Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing

With the development of machine learning, it is popular that mobile users can submit individual symptoms at any time anywhere for medical diagnosis. Edge computing is frequently adopted to reduce transmission latency for real-time diagnosis service. However, the data-driven machine learning, which requires to build a diagnosis model over vast amounts of medical data, inevitably leaks the privacy of medical data. It is necessary to provide privacy preservation. To solve above challenging issues, in this article, we design a lightweight privacy-preserving medical diagnosis mechanism on edge, called LPME. Our LPME redesigns the extreme gradient boosting (XGBoost) model based on the edge-cloud model, which adopts encrypted model parameters instead of local data to remove amounts of ciphertext computation to plaintext computation, thus realizing lightweight privacy preservation on resource-limited edge. In addition, LPME provides secure diagnosis on edge with privacy preservation for private and timely diagnosis. Our security analysis and experimental evaluation indicates the security, effectiveness, and efficiency of LPME.

[1]  Robert H. Deng,et al.  Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything , 2019, IEEE Internet of Things Journal.

[2]  Yi Mu,et al.  Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization , 2019, IEEE Transactions on Services Computing.

[3]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[4]  Xu Chen,et al.  Adaptive User-managed Service Placement for Mobile Edge Computing: An Online Learning Approach , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[5]  Robert H. Deng,et al.  Hybrid privacy-preserving clinical decision support system in fog-cloud computing , 2018, Future Gener. Comput. Syst..

[6]  Hengrun Zhang,et al.  Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[7]  Dan Liu,et al.  A Survey on Secure Data Analytics in Edge Computing , 2019, IEEE Internet of Things Journal.

[8]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[9]  Der-Jiunn Deng,et al.  Smart Manufacturing Scheduling With Edge Computing Using Multiclass Deep Q Network , 2019, IEEE Transactions on Industrial Informatics.

[10]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[11]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[12]  Yang Song,et al.  Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[13]  Jianfeng Ma,et al.  Privacy-preserving and high-accurate outsourced disease predictor on random forest , 2019, Inf. Sci..

[14]  W. Marsden I and J , 2012 .

[15]  Qian Wang,et al.  Outsourced Biometric Identification With Privacy , 2018, IEEE Transactions on Information Forensics and Security.

[16]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[17]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[18]  Neil Genzlinger A. and Q , 2006 .

[19]  Xiaodong Lin,et al.  HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems , 2018, IEEE Transactions on Industrial Informatics.

[20]  Robert H. Deng,et al.  Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Internet of Things Journal.

[21]  Qing-Guo Wang,et al.  XGBoost Model for Chronic Kidney Disease Diagnosis , 2020, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[22]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[23]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[24]  Igor Kononenko,et al.  Machine learning for medical diagnosis: history, state of the art and perspective , 2001, Artif. Intell. Medicine.

[25]  Mohammad Al-Rubaie,et al.  Privacy-Preserving Machine Learning: Threats and Solutions , 2018, IEEE Security & Privacy.

[26]  Xiaodong Lin,et al.  Privacy preserving regression modelling via distributed computation , 2004, KDD.

[27]  W. Hager,et al.  and s , 2019, Shallow Water Hydraulics.

[28]  Robert H. Deng,et al.  Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.

[29]  A. Ravishankar Rao,et al.  A fully integrated open-source toolkit for mining healthcare big-data: architecture and applications , 2016, 2016 IEEE International Conference on Healthcare Informatics (ICHI).

[30]  Jianfeng Ma,et al.  PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting , 2020, Future Gener. Comput. Syst..

[31]  Pei Liu,et al.  Predicting Invasive Disease-Free Survival for Early Stage Breast Cancer Patients Using Follow-Up Clinical Data , 2019, IEEE Transactions on Biomedical Engineering.

[32]  Rajiv Ranjan,et al.  SAFE: SDN-Assisted Framework for Edge–Cloud Interplay in Secure Healthcare Ecosystem , 2019, IEEE Transactions on Industrial Informatics.

[33]  Haitian Pang,et al.  Intelligent Edge-Assisted Crowdcast with Deep Reinforcement Learning for Personalized QoE , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[34]  Jianfeng Ma,et al.  Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.

[35]  Lynn A. Karoly,et al.  Health Insurance Portability and Accountability Act of 1996 (HIPAA) Administrative Simplification , 2010, Practice Management Consultant.

[36]  Victor C. S. Lee,et al.  A Learning Algorithm for Real-Time Service in Vehicular Networks with Mobile-Edge Computing , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[37]  P. Alam ‘L’ , 2021, Composites Engineering: An A–Z Guide.

[38]  Yanjiao Chen,et al.  Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training , 2018, IEEE Transactions on Knowledge and Data Engineering.

[39]  Robert H. Deng,et al.  Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.

[40]  Maria Fazio,et al.  An Innovative Methodology for Big Data Visualization for Telemedicine , 2019, IEEE Transactions on Industrial Informatics.

[41]  Jianfeng Ma,et al.  Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing , 2022, IEEE Transactions on Services Computing.

[42]  Benny Pinkas,et al.  Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..

[43]  Agustí Verde Parera,et al.  General data protection regulation , 2018 .

[44]  Tomohiro Kuroda,et al.  Computer-aided diagnosis of lung nodule using gradient tree boosting and Bayesian optimization , 2017, PloS one.

[45]  Saraju P. Mohanty,et al.  eSeiz: An Edge-Device for Accurate Seizure Detection for Smart Healthcare , 2019, IEEE Transactions on Consumer Electronics.

[46]  Ximeng Liu,et al.  An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.

[47]  Tong Li,et al.  Outsourced privacy-preserving classification service over encrypted data , 2018, J. Netw. Comput. Appl..

[48]  Kim-Kwang Raymond Choo,et al.  Enabling verifiable multiple keywords search over encrypted cloud data , 2018, Inf. Sci..

[49]  Jaideep Vaidya,et al.  Privacy-Preserving SVM Classification on Vertically Partitioned Data , 2006, PAKDD.

[50]  P. Alam ‘S’ , 2021, Composites Engineering: An A–Z Guide.

[51]  Qiang Yang,et al.  SecureBoost: A Lossless Federated Learning Framework , 2019, IEEE Intelligent Systems.

[52]  Robert H. Deng,et al.  Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting , 2019, IEEE Transactions on Dependable and Secure Computing.

[53]  D. Blumenthal,et al.  Achieving a Nationwide Learning Health System , 2010, Science Translational Medicine.