Privacy-preserving data mining and machine learning in healthcare: Applications, challenges, and solutions

被引:7
|
作者
Naresh, Vankamamidi S. [1 ,3 ]
Thamarai, Muthusamy [2 ]
机构
[1] Sri Vasavi Engn Coll, Dept Comp Sci & Engn, Tadepalligudem, Andhra Pradesh, India
[2] Sri Vasavi Engn Coll, Dept Elect & Commun Engn, Tadepalligudem, Andhra Pradesh, India
[3] SriVasavi Engn Coll, Dept Comp Sci & Engn, Tadepalligudem 534101, Andhra Pradesh, India
关键词
data privacy; healthcare; privacy-preserving computational techniques; data mining; machine learning; federated learning; CLOUD; SECURITY; ATTACKS; THREATS; CLASSIFICATION; ALGORITHMS; PROTECTION; NETWORKS; SCHEME;
D O I
10.1002/widm.1490
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data mining (DM) and machine learning (ML) applications in medical diagnostic systems are budding. Data privacy is essential in these systems as healthcare data are highly sensitive. The proposed work first discusses various privacy and security challenges in these systems. To address these next, we discuss different privacy-preserving (PP) computation techniques in the context of DM and ML for secure data evaluation and processing. The state-of-the-art applications of these systems in healthcare are analyzed at various stages such as data collection, data publication, data distribution, and output phases regarding PPDM and input, model, training, and output phases in the context of PPML. Furthermore, PP federated learning is also discussed. Finally, we present open challenges in these systems and future research directions.This article is categorized under:Application Areas > Health CareTechnologies > Machine LearningCommercial, Legal, and Ethical Issues > Security and Privacy
引用
收藏
页数:42
相关论文
共 50 条
  • [31] Privacy-Preserving Machine Learning Using Functional Encryption: Opportunities and Challenges
    Panzade, Prajwal
    Takabi, Daniel
    Cai, Zhipeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 7436 - 7446
  • [32] PRELIMINARY DATA ANALYSIS IN HEALTHCARE MULTICENTRIC DATA MINING: A PRIVACY-PRESERVING DISTRIBUTED APPROACH
    Damiani, Andrea
    Masciocchi, Carlotta
    Boldrini, Luca
    Gatta, Roberto
    Dinapoli, Nicola
    Lenkowicz, Jacopo
    Chiloiro, Giuditta
    Gambacorta, Maria Antonietta
    Tagliaferri, Luca
    Autorino, Rosa
    Pagliara, Monica Maria
    Blasi, Maria Antonietta
    van Soest, Johan
    Dekker, Andre
    Valentini, Vincenzo
    JOURNAL OF E-LEARNING AND KNOWLEDGE SOCIETY, 2018, 14 (01): : 71 - 81
  • [33] Privacy-Preserving Solutions for Blockchain: Review and Challenges
    Bernal Bernabe, Jorge
    Luis Canovas, Jose
    Hernandez-Ramos, Jose L.
    Torres Moreno, Rafael
    Skarmeta, Antonio
    IEEE ACCESS, 2019, 7 : 164908 - 164940
  • [34] Privacy-preserving data mining in the malicious model
    Kantarcioglu, Murat
    Kardes, Onur
    International Journal of Information and Computer Security, 2008, 2 (04) : 353 - 375
  • [35] Research on Privacy-Preserving Technology of Data Mining
    Shen, Yanguang
    Han, Junrui
    HuiShao
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 612 - 614
  • [36] Research on distributed privacy-preserving data mining
    Jia, Zhe
    Pang, Lei
    Luo, Shoushan
    Xin, Yang
    Zhang, Miao
    Journal of Convergence Information Technology, 2012, 7 (01) : 356 - 367
  • [37] Privacy-Preserving Healthcare Analytics of Trajectory Data
    Leung, Carson K.
    Olawoyin, Anifat M.
    Wen, Qi
    WEB AND BIG DATA, APWEB-WAIM 2021, PT II, 2021, 12859 : 414 - 420
  • [38] Privacy-preserving data mining in electronic surveys
    Zhan, Justin
    Matwin, Stan
    International Journal of Network Security, 2007, 4 (03) : 318 - 327
  • [39] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
  • [40] Privacy-preserving data mining in electronic surveys
    Zhan, J
    Matwin, S
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1179 - 1185