Privacy-Enhancing Technologies in Collaborative Healthcare Analysis
Abstract
:1. Introduction
- (1)
- A comprehensive literature review has been conducted to focus on recent research studies using PETs in healthcare systems and investigations of the privacy requirements and challenges in healthcare industry.
- (2)
- This work investigates key enabling PETs, including federated learning, differential privacy, homomorphic encryption, synthetic data generation, multi-party computation (MPC), etc., and analysed how they affect the data utility in collaborative analysis.
- (3)
- Key recent research trends in the protection of healthcare data analysis were addressed, specifically highlighting privacy protection schemes within AI models utilizing healthcare data, and their impact on data utility.
2. Related Works
Privacy-Enhancing Technologies
3. Privacy Requirements and Challenges in Healthcare Industry
- Content Privacy: ensures and preserves patient data to prevent attackers from revealing it. However, this is insufficient for robust privacy, as attackers can potentially identify patient data by targeting the receiving doctor’s identification.
- Contextual Privacy: this involves two distinct sub-requirements: pseudonymity, where pseudonyms are used in lieu of real identities; and anonymity, which goes further by ensuring that patient identities remain unidentifiable from their data or actions. Anonymity includes preserving both patient and medical anonymity, along with unlinkability and unobservability.
4. Key Enabling Privacy Enhancing Technologies (PETs)
4.1. Data Minimisation
4.2. Federated Learning (FL)
4.3. Homomorphic Encryption (HE)
4.4. Anonymization
5. Discussion and Future Works
5.1. Discussion
5.2. Future Works
- (1)
- Secure AI models training. Develop methods for training AI models in a way that protects the privacy and security of the data, and the models themselves. This approach is important specially in industries that involve sensitive data, like finance, healthcare, and national security. This study will investigate potential vulnerabilities in model updates and ensure the models integrity while preserving privacy during the training process. The aim is to train accurate AI models without compromising the confidentiality of the data or the model parameters.
- (2)
- Hybrid privacy enhancing technologies. Construct hybrid solutions that adopt multiple PETs instead of using only one of them. The goal is to enhance the diverse requirements of data privacy in increasingly digital world. Clearly, further investigations are need in this approach in regard to its applicability, maturity, potential limitations and effective implementation strategies. An example of two promising techniques that can be used to address this privacy issue are HE and DP. HE enables secure computations on encrypted data, while DP offers strong privacy guarantees by adding noise to the data.
- (3)
- Lightweight PETs development. Developing lightweight versions of HE, SMC, or DP that could be applied especially in real-world AI and machine learning environments. These advancements will allow organizations to leverage the benefits of AI while persevering robust privacy protection. This work would be especially significant in industries that have strict privacy requirements, such as healthcare and finance, where data protection is critical.
- (4)
- Advances in Cryptographic Techniques. Advances in cryptographic techniques, especially FHE, are crucial. While FHE offers strong security and privacy, its computational demands are significant. Balancing privacy with computational efficiency is essential for practical real-world applications. Research in cryptography is anticipated to lead to the development of sophisticated methods for data security.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Khatir, R.A.; Izadkhah, H.; Razmara, J. Clustering-Based Anonymization Technique using Agglomerative Hierarchical Clustering. In Proceedings of the 2022 8th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), Behshahr, Iran, 28–29 December 2022; pp. 1–5. [Google Scholar]
- Kaaniche, N.; Laurent, M.; Belguith, S. Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. J. Netw. Comput. Appl. 2020, 171, 102807. [Google Scholar] [CrossRef]
- Khalid, N.; Qayyum, A.; Bilal, M.; Al-Fuqaha, A.; Qadir, J. Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Comput. Biol. Med. 2023, 158, 106848. [Google Scholar] [CrossRef]
- Number of People Affected by Health Data Breaches U.S. 2022. Available online: https://www.statista.com/statistics/798564/number-of-us-residents-affected-by-data-breaches/ (accessed on 9 July 2024).
- Cha, S.C.; Hsu, T.Y.; Xiang, Y.; Yeh, K.H. Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges. IEEE Internet Things J. 2019, 6, 2159–2187. [Google Scholar] [CrossRef]
- Fischer-Hbner, S.; Berthold, S. Privacy-enhancing technologies. In Computer and Information Security Handbook; Elsevier: Amsterdam, The Netherlands, 2017; pp. 759–778. [Google Scholar]
- Kunz, I.; Stephanow, P.; Banse, C. An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Alharbi, R.; Almagwashi, H. The Privacy Requirments for Wearable IoT Devices in Healthcare Domain. In Proceedings of the 2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Istanbul, Turkey, 26–28 August 2019; pp. 18–25. [Google Scholar]
- Aun, J.; Hurtado-Ram, D.; Porras-Díaz, L.; Irigoyen-Pen, B.; Rahmian, S.; Al-Khazraji, Y.; Soler-Garrido, J.; Kotsev, A. Evaluation and Utilisation of Privacy Enhancing Technologies—A Data Spaces Perspective. Data Brief 2024, 55, 110560. [Google Scholar] [CrossRef]
- Chatterjee, A.; Aung, K.M.M. Fully Homomorphic Encryption in Real World Applications; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
- Li, J.J.; Lin, X.; Tang, C.; Lu, Y.Q.; Hu, X.; Zuo, E.; Li, H.; Ying, W.; Sun, Y.; Lai, L.L.; et al. Disruption of splicing-regulatory elements using CRISPR/Cas9 to rescue spinal muscular atrophy in human iPSCs and mice. Natl. Sci. Rev. 2020, 7, 92–101. [Google Scholar] [CrossRef] [PubMed]
- Javed, I.T.; Alharbi, F.; Margaria, T.; Crespi, N.; Qureshi, K.N. PETchain: A Blockchain-Based Privacy Enhancing Technology. IEEE Access 2021, 9, 41129–41143. [Google Scholar] [CrossRef]
- Garrido, G.M.; Schmidt, K.; Harth-Kitzerow, C.; Klepsch, J.; Luckow, A.; Matthes, F. Exploring privacy-enhancing technologies in the automotive value chain. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 1265–1272. [Google Scholar] [CrossRef]
- Garrido, G.M.; Sedlmeir, J.; Uludağ, Ö.; Alaoui, I.S.; Luckow, A.; Matthes, F. Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review. J. Netw. Comput. Appl. 2022, 207, 103465. [Google Scholar] [CrossRef]
- Ustundag Soykan, E.; Karaçay, L.; Karakoç, F.; Tomur, E. A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning. IEEE Access 2022, 10, 97495–97519. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Pham, Q.V.; Pathirana, P.N.; Ding, M.; Seneviratne, A.; Lin, Z.; Dobre, O.; Hwang, W.J. Federated Learning for Smart Healthcare: A Survey. ACM Comput. Surv. 2022, 55, 1–37. [Google Scholar] [CrossRef]
- Liu, Q.; Zhou, F.; Chen, H. Secure medical data on cloud storage via DNA homomorphic encryption technique. Phys. Commun. 2024, 64, 102295. [Google Scholar] [CrossRef]
- Waheed, N.; Khan, F.; Mastorakis, S.; Jan, M.A.; Alalmaie, A.Z.; Nanda, P. Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data. In Proceedings of the 2023 IEEE International Conference on Omni-layer Intelligent Systems (COINS), Berlin, Germany, 23–25 July 2023; pp. 1–6. [Google Scholar]
- Sahlabadi, M.; Shukur, Z.; Muniyandi, R.C.; SaberiKamarposhti, M. GDP: Group-Based Differential Privacy Framework for Secure Process Mining in the Internet of Medical Things. In Proceedings of the 2023 International Conference on Electrical Engineering and Informatics (ICEEI), Bandung, Indonesia, 10–11 October 2023; pp. 1–6. [Google Scholar]
- Rane, J.; Mallick, S.; Kaya, O.; Rane, N. Federated learning for edge artificial intelligence: Enhancing security, robustness, privacy, personalization, and blockchain integration in IoT. In Future Research Opportunities for Artificial Intelligence in Industry 4.0 and 5.0; Deep Science Publishing: Erzurum, Turkey, 2024; Volume 5, pp. 2–94. [Google Scholar]
- Zhang, C.; Xie, Y.; Bai, H.; Yu, B.; Li, W.; Gao, Y. A survey on federated learning. Knowl.-Based Syst. 2021, 216, 106775. [Google Scholar] [CrossRef]
- Panigrahi, M.; Bharti, S.; Sharma, A. Federated Learning for Beginners: Types, Simulation Environments, and Open Challenges. In Proceedings of the 2023 International Conference on Computer, Electronics & Electrical Engineering & Their Applications (IC2E3), Srinagar Garhwal, India, 8–9 June 2023; pp. 1–6. [Google Scholar]
- Oldenhof, M.; Ács, G.; Pejó, B.; Schuffenhauer, A.; Holway, N.; Sturm, N.; Dieckmann, A.; Fortmeier, O.; Boniface, E.; Mayer, C.; et al. Industry-scale orchestrated federated learning for drug discovery. In Proceedings of the AAAI Conference on Artificial Intelligence, Washington, DC, USA, 7–14 February 2023; Volume 37, pp. 15576–15584. [Google Scholar]
- Pedrouzo-Ulloa, A.; Ramon, J.; Péerez-González, F.; Lilova, S.; Duflot, P.; Chihani, Z.; Gentili, N.; Ulivi, P.; Hoque, M.A.; Mukammel, T.; et al. Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies. In Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 31 July–2 August 2023; pp. 604–611. [Google Scholar]
- ISO/IEC 29100:2024; Information Technology—Security Techniques—Privacy Framework. ISO: Geneva, Switzerland, 2024.
- Li, J.; Meng, Y.; Ma, L.; Du, S.; Zhu, H.; Pei, Q.; Shen, X. A Federated Learning Based Privacy-Preserving Smart Healthcare System. IEEE Trans. Ind. Inform. 2022, 18, 2021–2031. [Google Scholar] [CrossRef]
- Terhörst, P.; Huber, M.; Damer, N.; Rot, P.; Kirchbuchner, F.; Struc, V.; Kuijper, A. Privacy Evaluation Protocols for the Evaluation of Soft-Biometric Privacy-Enhancing Technologies. In Proceedings of the 2020 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 16–18 September 2020; pp. 1–5. [Google Scholar]
- Haddad, Z. Enhancing privacy and security in 5G networks with an anonymous handover protocol based on Blockchain and Zero Knowledge Proof. Comput. Netw. 2024, 250, 110544. [Google Scholar] [CrossRef]
- Gatha; Chauhan, R.; Singh, D. Ensuring Privacy-Aware Data Release: An Analysis of Applicability of Privacy Enhancing Techniques to Real-World Datasets. In Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 4–5 June 2020; pp. 883–887. [Google Scholar]
- Liu, R.; Zeighami, S.; Lin, H.; Shahabi, C.; Cao, Y.; Takagi, S.; Konishi, Y.; Yoshikawa, M.; Xiong, L. Supporting Pandemic Preparedness with Privacy Enhancing Technology. In Proceedings of the 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 1–4 November 2023; pp. 34–43. [Google Scholar]
- Miller, J.; Chattopadhyay, A. Integrating Differential Privacy in Modern Database Curriculum. In Proceedings of the 2024 IEEE Integrated STEM Education Conference (ISEC), Princeton, NJ, USA, 9 March 2024; pp. 1–6. [Google Scholar]
- Li, C.; Palanisamy, B. Privacy in Internet of Things: From Principles to Technologies. IEEE Internet Things J. 2019, 6, 488–505. [Google Scholar] [CrossRef]
- Rai, H.M.; Shukla, K.K.; Tightiz, L.; Padmanaban, S. Enhancing data security and privacy in energy applications: Integrating IoT and blockchain technologies. Heliyon 2024, 10, e38917. [Google Scholar] [CrossRef] [PubMed]
- Tandon, R.; Gupta, P. Chapter 10—Security and privacy challenges in healthcare using Internet of Things. In IoT-Based Data Analytics for the Healthcare Industry; Singh, S.K., Singh, R.S., Pandey, A.K., Udmale, S.S., Chaudhary, A., Eds.; Intelligent Data-Centric Systems; Academic Press: Cambridge, MA, USA, 2021; pp. 149–165. [Google Scholar]
- Parihar, A.; Prajapati, J.B.; Prajapati, B.G.; Trambadiya, B.; Thakkar, A.; Engineer, P. Role of IOT in healthcare: Applications, security & privacy concerns. Intell. Pharm. 2024, 2, 707–714. [Google Scholar]
- Louassef, B.R.; Chikouche, N. Privacy preservation in healthcare systems. In Proceedings of the 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), El Oued, Algeria, 20–21 November 2021; pp. 1–6. [Google Scholar]
- Zhang, R.; Xue, R.; Liu, L. Security and Privacy for Healthcare Blockchains. IEEE Trans. Serv. Comput. 2022, 15, 3668–3686. [Google Scholar] [CrossRef]
- Thapa, C.; Camtepe, S. Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Med. 2021, 129, 104130. [Google Scholar] [CrossRef]
- Zhan, Y.; Meng, Y.; Zhou, L.; Zhu, H. Vetting Privacy Policies in VR: A Data Minimization Principle Perspective. In Proceedings of the IEEE INFOCOM 2023—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hoboken, NJ, USA, 20–20 May 2023; pp. 1–2. [Google Scholar]
- Lax, G.; Canino, A.; Musarella, L. A Blockchain-Based Approach for Certifying Information at Different Levels of Granularity According to the Data Minimization Principle of the GDPR. In Proceedings of the 2024 8th International Conference on Computer, Software and Modeling (ICCSM), Paris, France, 4–6 July 2024; pp. 31–35. [Google Scholar]
- Goldsteen, A.; Ezov, G.; Shmelkin, R.; Moffie, M.; Farkash, A. Data minimization for GDPR compliance in machine learning models. AI Ethics 2022, 2, 477–491. [Google Scholar] [CrossRef]
- Eichinger, T.; Küpper, A. On data minimization and anonymity in pervasive mobile-to-mobile recommender systems. Pervasive Mob. Comput. 2024, 103, 101951. [Google Scholar] [CrossRef]
- Mukta, R.; Paik, H.-y.; Lu, Q.; Kanhere, S.S. A survey of data minimisation techniques in blockchain-based healthcare. Comput. Netw. 2022, 205, 108766. [Google Scholar] [CrossRef]
- Senarath, A.; Arachchilage, N.A.G. A data minimization model for embedding privacy into software systems. Comput. Secur. 2019, 87, 101605. [Google Scholar] [CrossRef]
- Chen, Z.; Liao, G.; Ma, Q.; Chen, X. Adaptive Privacy Budget Allocation in Federated Learning: A Multi-Agent Reinforcement Learning Approach. In Proceedings of the ICC 2024—IEEE International Conference on Communications, Denver, CO, USA, 9–13 June 2024; pp. 5166–5171. [Google Scholar]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Vincent Poor, H. Federated Learning for Internet of Things: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2021, 23, 1622–1658. [Google Scholar] [CrossRef]
- Chen, S.; Huang, Y. A privacy-preserving federated learning approach for airline upgrade optimization. J. Air Transp. Manag. 2025, 122, 102693. [Google Scholar] [CrossRef]
- Korkmaz, A.; Alhonainy, A.; Rao, P. An Evaluation of Federated Learning Techniques for Secure and Privacy-Preserving Machine Learning on Medical Datasets. In Proceedings of the 2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), Washington, DC, USA, 11–13 October 2022; pp. 1–7. [Google Scholar] [CrossRef]
- Liu, B.; Lv, N.; Guo, Y.; Li, Y. Recent advances on federated learning: A systematic survey. Neurocomputing 2024, 597, 128019. [Google Scholar] [CrossRef]
- Abaoud, M.; Almuqrin, M.A.; Khan, M.F. Advancing Federated Learning Through Novel Mechanism for Privacy Preservation in Healthcare Applications. IEEE Access 2023, 11, 83562–83579. [Google Scholar] [CrossRef]
- Zeng, R.; Mi, B.; Huang, D. A Federated Learning Framework Based on CSP Homomorphic Encryption. In Proceedings of the 2023 IEEE 12th Data Driven Control and Learning Systems Conference (DDCLS), Xiangtan, China, 12–14 May 2023; pp. 196–201. [Google Scholar] [CrossRef]
- Tyagi, S.; Rajput, I.S.; Pandey, R. Federated learning: Applications, Security hazards and Defense measures. In Proceedings of the 2023 International Conference on Device Intelligence, Computing and Communication Technologies, (DICCT), Dehradun, India, 17–18 March 2023; pp. 477–482. [Google Scholar]
- Ajao, A.; Jonathan, O.; Adetiba, E. The Applications of Federated Learning Algorithm in the Federated Cloud Environment: A Systematic Review. In Proceedings of the 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG), Omu-Aran, Nigeria, 2–4 April 2024; pp. 1–15. [Google Scholar]
- Li, Z.; He, S.; Chaturvedi, P.; Hoang, T.H.; Ryu, M.; Huerta, E.A.; Kindratenko, V.; Fuhrman, J.; Giger, M.; Chard, R.; et al. APPFLx: Providing Privacy-Preserving Cross-Silo Federated Learning as a Service. In Proceedings of the 2023 IEEE 19th International Conference on e-Science (e-Science), Limassol, Cyprus, 9–13 October 2023; pp. 1–4. [Google Scholar]
- Oskoui, S.E.; Retford, M.; Forde, E.; Barnes, R.; Hunter, K.J.; Wozencraft, A.; Thompson, S.; Orton, C.; Ford, D.; Heys, S.; et al. Developing a prototype for federated analysis to enhance privacy and enable trustworthy access to COVID-19 research data. Int. J. Med. Inform. 2024, 195, 105708. [Google Scholar] [CrossRef] [PubMed]
- R, R.C.; Harshini, P.S.; N, T.; R, C.T.; Srinivas, D.B. A Multi-Stage Partial Homomorphic Encryption Scheme for Secure Data Processing in Cloud Computing. In Proceedings of the 2023 2nd International Conference on Edge Computing and Applications (ICECAA), Namakkal, India, 19–21 July 2023; pp. 58–62. [Google Scholar]
- Curzon, J.; Almehmadi, A.; El-Khatib, K. A survey of privacy enhancing technologies for smart cities. Pervasive Mob. Comput. 2019, 55, 76–95. [Google Scholar] [CrossRef]
- Xiong, J.; Chen, J.; Lin, J.; Jiao, D.; Liu, H. Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption. J. Inf. Secur. Appl. 2024, 86, 103887. [Google Scholar] [CrossRef]
- Ni, C.; Cang, L.S.; Gope, P.; Min, G. Data anonymization evaluation for big data and IoT environment. Inf. Sci. 2022, 605, 381–392. [Google Scholar] [CrossRef]
- Montenegro, H.; Cardoso, J.S. Anonymizing medical case-based explanations through disentanglement. Med. Image Anal. 2024, 95, 103209. [Google Scholar] [CrossRef] [PubMed]
- Madan, S.; Goswami, D.P. An Extensive Study on Statistical Data Anonymization Algorithms. In Proceedings of the 2018 3rd International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur, India, 22–25 November 2018; pp. 1–5. [Google Scholar]
- Majeed, A.; Lee, S. Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey. IEEE Access 2021, 9, 8512–8545. [Google Scholar] [CrossRef]
- Ali, M.S.; Ahsan, M.M.; Tasnim, L.; Afrin, S.; Biswas, K.; Hossain, M.M.; Ahmed, M.M.; Hashan, R.; Islam, M.K.; Raman, S. Federated Learning in Healthcare: Model Misconducts, Security, Challenges, Applications, and Future Research Directions–A Systematic Review. arXiv 2024, arXiv:2405.13832. [Google Scholar]
Ref. | Methods | Strengths | Limitations |
---|---|---|---|
[6] | Various PETs | the legal foundation of PETs and provided a classification of PETs and a selection of some of the most relevant PETs. | Economic, social and usability aspects of PETs. |
[10] | Various PETs/IoT area | Assess the development of PETs across fields, evaluating their compliance with legal standards and effectiveness in mitigating privacy threats. | Need research of PETs in the category of holistic privacy preservation |
[11] | Various PETs/IoT area | Analyse, evaluate, and compare various PETs that can be deployed at different layers of a layered IoT architecture to meet the privacy requirements of the individuals interacting with the IoT systems. | A careful consideration of the unique features associated with the IoT, including the use of heterogeneous power-limited devices and the massive need for streaming data flow |
[2] | Various PETs | A taxonomy classifying eight categories of PETs into three groups, and for better clarity. | Point out which PETs best fit each personalized service category. The trade-off between privacy preservation and personalized services, Technical, user experience, legal, and economic challenges. |
[7] | Various PETs/IoT area | A framework for the application of PETs in IoT communications. discuss an example implementation based on a car-sharing service. | Develop a security model for the framework. Possible threats include, e.g., rogue framework instances and malicious traffic injection. |
[12] | Various PETs/Blockchain | present PETchain: a novel privacy enhancing technology using blockchain and smart contract. | Checking PETchain compatibility with GDPR to improve it. |
[13] | Various PETs | Investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. | Handle large volumes of data and address requirements. |
[11] | Federated Learning/Healthcare | Take Alzheimer’s disease (AD) as an example and design a convenient and privacy-preserving system named ADDETECTOR with the assistance of Internet of Things (IoT) devices and security mechanisms. | Discover more effective features to represent the characteristics of ADs and evaluate the feasibility of ADDETECTOR on a larger dataset. |
[14] | Various PETs/IoT area | Reveal the landscape of PETs in data markets for the IoT. Identify and filter the studies aiming to solve this landscape’s challenges. | The IoT challenges for privacy enhancement, consequences of a lack of interoperability, computation and storage constraints, and the privacy disparity across jurisdictions. |
[15] | SMPC, HE, DP, CC | a detailed analysis of collaborative ML approaches from a privacy perspective, and a detailed threat model and security and privacy considerations for each collaborative method. Deeply analyse (PETs) in the context of collaborative ML. | Verifiability of computations to provide proof points in collaborative ML/AI message flow |
[16] | FL/Smart Healthcare | Review on the emerging applications of FL in key healthcare domains, including health data management, remote health monitoring, medical imaging, and COVID-19 detection. Analyse Several recent FL-based smart healthcare projects | Communication Issues in FL-based Smart Healthcare. Standard Specifications for Federated Healthcare Deployment. Security Issues in FL-based Smart Healthcare |
[17] | Various PETs/healthcare | An overview of how to integrate PETs into pandemic preparedness | Privacy/Utility Trade-Off, Infrastructure Deployment, Public Trust and Acceptance. |
[18] | DP/Smart Home Data | Employ the Local Differential Privacy (LDP) technique and propose a framework for securing data collection in smart homes based on the k-Anonymity Ran-domized Response (k-RR) algorithm. | Explored alternative probabilistic models, such as the Maximum Entropy Markov Model (MEMM), Gaussian distribution, or Dirichlet distribution, for comparative purposes. |
[19] | DP/IoMT | A Group-based DP (GDP)framework for Process Mining to protect the privacy of healthcare data in specific columns which are neither activity nor class ID. evaluate of prominent PM algorithms. | Striking a balance between DP and data utility in PM poses a challenge. Resource optimization |
[20] | FL, AI/IoT | Investigate developments in FL for edge AI, with an emphasis on strengthening security and resilience against adversarial attacks.Examine privacy-preserving methods. Explore personalization techniques that enable FL models to adjust to the unique needs of individual IoT devices, enhancing system performance and user experience. | Data Heterogeneity, Communication Efficiency, Privacy and Security, Scalability and Resource Constraints, Personalization and Model Adaptation, AND Incentive Mechanisms |
PET | Description | Use Cases | Strengths | Limitations |
---|---|---|---|---|
Data minimization | Restricting personal data collection and use to the minimum necessary | Privacy-by-design systems, Data compliance | Legal compliance, High level of privacy | Loss of utility, Conflict with business interests, Complex |
FL | Training machine learning models on decentralized entities holding local data without sharing them | AI development, Mobile app, Healthcare | Data not shared, Decentralization, Scalability | Insufficient amount of data, Privacy concerns, Systems Heterogeneity |
HE | Allows performing computations on encrypted data instead of raw data | Financial analysis, Healthcare, Cloud computing | Data encrypted throughout process, Compatible with most data types | Computation overhead, Complex |
Data anonymization | Techniques to protect personal information during data collection | Public dataset research, Healthcare | Cost and risks reduction, Easy to implement | Risk of re-identification, Loss of utility |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alnasser, M.; Li, S. Privacy-Enhancing Technologies in Collaborative Healthcare Analysis. Cryptography 2025, 9, 24. https://doi.org/10.3390/cryptography9020024
Alnasser M, Li S. Privacy-Enhancing Technologies in Collaborative Healthcare Analysis. Cryptography. 2025; 9(2):24. https://doi.org/10.3390/cryptography9020024
Chicago/Turabian StyleAlnasser, Manar, and Shancang Li. 2025. "Privacy-Enhancing Technologies in Collaborative Healthcare Analysis" Cryptography 9, no. 2: 24. https://doi.org/10.3390/cryptography9020024
APA StyleAlnasser, M., & Li, S. (2025). Privacy-Enhancing Technologies in Collaborative Healthcare Analysis. Cryptography, 9(2), 24. https://doi.org/10.3390/cryptography9020024