Machine learning in precision medicine to preserve privacy via encryption

被引:12
作者
Briguglio, William [1 ]
Moghaddam, Parisa [1 ]
Yousef, Waleed A. [1 ,2 ]
Traore, Issa [1 ]
Mamun, Mohammad [3 ]
机构
[1] Univ Victoria, ECE Dept, Victoria, BC, Canada
[2] Helwan Univ, CS Dept, Human Comp Interact Lab HCILAB, Cairo, Egypt
[3] Natl Res Council Canada, Fredericton, NB, Canada
关键词
Machine learning; Encryption; Homomorphic encryption; Precision medicine; Privacy;
D O I
10.1016/j.patrec.2021.07.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Precision medicine is an emerging approach for disease treatment and prevention that delivers person-alized care to individual patients by considering their genetic makeups, medical histories, environments, and lifestyles. Despite the rapid advancement of precision medicine and its considerable promise, several underlying technological challenges remain unsolved. One such challenge of great importance is the se-curity and privacy of precision health-related data, such as genomic data and electronic health records, which stifle collaboration and hamper the full potential of machine-learning (ML) algorithms. To preserve data privacy while providing ML solutions, this article makes three contributions. First, we propose a generic machine learning with encryption (MLE) framework, which we used to build an ML model that predicts cancer from one of the most recent comprehensive genomics datasets in the field. Second, our framework's prediction accuracy is slightly higher than that of the most recent studies conducted on the same dataset, yet it maintains the privacy of the patients' genomic data. Third, to facilitate the validation, reproduction, and extension of this work, we provide an open-source repository that contains the design and implementation of the framework, all the ML experiments and code, and the final predictive model deployed to a free cloud service. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:148 / 154
页数:7
相关论文
共 16 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]  
[Anonymous], 1978, FDN SECURE COMPUTATI
[3]  
Aslett Louis JM., 2015, ARXIV PREPRINT ARXIV
[4]   Machine Learning Classification over Encrypted Data [J].
Bost, Raphael ;
Popa, Raluca Ada ;
Tu, Stephen ;
Goldwasser, Shafi .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[5]  
Briguglio W., ARXIV PREPRINT ARXIV
[6]  
Carey A., 2020, EXPLANATION IMPLEMEN
[7]  
Chakravarty Debyani, 2017, JCO Precis Oncol, V2017, DOI 10.1200/PO.17.00011
[8]  
Dowlin N, 2016, PR MACH LEARN RES, V48
[9]  
Gentry C., 2009, A fully homomorphic encryption scheme
[10]  
Graepel Thore, 2013, Information Security and Cryptology - ICISC 2012. 15th International Conference. Revised Selected Papers, P1, DOI 10.1007/978-3-642-37682-5_1