Medical Diagnostics Based on Encrypted Medical Data

We utilize a type of encryption scheme known as a Fully Homomorphic Encryption (FHE) scheme which allows for computation over encrypted data. Our encryption scheme is more efficient than other publicly available FHE schemes, making it more feasible. We conduct simulations based on common scenarios in which this ability is useful. In the first simulation we conduct time series analysis via Recursive Least Squares on both encrypted and unencrypted data and compare the results. In simulation one, it is shown that the error from computing over plaintext data is the same as the error for computing over encrypted data. In the second simulation, we compute two known diagnostic functions over publicly available data in order to calculate computational benchmarks. In simulation two, we see that computation over encrypted data using our method incurs relatively lower costs as compared to a majority of other publicly available methods. By successfully computing over encrypted data we have shown that our FHE scheme permits the use of machine learning algorithms that utilize polynomial kernel functions.

[1]  Anand D. Sarwate,et al.  Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data , 2013, IEEE Signal Processing Magazine.

[2]  Nicolas Gama,et al.  Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds , 2016, ASIACRYPT.

[3]  Wei Zhang,et al.  Encrypted SVM for Outsourced Data Mining , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[4]  S. Thacker,et al.  HIPAA privacy rule and public health. Guidance from CDC and the U.S. Department of Health and Human Services. , 2003, MMWR supplements.

[5]  Jianqiang Li,et al.  A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..

[6]  Frederik Vercauteren,et al.  Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[7]  S. Fienberg,et al.  Secure multiple linear regression based on homomorphic encryption , 2011 .

[8]  Yunghsiang Sam Han,et al.  Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.

[9]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[10]  Max A. Little,et al.  Accurate Telemonitoring of Parkinson's Disease Progression by Noninvasive Speech Tests , 2009, IEEE Transactions on Biomedical Engineering.

[11]  Michael Naehrig,et al.  Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.

[12]  Louis J. M. Aslett,et al.  A review of homomorphic encryption and software tools for encrypted statistical machine learning , 2015, ArXiv.

[13]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[14]  Jonathan Katz,et al.  Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.

[15]  Dima Grigoriev,et al.  Homomorphic public-key cryptosystems over groups and rings , 2003, ArXiv.

[16]  Delaram Kahrobaei,et al.  Practical private-key fully homomorphic encryption in rings , 2018, Groups Complex. Cryptol..

[17]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.

[18]  Léo Ducas,et al.  FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second , 2015, EUROCRYPT.

[19]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[20]  Yoshinori Aono,et al.  Scalable and Secure Logistic Regression via Homomorphic Encryption , 2016, IACR Cryptol. ePrint Arch..

[21]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[22]  Andreas S. Weigend,et al.  Multi-Channel Physiological Data: Description and Analysis (Data Set B) , 2018 .

[23]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[24]  Jenna Wiens,et al.  A study in transfer learning: leveraging data from multiple hospitals to enhance hospital-specific predictions , 2014, J. Am. Medical Informatics Assoc..

[25]  T. Poggio,et al.  The Mathematics of Learning: Dealing with Data , 2005, 2005 International Conference on Neural Networks and Brain.

[26]  Beata Strack,et al.  Impact of HbA1c Measurement on Hospital Readmission Rates: Analysis of 70,000 Clinical Database Patient Records , 2014, BioMed research international.

[27]  Craig Gentry,et al.  Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.

[28]  Michael Naehrig,et al.  Private Predictive Analysis on Encrypted Medical Data , 2014, IACR Cryptol. ePrint Arch..

[29]  Michael Naehrig,et al.  ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.

[30]  Yin Yang,et al.  Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..

[31]  Lennart Ljung,et al.  System Identification: Theory for the User , 1987 .

[32]  Shai Halevi,et al.  Algorithms in HElib , 2014, CRYPTO.

[33]  P. Strappe,et al.  Gene Modification of Mesenchymal Stem Cells and Articular Chondrocytes to Enhance Chondrogenesis , 2014, BioMed research international.

[34]  Stratis Ioannidis,et al.  Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.

[35]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[36]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[37]  S. Thacker HIPAA Privacy Rule and Public Health , 2003 .

[38]  Shafi Goldwasser,et al.  Machine Learning Classification over Encrypted Data , 2015, NDSS.