Privacy-preserving data mining and machine learning in healthcare: Applications, challenges, and solutions

被引:12
作者
Naresh, Vankamamidi S. [1 ,3 ]
Thamarai, Muthusamy [2 ]
机构
[1] Sri Vasavi Engn Coll, Dept Comp Sci & Engn, Tadepalligudem, Andhra Pradesh, India
[2] Sri Vasavi Engn Coll, Dept Elect & Commun Engn, Tadepalligudem, Andhra Pradesh, India
[3] SriVasavi Engn Coll, Dept Comp Sci & Engn, Tadepalligudem 534101, Andhra Pradesh, India
关键词
data privacy; healthcare; privacy-preserving computational techniques; data mining; machine learning; federated learning; CLOUD; SECURITY; ATTACKS; THREATS; CLASSIFICATION; ALGORITHMS; PROTECTION; NETWORKS; SCHEME;
D O I
10.1002/widm.1490
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data mining (DM) and machine learning (ML) applications in medical diagnostic systems are budding. Data privacy is essential in these systems as healthcare data are highly sensitive. The proposed work first discusses various privacy and security challenges in these systems. To address these next, we discuss different privacy-preserving (PP) computation techniques in the context of DM and ML for secure data evaluation and processing. The state-of-the-art applications of these systems in healthcare are analyzed at various stages such as data collection, data publication, data distribution, and output phases regarding PPDM and input, model, training, and output phases in the context of PPML. Furthermore, PP federated learning is also discussed. Finally, we present open challenges in these systems and future research directions.This article is categorized under:Application Areas > Health CareTechnologies > Machine LearningCommercial, Legal, and Ethical Issues > Security and Privacy
引用
收藏
页数:42
相关论文
共 168 条
  • [1] Acar A., 2017, SURVEY HOMOMORPHIC E
  • [2] Afshar P, 2018, IEEE IMAGE PROC, P3129, DOI 10.1109/ICIP.2018.8451379
  • [3] Aggarwal CC, 2008, ADV DATABASE SYST, V34, P1, DOI 10.1007/978-0-387-70992-5
  • [4] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [5] Agwa NA, 2020, 35TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2020), P155
  • [6] Ahmed, 2022, I ELECT ELECT ENG J
  • [7] Reliable customer analysis using federated learning and exploring deep-attention edge intelligence
    Ahmed, Usman
    Srivastava, Gautam
    Lin, Jerry Chun-Wei
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 127 : 70 - 79
  • [8] A Federated Learning Approach to Frequent Itemset Mining in Cyber-Physical Systems
    Ahmed, Usman
    Srivastava, Gautam
    Lin, Jerry Chun-Wei
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (04)
  • [9] Privacy-Preserving Machine Learning: Threats and Solutions
    Al-Rubaie, Mohammad
    Chang, J. Morris
    [J]. IEEE SECURITY & PRIVACY, 2019, 17 (02) : 49 - 58
  • [10] Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
    Alabdulatif, Abdulatif
    Kumarage, Heshan
    Khalil, Ibrahim
    Yi, Xun
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 : 28 - 45