A User-Centered Medical Data Sharing Scheme for Privacy-Preserving Machine Learning

被引:2
作者
Wang, Lianhai [1 ]
Meng, Lingyun [1 ]
Liu, Fengkai [1 ]
Shao, Wei [1 ]
Fu, Kunlun [1 ]
Xu, Shujiang [1 ]
Zhang, Shuhui [1 ]
机构
[1] Qilu Univ Technol, Shandong Comp Sci Ctr, Shandong Prov Key Lab Comp Networks, Shandong Acad Sci,Natl Supercomp Ctr Jinan, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
SECURE;
D O I
10.1155/2022/3670107
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development and application of artificial intelligence technology, medical data play an increasingly important role in the medical field. However, there are privacy protection and data ownership issues in the process of data sharing, which brings difficulties to machine learning and data mining. On the one hand, for fear that they may risk being held accountable by users or even breaking the law due to these issues, healthcare providers are reluctant to share medical data. On the other hand, users are also reluctant to share medical data due to the possibility of privacy disclosure in the data sharing process. To improve the security and privacy of shared medical data, we propose a user-centered medical data sharing scheme for privacy-preserving machine learning. Our solution combines blockchain and a trusted execution environment to ensure that adversaries cannot steal the ownership and control of user data during sharing. A blockchain-based noninteractive key sharing scheme is proposed that allows only the users and the TEE to decrypt the shared data. At the same time, we design an auditing mechanism to facilitate users to audit the sharing process. The security analysis shows that the scheme ensures the privacy and security of user data during storage and sharing. We have completed simulation experiments to demonstrate the effectiveness and efficiency of our scheme.
引用
收藏
页数:16
相关论文
共 32 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Big Data In Health Care: Using Analytics To Identify And Manage High-Risk And High-Cost Patients [J].
Bates, David W. ;
Saria, Suchi ;
Ohno-Machado, Lucila ;
Shah, Anand ;
Escobar, Gabriel .
HEALTH AFFAIRS, 2014, 33 (07) :1123-1131
[3]   Designing a GDPR compliant blockchain-based IoV distributed information tracking system [J].
Campanile, Lelio ;
Iacono, Mauro ;
Marulli, Fiammetta ;
Mastroianni, Michele .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)
[4]   Data Access Control Based on Blockchain in Medical Cyber Physical Systems [J].
Chen, Fulong ;
Huang, Jing ;
Wang, Canlin ;
Tang, Yuqing ;
Huang, Cheng ;
Xie, Dong ;
Wang, Taochun ;
Zhao, Chuanxin .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[5]   Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario [J].
Chen, Yanan ;
Lu, Zhenyu ;
Xiong, Hu ;
Xu, Weixiang .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[6]   A blockchain-based preserving and sharing system for medical data privacy [J].
Chen, Zeng ;
Xu, Weidong ;
Wang, Bingtao ;
Yu, Hua .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 :338-350
[7]  
Eb A., 2021, ICT EXPRESS, V34
[8]  
Golle Philippe., 2001, ELECT COMMERCE, P75, DOI DOI 10.1007/3-540-45598-1_9
[9]   Efficient and secure attribute-based signature for monotone predicates [J].
Gu, Ke ;
Jia, Weijia ;
Wang, Guojun ;
Wen, Sheng .
ACTA INFORMATICA, 2017, 54 (05) :521-541
[10]   Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems [J].
Guo, Rui ;
Shi, Huixian ;
Zhao, Qinglan ;
Zheng, Dong .
IEEE ACCESS, 2018, 6 :11676-11686