A systematic review of homomorphic encryption and its contributions in healthcare industry

被引:80
作者
Munjal, Kundan [1 ,2 ]
Bhatia, Rekha [3 ]
机构
[1] Punjabi Univ, Dept Comp Sci & Engn, Patiala 147002, Punjab, India
[2] Chandigarh Univ, AIT CSE, Gharuan 140413, Mohali, India
[3] Punjabi Univ, Dept Comp Sci, Patiala 147002, Punjab, India
关键词
Homomorphic Encryption; Fully Homomorphic Encryption; Health Informatics; Cryptonets; Secure Learning; SECURE MEDICAL COMPUTATION; CRYPTOSYSTEM;
D O I
10.1007/s40747-022-00756-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing and cloud storage have contributed to a big shift in data processing and its use. Availability and accessibility of resources with the reduction of substantial work is one of the main reasons for the cloud revolution. With this cloud computing revolution, outsourcing applications are in great demand. The client uses the service by uploading their data to the cloud and finally gets the result by processing it. It benefits users greatly, but it also exposes sensitive data to third-party service providers. In the healthcare industry, patient health records are digital records of a patient's medical history kept by hospitals or health care providers. Patient health records are stored in data centers for storage and processing. Before doing computations on data, traditional encryption techniques decrypt the data in their original form. As a result, sensitive medical information is lost. Homomorphic encryption can protect sensitive information by allowing data to be processed in an encrypted form such that only encrypted data is accessible to service providers. In this paper, an attempt is made to present a systematic review of homomorphic cryptosystems with its categorization and evolution over time. In addition, this paper also includes a review of homomorphic cryptosystem contributions in healthcare.
引用
收藏
页码:3759 / 3786
页数:28
相关论文
共 105 条
[11]  
[Anonymous], PYFHEL PYTHON HOMOMO
[12]  
[Anonymous], LATTIGO LATTICE BASE
[13]  
[Anonymous], 2013, ANN CRYPTOLOGY C
[14]  
[Anonymous], 2011, ANN CRYPTOLOGY C
[15]  
[Anonymous], 2008, INTRO MATH CRYPTOGRA
[16]   A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems [J].
Ara, Anees, Jr. ;
Al-Rodhaan, Mznah ;
Tian, Yuan ;
Al-Dhelaan, Abdullah .
IEEE ACCESS, 2017, 5 :12601-12617
[17]  
Barbara Kitchenham, 2004, PROCEDURES PERFORMIN, V33, P126
[18]   A homomorphic encryption-based system for securely managing personal health metrics data [J].
Bocu, R. ;
Costache, C. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2018, 62 (01)
[19]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[20]   Private predictive analysis on encrypted medical data [J].
Bos, Joppe W. ;
Lauter, Kristin ;
Naehrig, Michael .
JOURNAL OF BIOMEDICAL INFORMATICS, 2014, 50 :234-243