4.7 Review

Selecting Privacy-Enhancing Technologies for Managing Health Data Use

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

FedHome: Cloud-Edge Based Personalized Federated Learning for In-Home Health Monitoring

Qiong Wu et al.

Summary: In-home health monitoring is important for the ageing population, but existing approaches lack attention to user data privacy. This paper proposes FedHome, a cloud-edge based federated learning framework that protects data privacy by keeping user data locally. The framework uses a generative convolutional autoencoder (GCAE) to handle imbalanced and non-IID distribution in user's monitoring data, achieving accurate and personalized health monitoring.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Letter Surgery

The Potential of a Digital Twin in Surgery

Hanad Ahmed et al.

SURGICAL INNOVATION (2021)

Article Computer Science, Information Systems

An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things

Jing Wang et al.

Summary: The proposed EPoSVM scheme is designed for IoMT deployment, protecting training data privacy and ensuring the security of the trained SVM model through secure computation protocols. Security analysis confirms that the protocols and EPoSVM satisfy both security and privacy protection requirements, with performance evaluation on real-world disease data sets showing its efficiency and effectiveness in achieving the same classification accuracy as a general SVM.

IEEE INTERNET OF THINGS JOURNAL (2021)

Review Computer Science, Information Systems

Federated Learning in a Medical Context: A Systematic Literature Review

Bjarne Pfitzner et al.

Summary: Data privacy is crucial in fields like medicine, but research and training of machine learning models require data. Federated learning has been proposed as a solution to merge data from around the world while still preserving privacy.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2021)

Article Computer Science, Hardware & Architecture

The Ten Commandments of Ethical Medical AI

Heimo Mueller et al.

Summary: The proposed ten commandments serve as practical guidelines for those applying artificial intelligence, offering a concise checklist to a wide range of stakeholders.

COMPUTER (2021)

Article Automation & Control Systems

Communication-Efficient Federated Learning for Digital Twin Edge Networks in Industrial IoT

Yunlong Lu et al.

Summary: This article introduces the application of digital twin edge networks in the industrial Internet of Things, filling the gap between physical systems and digital spaces by incorporating digital twin into edge networks. The use of federated learning to construct digital twin models of IoT devices and the proposal of an asynchronous model update scheme help to improve communication efficiency and reduce transmission energy cost.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Ethics

The use of digital twins in healthcare: socio-ethical benefits and socio-ethical risks

Eugen Octav Popa et al.

Summary: Digital twins, as an emerging technology, present both socio-ethical benefits such as disease prevention and treatment, cost reduction, patient autonomy and freedom, and equal treatment in healthcare, as well as important socio-ethical risks including data privacy and property, disruption of existing societal structures, inequality, and injustice.

LIFE SCIENCES SOCIETY AND POLICY (2021)

Article Medical Informatics

Customization scenarios for de-identification of clinical notes

Tzvika Hartman et al.

BMC MEDICAL INFORMATICS AND DECISION MAKING (2020)

Article Mathematical & Computational Biology

Applying Deep Neural Networks over Homomorphic Encrypted Medical Data

Anamaria Vizitiu et al.

COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE (2020)

Article Multidisciplinary Sciences

Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data

Micah J. Sheller et al.

SCIENTIFIC REPORTS (2020)

Article Computer Science, Information Systems

Preserving Privacy in Mobile Health Systems Using Non-Interactive Zero-Knowledge Proof and Blockchain

Antonio Emerson Barros Tomaz et al.

IEEE ACCESS (2020)

Editorial Material Medicine, General & Internal

Big Data, Big Tech, and Protecting Patient Privacy

I. Glenn Cohen et al.

JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION (2019)

Proceedings Paper Economics

Differential Privacy and Census Data: Implications for Social and Economic Research

Steven Ruggles et al.

AEA PAPERS AND PROCEEDINGS (2019)

Proceedings Paper Engineering, Biomedical

Realistic Synthetic Data Generation: The ATEN Framework

Scott McLachlan et al.

BIOMEDICAL ENGINEERING SYSTEMS AND TECHNOLOGIES, BIOSTEC 2018 (2019)

Proceedings Paper Computer Science, Information Systems

Differential Privacy and the US Census

Cynthia Dwork

PROCEEDINGS OF THE 38TH ACM SIGMOD-SIGACT-SIGAI SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS (PODS '19) (2019)

Article Computer Science, Information Systems

Synthea: An approach, method, and software mechanism for generating synthetic patients and the synthetic electronic health care record

Jason Walonoski et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2018)

Article Computer Science, Information Systems

BAN-GZKP: Optimal Zero Knowledge Proof based Scheme for Wireless Body Area Networks

Gewu Bu et al.

AD HOC NETWORKS (2018)

Proceedings Paper Computer Science, Information Systems

Privacy at Scale: Local Differential Privacy in Practice

Graham Cormode et al.

SIGMOD'18: PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2018)

Article Medical Informatics

Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis

Junghye Lee et al.

JMIR MEDICAL INFORMATICS (2018)

Article Biochemical Research Methods

SQC: secure quality control for meta-analysis of genome-wide association studies

Zhicong Huang et al.

BIOINFORMATICS (2017)

Article Computer Science, Information Systems

VERTIcal Grid lOgistic regression (VERTIGO)

Yong Li et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2016)

Article Health Care Sciences & Services

How Should Health Data Be Used?: Privacy, Secondary Use, and Big Data Sales

Bonnie Kaplan

CAMBRIDGE QUARTERLY OF HEALTHCARE ETHICS (2016)

Article Health Care Sciences & Services

Selling Health Data De-Identification, Privacy, and Speech

Bonnie Kaplan

CAMBRIDGE QUARTERLY OF HEALTHCARE ETHICS (2015)

Article Ethics

Privacy by Design in Personal Health Monitoring

Anders Nordgren

HEALTH CARE ANALYSIS (2015)

Article Computer Science, Information Systems

A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks

Linke Guo et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2014)

Article Medical Informatics

Estimating the re-identification risk of clinical data sets

Fida Kamal Dankar et al.

BMC MEDICAL INFORMATICS AND DECISION MAKING (2012)

Article Radiology, Nuclear Medicine & Medical Imaging

Image Data Sharing for Biomedical Research-Meeting HIPAA Requirements for De-identification

John B. Freymann et al.

JOURNAL OF DIGITAL IMAGING (2012)

Review Multidisciplinary Sciences

A Systematic Review of Re-Identification Attacks on Health Data

Khaled El Emam et al.

PLOS ONE (2011)

Article Genetics & Heredity

An Open Access Database of Genome-wide Association Results

Andrew D. Johnson et al.

BMC MEDICAL GENETICS (2009)

Review Computer Science, Software Engineering

Engineering Privacy

Sarah Spiekermann et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2009)