Privacy-preserving artificial intelligence in healthcare: Techniques and applications

被引:106
|
作者
Khalid, Nazish [1 ]
Qayyum, Adnan [1 ]
Bilal, Muhammad [2 ]
Al-Fuqaha, Ala [3 ]
Qadir, Junaid [4 ]
机构
[1] Informat Technol Univ, Lahore, Pakistan
[2] Univ West England, Big Data Enterprise & Artificial Intelligence Lab, Bristol, England
[3] Hamad bin Khalifa Univ, Doha, Qatar
[4] Qatar Univ, Doha, Qatar
关键词
Privacy; Privacy preservation; Electronic health record (EHR); Artificial intelligence (AI); MEMBERSHIP INFERENCE ATTACKS; BLOCKCHAIN; SECURITY; CLASSIFICATION; INFORMATION;
D O I
10.1016/j.compbiomed.2023.106848
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial research worldwide, very few AI-based applications have successfully made it to clinics. Key barriers to the widespread adoption of clinically validated AI applications include non-standardized medical records, limited availability of curated datasets, and stringent legal/ethical requirements to preserve patients' privacy. Therefore, there is a pressing need to improvise new data-sharing methods in the age of AI that preserve patient privacy while developing AI-based healthcare applications. In the literature, significant attention has been devoted to developing privacy-preserving techniques and overcoming the issues hampering AI adoption in an actual clinical environment. To this end, this study summarizes the state-of-the-art approaches for preserving privacy in AI-based healthcare applications. Prominent privacy-preserving techniques such as Federated Learning and Hybrid Techniques are elaborated along with potential privacy attacks, security challenges, and future directions.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain
    Tong, Fei
    Zhou, Yuanhang
    Wang, Kaiming
    Cheng, Guang
    Niu, Jianyu
    He, Shibo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5071 - 5085
  • [42] Random-data perturbation techniques and privacy-preserving data mining
    Kargupta, H
    Datta, S
    Wang, Q
    Sivakumar, K
    KNOWLEDGE AND INFORMATION SYSTEMS, 2005, 7 (04) : 387 - 414
  • [43] Privacy-Preserving Associative Classification
    Priyanka, Garach
    Darshana, Patel
    Radhika, Kotecha
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 245 - 251
  • [44] Efficient Privacy-Preserving Facial Expression Classification
    Rahulamathavan, Yogachandran
    Rajarajan, Muttukrishnan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (03) : 326 - 338
  • [45] Privacy-Preserving Solutions for Blockchain: Review and Challenges
    Bernal Bernabe, Jorge
    Luis Canovas, Jose
    Hernandez-Ramos, Jose L.
    Torres Moreno, Rafael
    Skarmeta, Antonio
    IEEE ACCESS, 2019, 7 : 164908 - 164940
  • [46] DIMY: Enabling privacy-preserving contact tracing
    Ahmed, Nadeem
    Michelin, Regio A.
    Xue, Wanli
    Putra, Guntur Dharma
    Ruj, Sushmita
    Kanhere, Salil S.
    Jha, Sanjay
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 202
  • [47] A systematic review of privacy-preserving techniques for synthetic tabular health data
    Tobias Hyrup
    Anton D. Lautrup
    Arthur Zimek
    Peter Schneider-Kamp
    Discover Data, 3 (1):
  • [48] Random-data perturbation techniques and privacy-preserving data mining
    Hillol Kargupta
    Souptik Datta
    Qi Wang
    Krishnamoorthy Sivakumar
    Knowledge and Information Systems, 2005, 7 : 387 - 414
  • [49] A privacy-preserving ticketing system
    Verslype, Kristof
    De Decker, Bart
    NaessenS, Vincent
    Nigusse, Girma
    Lapon, Jorn
    Verhaeghe, Pieter
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 97 - +
  • [50] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541