods under non-IID settings. IEEE

3.
4th International Conference on Frontiers Technology of Information and Computer, ICFTIC 2022 ; : 146-149, 2022.
Article in English | Scopus | ID: covidwho-2298397

ABSTRACT

The novel coronavirus is spreading rapidly worldwide, and finding an effective and rapid diagnostic method is apriority. Medical data involves patient privacy, and the centralized collection of large amounts of medical data is impossible. Federated learning is a privacy-preserving machine learning paradigm that can be well applied to smart healthcare by coordinating multiple hospitals to perform deep learning training without transmitting data. This paper demonstrates the feasibility of a federated learning approach for detecting COVID-19 through chest CT images. We propose a lightweight federated learning method that normalizes the local training process by globally averaged feature vectors. In the federated training process, the models' parameters do not need to be transmitted, and the local client only uploads the average of the feature vectors of each class. Clients can choose different local models according to their computing capabilities. We performed a comprehensive evaluation using various deep-learning models on COVID-19 chest CT images. The results show that our approach can effectively reduce the communication load of federated learning while having high accuracy for detecting COVID-19 on chest CT images. © 2022 IEEE.

4.
2023 International Conference on Electronics, Information, and Communication, ICEIC 2023 ; 2023.
Article in English | Scopus | ID: covidwho-2272776

ABSTRACT

Federated learning (FL) has received great attention in healthcare primarily due to its decentralized, collaborative nature of building a machine learning (ML) model. Over the years, the FL approach has been successfully applied for enhancing privacy preservation in medical ML applications. This study aims to review prevailing applications in healthcare for the future landing FL application. We identified the emerging applications of FL in key healthcare domains, including COVID-19, brain tumor segmentation, mammogram, sleep quality prediction, and smart healthcare system. Finally, we discuss privacy concerns in federated setting and provide current methods to increase the data privacy capabilities of FL. © 2023 IEEE.

5.
Journal of Information Security and Applications ; 74, 2023.
Article in English | Scopus | ID: covidwho-2268864

ABSTRACT

As the world grapples with the COVID-19 and its variants, multi-user collaboration by means of cloud computing is ubiquitous. How to make better use of cloud resources while preventing user privacy leakage has become particularly important. Multi-key homomorphic encryption(MKHE) can effectively deal with the privacy disclosure issue during the multi-user collaboration in the cloud computing setting. Firstly, we improve the DGHV homomorphic scheme by modifying the selection of key and the coefficients in encryption, so as to eliminate the restriction on the parity of the ciphertext modulus in the public key. On this basis, we further propose a DGHV-type MKHE scheme based on the number theory. In our scheme, an extended key is introduced for ciphertext extension, and we prove that it is efficient in performance analysis. The semantic security of our schemes is proved under the assumption of error-free approximate greatest common divisor and the difficulty of large integer factorization. Furthermore, the simulation experiments show the availability and computational efficiency of our MKHE scheme. Therefore, our scheme is suitable for the multi-user scenario in cloud environment. © 2023 Elsevier Ltd

6.
3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, ICMISC 2022 ; 540:383-396, 2023.
Article in English | Scopus | ID: covidwho-2257310

ABSTRACT

When pandemic rose in 2020, people were fighting against COVID-19 virus and organizations had accelerated their digitization and cloud adoption rapidly (De et al. in Int J Inf Manag 55:102171, 2020 [1]) to meet the online based business during the lockdown. This chaos helped fraudsters and attackers taking advantage of the momentary lack of security controls and oversight. Federal Investigation Bureau (FBI) Internet Crime Compliant Center (IC3) 2020 reported highest number of complaints in 2020 (791 k + ) compared to prior five years (298 k + in 2016), with peak losses reported ($4.2 Billion in 2020 compared to $1.5 Billion in 2016) (Internet Crime Complaint Center in Internet crime report. Federal Bureau of Investigation, Washington, D.C., 2020 [2]). Majority of these incidents were connected to financial fraud, identity fraud, and phishing for personally identifiable information (PII). Considering the severity and impact of personal data exposure over cloud and hybrid environment, this paper provides a brief overview of prior research and discuss technical solutions to protect data across heterogeneous environments and ensure privacy regulations. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

7.
8th Future of Information and Computing Conference, FICC 2023 ; 651 LNNS:195-206, 2023.
Article in English | Scopus | ID: covidwho-2252882

ABSTRACT

Vaccination passports are being issued by governments around the world in order to open up their travel and hospitality sectors. Civil liberty campaigners on the other hand argue that such mandatory instruments encroach upon our fundamental right to anonymity, freedom of movement, and are a backdoor to issuing "identity documents” to citizens by their governments. We present a privacy-preserving framework that uses two-factor authentication to create a unique identifier that can be used to locate a person's vaccination record on a blockchain, but does not store any personal information about them. Our main contribution is the employment of a locality sensitive hashing algorithm over an iris extraction technique, that can be used to authenticate users and anonymously locate vaccination records on the blockchain, without leaking any personally identifiable information to the blockchain. Our proposed system allows for the safe reopening of society, while maintaining the privacy of citizens. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

8.
10th International Conference on Advanced Cloud and Big Data, CBD 2022 ; : 85-90, 2022.
Article in English | Scopus | ID: covidwho-2288879

ABSTRACT

With more and more people turning to online medical pre-diagnosis systems, it becomes increasingly important to protect patient privacy and enhance the accuracy and efficiency of diagnosis. That is because the ever rapidly growing medical records not only contain a large amount of private information but are often highly unequally distributed (e.g., the number of cases and the rate of increase of covid-19 can be much higher than that of common diseases). However, existing methods are not capable of simultaneously boosting the intensity of privacy protection, and the accuracy and efficiency of diagnosis. In this paper, we propose an online medical pre-diagnosis scheme based on incremental learning vector quantization (called WL-OMPD) to achieve the two objectives at the same time. Specifically, within WL-OMPD, we design an efficient algorithm, Wasserstein-Learning Vector Quantization (W-LVQ), to smartly compress the original medical records into hypothetic samples. Then, we transmit these compressed data to the cloud instead of the original records to offer a more accurate pre-diagnosis. Extensive evaluations of real medical datasets show that the WL-OMPD scheme can improve the imbalance ratio of the data to a certain extent and then the intensity of privacy protection. These results also demonstrate that WL-OMPD substantially boost the accuracy of the classification model and increase diagnostic efficiency at a lower compression rate. © 2022 IEEE.

9.
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022 ; 13656 LNCS:15-30, 2023.
Article in English | Scopus | ID: covidwho-2288671

ABSTRACT

Data is an important production factor in the era of digital economy. Privacy computing can ensure that data providers do not disclose sensitive data, carry out multi-party joint analysis and computation, securely and privately complete the full excavation of data value in the process of circulation, sharing, fusion, and calculation, which has become a popular research topic. String comparison is one of the common operations in data processing. To address the string comparison problem in multi-party scenarios, we propose an algorithm for secure string comparison based on outsourced computation. The algorithm encodes the strings with one hot encoding scheme and encrypts the encoded strings using an XOR homomorphic encryption scheme. The proposed algorithm achieves efficient and secure string comparison and counts the number of different characters with the help of a cloud-assisted server. The proposed scheme is implemented and verified using the new coronavirus gene sequence as the comparison string, and the performance is compared with that of a state-of-the-art security framework. Experiments show that the proposed algorithm can effectively improve the string comparison speed and obtain correct comparison results without compromising data privacy. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

10.
37th International Conference on Information Networking, ICOIN 2023 ; 2023-January:224-229, 2023.
Article in English | Scopus | ID: covidwho-2248281

ABSTRACT

The widespread adoption of deep learning (DL) solutions in the healthcare organizations is obstructed by their compute intensive nature and dependability on massive datasets. In this regard, cloud-services such as cloud storage and computational resources are emerging as an effective solution. However, when the image data are outsourced to avail such services, there is a privacy concern that the data should be kept protected not only during transmission but during computations as well. To meet these requirements, this study proposed a privacy-preserving DL (PPDL) scheme that enable computations without the need of decryption. The encryption is based on perceptual encryption (PE) that only hides the perceivable information in an image while preserves other characteristics that are necessary for DL computations. Precisely, we have implemented a binary classifier based on EfficientNetV2 for the COVID-19 screening in the chest X-ray (CXR) images. For the PE algorithm, the suitability of two pixel-based and two block-based PE methods was analyzed. The analysis have shown that when global contents are left unmodified (pixel-based PE), then the DL-based model achieved the classification accuracy same as that of the plain images. On the other hand, for block-based PE algorithms, there is up to 3% drop in the model's accuracy and sensitivity scores. © 2023 IEEE.

11.
Expert Systems with Applications ; 211, 2023.
Article in English | Scopus | ID: covidwho-2244411

ABSTRACT

The outbreak of COVID-19 has exposed the privacy of positive patients to the public, which will lead to violations of users' rights and even threaten their lives. A privacy-preserving scheme involving virus-infected positive patients is proposed by us. The traditional ciphertext policy attribute-based encryption (CP-ABE) has the features of enhanced plaintext security and fine-grained access control. However, the encryption process requires the high computational performance of the device, which puts a high strain on resource-limited devices. After semi-honest users successfully decrypt the data, they will get the real private data, which will cause serious privacy leakage problems. Traditional cloud-based data management architectures are extremely vulnerable in the face of various cyberattacks. To address the above challenges, a verifiable ABE scheme based on blockchain and local differential privacy is proposed, using LDP to perturb the original data locally to a certain extent to resist collusion attacks, outsourcing encryption and decryption to corresponding service providers to reduce the pressure on mobile terminals, and deploying smart contracts in combination with blockchain for fair execution by all parties to solve the problem of returning wrong search results in a semi-honest cloud server. Detailed security proofs are performed through the defined security goals, which shows that the proposed scheme is indeed privacy-protective. The experimental results show that the scheme is optimized in terms of data accuracy, computational overhead, storage performance, and fairness. In terms of efficiency, it greatly reduces the local load, enhances personal privacy protection, and has high practicality as well as reliability. As far as we know, it is the first case of applying the combination of LDP technology and blockchain to a tracing system, which not only mitigates poisoning attacks on user data, but also improves the accuracy of the data, thus making it easier to identify infected contacts and making a useful contribution to health prevention and control efforts. © 2022 Elsevier Ltd

12.
Computer Standards and Interfaces ; 83, 2023.
Article in English | Scopus | ID: covidwho-2242788

ABSTRACT

The COVID-19 pandemic has severely affected daily life and caused a great loss to the global economy. Due to the very urgent need for identifying close contacts of confirmed patients in the current situation, the development of automated contact tracing app for smart devices has attracted more attention all over the world. Compared with expensive manual tracing approach, automated contact tracing apps can offer fast and precise tracing service, however, over-pursing high efficiency would lead to the privacy-leaking issue for app users. By combing with the benign properties (e.g., anonymity, decentralization, and traceability) of blockchain, we propose an efficient privacy-preserving solution in automated tracing scenario. Our main technique is a combination of non-interactive zero-knowledge proof and multi-signature with public key aggregation. By means of aggregating multiple signatures from different contacts at the mutual commitment phase, we only need fewer zero-knowledge proofs to complete the task of identifying contacts. It inherently leads to the benefits of saving storage and consuming less time for running verification algorithm on blockchain. Furthermore, we perform an experimental comparison by timing the execution of signature verification with and without aggregate signature, respectively. It shows that our solution can actually preserve the full-fledged privacy protection property with a lower computational cost. © 2022

13.
IEEE Sensors Journal ; 23(2):889-897, 2023.
Article in English | Scopus | ID: covidwho-2246807

ABSTRACT

Human-beings are suffering from the rapid spread of COVID-19 throughout the world. In order to quickly identify, quarantine and cure the infected people, and to stop further infections, it is crucial to expose those origins who have been infected but are asymptomatic. However, this task is not easy, especially when the rigid security and privacy constraints on health records are taken into consideration. In this paper, we develop a new method to solve this problem. In the outbreak of a disease like COVID-19, the proposed method can find hidden infected people (or communities) through volunteered share of health data by some mobile users. Such volunteers only reveal whether they are healthy or infected e.g. through they mobile apps. This approach minimises health data disclosure and preserves privacy for the others. There are three steps in the proposed method. First, we borrow the idea from traditional epidemiology and design a novel algorithm to estimate the number of infection origins based on a Susceptible-Infected model. Second, we introduce the concept of 'heavy centre' to locate those origins. The probability of each node being infected will then be derived by building a spreading model based on the origins. To evaluate our method, we conduct a series of experiments on various networks with different structures. We examine the performance in estimating the number of origins as well as their origins. The results show that the proposed method yields higher accuracies than the existing methods, even when the fraction of volunteers is small. © 2001-2012 IEEE.

14.
2022 IEEE Global Communications Conference, GLOBECOM 2022 ; : 1128-1133, 2022.
Article in English | Scopus | ID: covidwho-2228955

ABSTRACT

With the booming deployment of Internet of Things, health monitoring applications have gradually prospered. Within the recent COVID-19 pandemic situation, interest in permanent remote health monitoring solutions has raised, targeting to reduce contact and preserve the limited medical resources. Among the technological methods to realize efficient remote health monitoring, federated learning (FL) has drawn particular attention due to its robustness in preserving data privacy. However, FL can yield to high communication costs, due to frequent transmissions between the FL server and clients. To tackle this problem, we propose in this paper a communication-efficient federated learning (CEFL) framework that involves clients clustering and transfer learning. First, we propose to group clients through the calculation of similarity factors, based on the neural networks characteristics. Then, a representative client in each cluster is selected to be the leader of the cluster. Differently from the conventional FL, our method performs FL training only among the cluster leaders. Subsequently, transfer learning is adopted by the leader to update its cluster members with the trained FL model. Finally, each member fine-tunes the received model with its own data. To further reduce the communication costs, we opt for a partial-layer FL aggregation approach. This method suggests partially updating the neural network model rather than fully. Through experiments, we show that CEFL can save up to to 98.45% in communication costs while conceding less than 3% in accuracy loss, when compared to the conventional FL. Finally, CEFL demonstrates a high accuracy for clients with small or unbalanced datasets. © 2022 IEEE.

15.
International Journal of Production Research ; 2023.
Article in English | Scopus | ID: covidwho-2237590

ABSTRACT

The use of Artificial Intelligence (AI) for predicting supply chain risk has gained popularity. However, proposed approaches are based on the premise that organisations act alone, rather than a collective when predicting risk, despite the interconnected nature of supply chains. This yields a problem: organisations that have inadequate datasets cannot predict risk. While data-sharing has been proposed to evaluate risk, in practice this does not happen due to privacy concerns. We propose a federated learning approach for collective risk prediction without the risk of data exposure. We ask: Can organisations who have inadequate datasets tap into collective knowledge? This raises a second question: Under what circumstances would collective risk prediction be beneficial? We present an empirical case study where buyers predict order delays from their shared suppliers before and after Covid-19. Results show that federated learning can indeed help supply chain members predict risk effectively, especially for buyers with limited datasets. Training data-imbalance, disruptions, and algorithm choice are significant factors in the efficacy of this approach. Interestingly, data-sharing or collective risk prediction is not always the best choice for buyers with disproportionately larger order-books. We thus call for further research on on local and collective learning paradigms in supply chains. © 2023 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.

16.
Transactions on Emerging Telecommunications Technologies ; 2023.
Article in English | Scopus | ID: covidwho-2234536

ABSTRACT

Internet of Medical Things (IoMT) solutions have proliferated rapidly in the COVID-19 pandemic era. The smart medical sensors capture real-time data from remote patients and communicate it to medical servers in a secure and privacy-preserving manner. It is a herculean challenge to guarantee security and privacy in Medical IoT applications. Hence, an improved Gentry–Halevi's fully homomorphic encryption-based (IGHFHE) lightweight privacy preserving user authentication scheme is proposed in this work. The scheme is proposed with an integer matrix computation strategy for securing data computation with privacy protection. It adopts the translation process of Gentry–Halevi's fully homomorphic encryption process for performing homomorphic addition and multiplication, then encrypt an integer matrix modulo that represents a positive integer. Extensive informal investigation and simulation of the proposed IGHFHE scheme shows that it is more resistant to well-known attacks for preventing authentication breaches. Also, the proposed IGHFHE scheme reduced computational and storage overhead by 4.98% and 5.78% respectively on average in comparison to other prevailing schemes. © 2023 John Wiley & Sons Ltd.

17.
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022 ; : 961-968, 2022.
Article in English | Scopus | ID: covidwho-2223081

ABSTRACT

Sharing individual-level pandemic data is essential for accelerating the understanding of a disease. For example, COVID-19 data have been widely collected to support public health surveillance and research. In the United States, these data need to be de-identified before being released to the public due to privacy concerns. However, current data publishing approaches for individual-level pandemic data, such as those adopted by the U.S. Centers for Disease Control and Prevention (CDC), have not flexed over time to account for the dynamic nature of infection rates. Thus, the policies generated by these strategies may either raise privacy risks or impair the data utility (or usability). To optimize the tradeoff between privacy risk and data utility, we introduce a game theoretic model that adaptively generates policies to publish individual-level COVID-19 data according to infection dynamics. We model the data publishing process as a two-player Stackelberg game between a data publisher and a data recipient and then search for the best strategy for the publisher. In this game, we consider 1) the average accuracy of predicting future case counts for all demographic groups, and 2) the mutual information between the original data and the released data. We use COVID-19 case data from Vanderbilt University Medical Center from March 2020 to December 2021 to demonstrate our model and evaluate its effectiveness. The experimental results show that our game theoretic model outperforms all baseline approaches, including those adopted by CDC, while maintaining low privacy risk. © 2022 IEEE.

18.
2022 International Conference on Networking and Network Applications, NaNA 2022 ; : 406-410, 2022.
Article in English | Scopus | ID: covidwho-2213358

ABSTRACT

In recent years, machine learning and deep neural networks have achieved remarkable results and have been widely used in different domains. Affected by COVID-19, the potential of gait feature recognition in biometric authentication has gradually emerged. However, machine learning algorithms are generally demanded in terms of computing power, sometimes need the support of cloud service providers, and require raw data, which is often sensitive, most privacy-preserving approaches only encrypted the trained model, and the data collected from users are unprotected. We propose a scheme for running deep neural networks on encrypted data using homomorphic encryption to address these issues. © 2022 IEEE.

19.
4th International Conference on Data Intelligence and Security, ICDIS 2022 ; : 336-343, 2022.
Article in English | Scopus | ID: covidwho-2213249

ABSTRACT

Swarm learning (SL) is an emerging promising decentralized machine learning paradigm and has achieved high performance in clinical applications. SL solves the problem of a central structure in federated learning by combining edge computing and blockchain-based peer-to-peer network. While there are promising results in the assumption of the independent and identically distributed (IID) data across participants, SL suffers from performance degradation as the degree of the non-IID data increases. To address this problem, we propose a generative augmentation framework in swarm learning called SL-GAN, which augments the non-IID data by generating the synthetic data from participants. SL-GAN trains generators and discriminators locally, and periodically aggregation via a randomly elected coordinator in SL network. Under the standard assumptions, we theoretically prove the convergence of SL-GAN using stochastic approximations. Experimental results demonstrate that SL-GAN outperforms state-of-art methods on three real world clinical datasets including Tuberculosis, Leukemia, COVID-19. © 2022 IEEE.

20.
4th International Conference on Data Intelligence and Security, ICDIS 2022 ; : 148-154, 2022.
Article in English | Scopus | ID: covidwho-2213248

ABSTRACT

Constructing a phylogenetic tree is an essential method of analyzing the evolution of the covid-19 virus. In the case of multiple entities holding different coronavirus genetic data, it is simple to aggregate all data into one entity and then calculate the phylogenetic tree. However, such a method is challenging to carry out. Genetic data is susceptible and has high economic value, and it is usually impossible to copy between different entities directly. Also, the direct sharing of genetic data can lead to data leaks or even legal problems. In this paper, we propose a homomorphic-encryption-based solution to tackle this problem, where two participants, A and B, both hold a part of covid-19 genetic data and compute the gene distance matrix calculation of the overall dataset without revealing the genetic data held by both parties. After the computation, participant A can decrypt the final distance matrix from the encrypted result and then use the plain-text result to construct the covid-19 phylogenetic tree. Experiment results show that the proposed method can process the genetic data accurately in a short time, and the phylogenetic tree generated by the proposed solution has no loss of accuracy compared to plain-text calculation. In terms of engineering optimization, we propose an optimized encryption method, which can further shorten the encryption time of the entire dataset without reducing the security level. © 2022 IEEE.

SELECTION OF CITATIONS
SEARCH DETAIL