A Privacy-Preserving Approach For Building Learning Models in Smart Healthcare using Blockchain and Federated Learning

RESEARCH CREW
9:45 16/10/2022
Nowadays, the amount of data generated from Internet of Things (IoT) devices is increasing, paving the way for the development of artificial intelligence (AI) applications. However, with the traditional AI approach, users sharing their raw data causes many concerns in terms of privacy leakage. There have been reports that there are privacy violations on private data of users. In the medical field, the creation of devices to help automatically diagnose the user's disease is gradually becoming a trend in the future. These devices help users monitor their own health, thereby reducing pressure on medical facilities that are often overloaded. However, the healthcare data of individuals will often be very sensitive and rarely shared by users. In addition, the profits generated from machine learning (ML) models mostly belong to the owners of that model. It also becomes an obstacle in encouraging users to share their data. In this article, we propose PriFL-Chain, a privacy-preservation framework to take advantage of data resources of data owners for training ML-based models, while ensuring the privacy of data owners. Specifically, we apply Differential privacy (DP) to federated learning (FL) to train ML models. Users just share the ML model trained on their data instead of sharing the raw data. Furthermore, the contribution activities of users in the system are recorded to the Blockchain to ensure transparency. We also leverage Mobile Edge Computing (MEC) and InterPlanetary File System (IPFS) to reduce the pressure on the central server and reduce data communication costs, making the system more flexible. Experimental results have demonstrated that the combined strategy of FL, Blockchain, IPFS, and MEC can help reduce the cost of training ML models, effectively protect privacy, and utilize data sources of diversity from the community.
TIN LIÊN QUAN
The diverse landscape of network models, including Software-Defined Networking (SDN), Cloud Computing (C2), and Internet of Things (IoT), is evolving to meet the demands of flexibility and performance. However, these environments face numerous security challenges due to cyber-attack complexity. Traditional defense mechanisms are no longer effective against modern attacks. Therefore,...
As data driven-based Windows malware detectors become increasingly prevalent, the need for robust evaluation and enhancement of adversarial malware generation techniques also becomes imperative, as malicious actors will adapt and enhance their malware to evade detection. There are numerous works that introduce new techniques or enhancements for adversarial malware. One...
The abuse of prescription medications has become a severe public health crisis fueled by limited coordination and oversight across healthcare systems. Current frameworks lack interoperability between doctors, pharmacies, and regulators, enabling abusive practices like doctor shopping and pharmacy hopping. To address these issues, this research proposes Medichain, a novel multichain-based...