End-to-end privacy preserving deep learning on multi-institutional medical imaging

被引:176
|
作者
Kaissis, Georgios [1 ,2 ,3 ,4 ]
Ziller, Alexander [1 ,2 ,4 ]
Passerat-Palmbach, Jonathan [3 ,4 ,5 ]
Ryffel, Theo [4 ,6 ,7 ]
Usynin, Dmitrii [1 ,2 ,3 ,4 ]
Trask, Andrew [4 ,8 ]
Lima, Ionesio, Jr. [4 ,9 ]
Mancuso, Jason [4 ,10 ]
Jungmann, Friederike [1 ]
Steinborn, Marc-Matthias [11 ]
Saleh, Andreas [11 ]
Makowski, Marcus [1 ]
Rueckert, Daniel [2 ,3 ]
Braren, Rickmer [1 ,12 ]
机构
[1] Tech Univ Munich, Inst Diagnost & Intervent Radiol, Munich, Germany
[2] Tech Univ Munich, Artificial Intelligence Med & Healthcare, Munich, Germany
[3] Imperial Coll London, Dept Comp, London, England
[4] OpenMined, New York, NY USA
[5] ConsenSys Hlth, New York, NY USA
[6] PSL Univ, ENS, INRIA, Paris, France
[7] Arkhn, Paris, France
[8] Univ Oxford, Ctr Governance AI, Oxford, England
[9] Univ Fed Campina Grande, Campina Grande, Paraiba, Brazil
[10] Cape Privacy, New York, NY USA
[11] Munchen Klin Schwabing, Munich, Germany
[12] German Canc Consortium DKTK, Partner Site Munich, Munich, Germany
基金
英国科研创新办公室;
关键词
DISEASES; SECURE;
D O I
10.1038/s42256-021-00337-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using large, multi-national datasets for high-performance medical imaging AI systems requires innovation in privacy-preserving machine learning so models can train on sensitive data without requiring data transfer. Here we present PriMIA (Privacy-preserving Medical Image Analysis), a free, open-source software framework for differentially private, securely aggregated federated learning and encrypted inference on medical imaging data. We test PriMIA using a real-life case study in which an expert-level deep convolutional neural network classifies paediatric chest X-rays; the resulting model's classification performance is on par with locally, non-securely trained models. We theoretically and empirically evaluate our framework's performance and privacy guarantees, and demonstrate that the protections provided prevent the reconstruction of usable data by a gradient-based model inversion attack. Finally, we successfully employ the trained model in an end-to-end encrypted remote inference scenario using secure multi-party computation to prevent the disclosure of the data and the model. Gaining access to medical data to train AI applications can present problems due to patient privacy or proprietary interests. A way forward can be privacy-preserving federated learning schemes. Kaissis, Ziller and colleagues demonstrate here their open source framework for privacy-preserving medical image analysis in a remote inference scenario.
引用
收藏
页码:473 / 484
页数:12
相关论文
共 50 条
  • [21] End-to-end Deep Reinforcement Learning for Multi-agent Collaborative Exploration
    Chen, Zichen
    Subagdja, Budhitama
    Tan, Ah-Hwee
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON AGENTS (ICA), 2019, : 99 - 102
  • [22] Effective End-to-End Deep Learning Process in Medical Imaging Using Independent Task Learning: Application for Diagnosis of Maxillary Sinusitis
    Oh, Jang-Hoon
    Kim, Hyug-Gi
    Lee, Kyung Mi
    Ryu, Chang-Woo
    Park, Soonchan
    Jang, Ji Hye
    Choi, Hyun Seok
    Kim, Eui Jong
    [J]. YONSEI MEDICAL JOURNAL, 2021, 62 (12) : 1125 - 1135
  • [23] Distributed, end-to-end verifiable, and privacy-preserving internet voting systems
    Chondros, Nikos
    Zhang, Bingsheng
    Zacharias, Thomas
    Diamantopoulos, Panos
    Maneas, Stathis
    Patsonakis, Christos
    Delis, Alex
    Kiayias, Aggelos
    Roussopoulos, Mema
    [J]. COMPUTERS & SECURITY, 2019, 83 : 268 - 299
  • [24] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Maryam Nasr Esfahani
    Behrouz Shahgholi Ghahfarokhi
    Shahram Etemadi Borujeni
    [J]. Wireless Networks, 2021, 27 : 4009 - 4037
  • [25] A Privacy-Preserving Remote Healthcare System Offering End-to-End Security
    Marin, Eduard
    Mustafa, Mustafa A.
    Singelee, Dave
    Preneel, Bart
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, ADHOC-NOW 2016, 2016, 9724 : 237 - 250
  • [26] End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
    Aysu, Aydin
    Gulcan, Ege
    Moriyama, Daisuke
    Schaumont, Patrick
    Yung, Moti
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 556 - 576
  • [27] End-to-end privacy preserving scheme for IoT-based healthcare systems
    Nasr Esfahani, Maryam
    Shahgholi Ghahfarokhi, Behrouz
    Etemadi Borujeni, Shahram
    [J]. WIRELESS NETWORKS, 2021, 27 (06) : 4009 - 4037
  • [28] Learning from simulation: An end-to-end deep-learning approach for computational ghost imaging
    Wang, Fei
    Wang, Hao
    Wang, Haichao
    Li, Guowei
    Situ, Guohai
    [J]. OPTICS EXPRESS, 2019, 27 (18) : 25560 - 25572
  • [29] An End-to-End Deep Learning Pipeline for Emphysema Quantification Using Multi-label Learning
    Negahdar, Mohammadreza
    Coy, Adam
    Beymer, David
    [J]. 2019 41ST ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2019, : 929 - 932
  • [30] Spectrum Monitoring Based on End-to-End Learning by Deep Learning
    Mahdiyeh Rahmani
    Reza Ghazizadeh
    [J]. International Journal of Wireless Information Networks, 2022, 29 : 180 - 192