Submitted:
07 October 2023
Posted:
10 October 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Research Motivations
- Surveys have shown that many people are concerned about healthcare information privacy. Close to two-thirds of clients paid attention to the privacy of personal healthcare, and 39% of respondents assume that their health data is safe [5]
- Some people are concerned that their healthcare data is not safe via the internet, and they are worried about security and privacy vulnerability [6]
- About half of the research participants believe that exchanging their medical records is not in their best interest to secure their privacy [7]
- In 2021, the Department of Health and Human Services Office for Civil Rights (OCR) implemented corrective action to settle potential violations of HIPAA, which included a privacy and security rules-related data breach that affected 9.3 million people [8]
- The existing EMR systems show that about 40% of physicians identified the design and interoperability as primary sources of dissatisfaction (sample size of 8,774 physicians) [9]
1.2. Problem Statements
1.3. Research Gaps
- Lack of assessment from multiple perspectives
- Lack of a comprehensive chronological model: Lack of approach
- Highlight inherent issues
- Lack of expert assessment and qualifications
- Lack of legal framework for the EMR system
- Leveraging Differential Privacy for privacy protection
- Fundamental and applied research on Differential Privacy
1.4. Methodology Overview
2. Background Study
2.1. Blockchain Technology Concept
2.1.1. Types of Blockchain
2.1.2. Characteristics of Blockchain
- Decentralization: This is a peer-to-peer transaction without a centralized validation or authorization system. The access is granted to each participant with the full right to verify transactions within the network [20]. To decentralize the network, technology such as cryptographic hash, digital signature, and distributed consensus mechanisms are required for security fortification. The consensus protocol is to ensure data integrity. Therefore, decentralization enhances protection against vulnerability in the network at risk of security attacks [21].
- Immutability and Transparency: This concept means that after creating and adding the block, it cannot be altered or removed [22]. The structure of the Blockchain is formed and linked together in an orderly manner that contains transaction information.
- Auditability: Any transaction in the Blockchain network is traceable to its previous transaction. Therefore, the timestamp is incorporated in transaction validation and records [23].
- Smart Contract: This is based on certain conditions; when met, it is automatically filed and executed, such as control accesses and privileges [21].
- Security: By design, the Blockchain network uses a private or public key to access or make transactions. This is due to hashing that seals each block from a third party [10].
2.1.3. Blockchain Benefit in EMR
| Benefit | Description | References |
| Transparency | Due to Blockchain immutability, data cannot be deleted or altered. Blockchain is a more transparent system that stores EMR. | [23,21] |
| Data Integrity | Blockchain ensures data integrity so that no centralized authority is at risk of security attacks. | [21,24] |
| Security | EMR is sensitive data, and such Blockchain provides encryption capabilities that minimize attacks and protects vulnerability. | [23,21] |
| Interoperability | Decentralization helps to improve interoperability which facilitates the exchange of EMRs and grants patients’ ownership and control of their records. | [23,26] |
| Patient-Centered | The right of patients to access or grant access to authorized personnel in EMR systems is restored. | [21,25] |
2.1.4. Limitations of Blockchain in EMR
| Literature | Challenges/Considerations | References |
| Blockchain Adoption: Technological, organizational, and environmental considerations |
The top factors are management support, organizational readiness, and organizational size. | [28] |
| Blockchain Application in EMR Systems: | Requirements that impact EMR systems as it relates to Blockchain application, such as non-standardized system, decentralized storage and privacy, key management and scalability, and IoT | [29] |
| Blockchain application for access control management: secure data storage | The encrypted information is stored in a third party that the hub services on the Blockchain. | [30] |
| A Blockchain that is based on data sharing system | Miners are provided with access to aggregate and reward the data bookkeeper. | [31] |
| IBM report: Technical challenges that restrict Blockchain application | The major challenge is scalability. Blockchain ecosystems within corporate legacy and systems of record are challenging operations. | [26] |
| IBM Institute for Business Value survey: Respondents from 200 healthcare executives in 16 nations | Studies show that over half cited Blockchain’s early/immature state as an issue. | [32] |
| Deloitte Blockchain Technology challenges in life science and EMR System | Stakeholders engage in multiple efforts, such as healthcare organizations and health plans, standardization, cost, and regulations, to ensure commitment to Blockchain adoption. | [33] |
2.2. Differential Privacy Concept
2.2.1. Mechanism of Differential Privacy
2.2.2. Technical Challenges in the Application of Differential Privacy
- Sensitivity: The absence or presence of individual records in the dataset is indistinguishable and maintained. Introducing Differential Privacy in practical datasets requires statistical query and low-sensitivity evaluation [42]. There is a trade-off that exists between accuracy (utility) and privacy. This challenge emerges in services and applications using different sensitivities [43,44].
- Choosing Epsilon Value (ϵ-Privacy Loss): Choosing the privacy parameter ε is a question that users of Differential Privacy cannot avoid [92]. The strength of privacy guaranteed is controlled by ε, and it is not clear how to choose an appropriate value in a given situation, as shown in [45,46]. In [61], the smaller ε is, the higher the increase in security and vice versa.
- Data Correlation: In a real-world dataset, there is a correlation in certain records that leads to the disclosure of information. Many researchers developed model-based and transformation-based approaches such that sensitivity weights, correlation degree, and correlated sensitivity overcome these challenges [47].
- Other challenges include a lack of computing environment, a system to align with users’ needs, and a lack of trained personnel to verify implementation and correctness [60].
2.2.3. Other Approach to Enhance Privacy in EMR - Federated Learning (FL)
2.3. Integration of Differential Privacy and Blockchain
2.3.1. Overview of Differential Privacy Integration with Healthcare Application Over Blockchain Network
2.3.2. Advantages of Integration of Differential Privacy in Blockchain
- Various Blockchain scenarios require Differential Privacy mechanisms to protect personal data. When a transaction is carried out in a Blockchain system, the information is distributed throughout the decentralized network to update and keep records in the ledger. However, the adversary can reserve this information for a specific individual. To protect this information, Laplace and Gaussian mechanisms of Differential Privacy are efficiently perturbated to ensure identity privacy [4,63].
- Information stored in decentralized Blockchain databases can be used to conduct surveys [64]. However, personal information can be compromised if the adversary conducting the surveys is an insider in an organization. In this case, the exponential query evaluation mechanism of Differential Privacy ensures the protection of private information from such adversaries.
- Anonymization, as described in the literature, is used to address privacy concerns in Blockchain [65]. However, numerous experiments have shown that an anonymization operation is not complete data protection; for instance, in [66], any anonymized data from similar datasets can be combined to reveal personal data. These issues can be overcome by a viable solution of integration of Differential Privacy in Blockchain [4].
- In real-time data transmission in a Blockchain application, the data perturbation operation of Differential Privacy can add noise to data without compromising its accuracy [67].
3. Methodology
3.1. Research Goal
- To identify the inherent factors that impact Blockchain applications concerning the security and privacy of EMR systems and to investigate the supporting platform that permits integration of Differential Privacy as a covering layer.
- To categorize this investigation into three areas that address (a) e-Health Record Privacy, (b) Real-Time Health Data, and (c) Health Survey Data Protection.
3.2. Research Questions (RQs)
| ID | Research Questions |
| RQ1 | How can DP be integrated into BC to enhance privacy and security in the e-Health domain (e.g., EMR)? |
| RQ2 | What factors contribute to the DP mechanisms integration in Blockchain Technology and associated issues? |
| RQ3 | What types of datasets and programming languages are being considered for implementation? |
| RQ4 | What are the limitations and inherent challenges of the BT and DP applications, and how can they be solved? |
| Note that the above questions are narrowed to only e-Health domains | |
3.3. Research Strategy
3.3.1. Search Terms
| Numbers | Keywords |
| 1 | Review, survey, literature review, background |
| 2 | Electronic medical records, e-Health domain*, electronic health record, health information technology, patient health information |
| 3 | Blockchain Technology, Differential Privacy*, privacy, data |
| 4 | Data perturbation, Differential Privacy mechanisms |
| *the keyword noted while searching | |
3.3.2. Literature Sources
| Online Libraries | Numbers of Retrieved Literature |
| IEEE | 32 |
| ACM | 8 |
| ScienceDirect | 6 |
| AMIA | 1 |
| Others | 58 |
| Total | 105 |
3.3.3. Search Process
- Phase One: Initial searching phase consists of the four online library databases. Each paper is searched separately with keywords, as shown in Table 3.3.
- Phase Two: In this phase, the search is conducted based on the references of a particular paper. By scanning the list of references for relevant papers, they are added if there is a relation to the keywords.

3.3.4. Study Selection
- Initial selection phase: The aim is to obtain papers that offer sufficient background about this research. This section applies inclusion criteria (IC) and exclusion criteria (EC) to filter any related papers that answer the research questions. IC and EC are defined below.
- o
-
The inclusion criteria (IC) are as follows:
- Papers published from 2008 (only a few papers published in 2005 and 2006)
- Papers published until 2022
- Papers that describe Blockchain and Differential Privacy
- Papers that describe EMR, e-Health domain
- Academic papers and journals
- Review or survey papers
- Check for duplicate publications - completed or newly released of the same study
- o
-
The exclusion criteria (EC) are presented below:
- Papers in digital libraries that are duplicated
- News, correspondences, summaries of presentations, posters, and workshop
- Abstract of papers that are not written in the English language
- Final selection phase: This phase selects papers with the acceptable quality needed to extract information. The selection in the final phase uses study quality assessment, as explained in section 3.4 below.
3.4. Study Quality Assessment
| ID | Quality Assessment Questions |
| QAQ1 | Are the review papers related to e-Health domain under Blockchain and Differential Privacy? |
| QAQ2 | Do the papers cover other Differential Privacy applications under different fields? |
| QAQ3 | Do the papers use theoretical or practical based methods to answer research questions? |
| QAQ4 | Are there common or inherent limitations in their studies? |
| QAQ5 | Is the research question similar or different from other papers? |
| QAQ6 | Do the proposed methods provide solutions that are different from the existing papers? |
| Category | Papers Selection* |
| EMR Privacy | Roehrs et al. [20], ElSalamouny et al. [43], Saleheen et al. [77], Raisaro et al. [98], Lin et al. [78], Guan et al. [101], Machanavajjhala et al. [44], [98], Alnemari et al. [93], Hadian et al. [80], Mohammed et al. [97], Tang et al. [102], Raisaro et at. [99] |
| Real-Time Health Data | Geo et al. [83], McSherry et al. [46], Machanavajjhala et al [45], Zhang et al. [3] |
| Health Survey Data Protection | Luo et al. [84], Narayanan et al. [104], Valdezet al. [91], Narayanan et al. [105] |
| *This selection is for the research framework and methodology | |
4. Results
- Real-Time Health Data represents papers that have been investigated based on the real-time health data releasing scheme. Most of this data comes from IoT devices such as wearables for real-time data collection and sharing. Therefore, all papers discussing Differential Privacy and Blockchain are under this category.
- Electronic Medical Record (EMR) Privacy represents papers that EMR systems have covered. The EMR consists of all clinical data, laboratory tests, and diagnosis results in different numeric and non-numeric queries. These papers discussed protecting sensitive health data from databases using Differential Privacy mechanisms.
- Health Survey Data Protection represents papers discussed in the statistical database regarding how health survey data is improved based on users’ perspectives and the Differential Privacy mechanisms to enhance privacy-utility trade-off in e-Health (e.g., EMR).

4.1. RQ1: How can DP be integrated into BC to enhance privacy and security in the e-Health domain (e.g., EMR)?
4.2. RQ2: What factors contribute to the DP mechanisms integration in Blockchain Technology and associated issues?
4.3. RQ3: What types of datasets and programming languages are being considered for implementation?
- The EMR Privacy category, according to Saleheen et al. [77], shows a dataset with 660 hours of ECG (electrocardiogram) from participants whose private dataset was collected. Lin et al. [78] collected private datasets from wearable sensors, [79] collected heart disease datasets, and Hadian et al. [80] collected datasets from wearable devices that users attached to their bodies to monitor heart rate. A blood bank dataset containing individual information has utilized a research record dataset [81]. In addition, datasets are also obtained during activities such as walking, running, and sleeping. Kim et al. [82] obtained a dataset from daily step counts using a Gear S3 smartwatch. Table 4.1 below shows a summary of dataset utilization in the e-Health domain.
- Health Survey Data Protection discusses and provides inside surveys according to users’ perspectives. Most of these datasets from a database are statistically queried. Luo et al. [84] surveyed two real-world case studies. One of the cases uses a health survey based on students’ heart rates to find the average and distribution statistically. The second case is for collaboration to classify models based on emotions. Yang et al. [85] also use real-world public datasets with one million health datasets. The summary is shown in Table 4.1 below.
| Data Type | EMR Privacy | Real-Time Health Data | Health Survey Data Protection |
|---|---|---|---|
| Private (Heart-related) | [78, 80] | [78] | [84] |
| Public | [81] | _ | [85] |
| Private | [78] | _ | _ |
| Public (Activities, e.g., running, walking) | [81] | _ | _ |
| Private (Wearable sensors) | [82, 80] | [83] | _ |
| A systemic literature review (SLR) on e-Health data under Differential Privacy | |||
4.4. RQ4: What are the limitations and inherent challenges of the BT and DP applications, and how can they be solved?
- EMR Privacy: As discussed in [20], Blockchain Technology has scalability issues. Most of the proposed solutions for Differential Privacy are for static database information as it confines to a single dimension [86]. Another issue is that most of the privacy protection approach needs a practical roadmap for implementation, and some models suffer from degradation in performance as the number of cloud resources increases [87]. Zhang et al. [86] proposed a more complex algorithm than existing works. The methods are also vulnerable to information leakage, giving adversaries more knowledge about sensitive data.
- Real-Time Health Data: Proposed solutions for real-time data in differential applications suffer data perturbation errors [88] because of relative and absolute errors [89]. The strength of privacy guaranteed is controlled by ε, and it is not clear how to choose an appropriate value in a given situation, as shown in [45,46], where algorithms have chosen ε from the range of 0.01 to 7. For example, in [90], a large budget (ε >1) shows no corresponding advantages. Similarly, in [83], there is evidence that increasing the epsilon value weakens the algorithm. Therefore, choosing an appropriate epsilon value is challenging for a threshold application.
- Health Survey Data Protection: Challenges of complete privacy protection exist when individuals participate in a survey that potentially reveals their sensitive information [91].
5. Challenges and Limitations
6. Contributions and Recommendations
- Integrating blockchain and differential is much more complex, and theoretically based models are primarily published on enhancing privacy in the e-Health Domain.
- This paper gives insight into why the failure of many differential privacy and blockchain proposed projects. These are indicated in the literature review and gap analysis sections, and a developed framework needs to be developed to leverage differential privacy.
- Most literature could be more intuitive, and we need to know the connection between the academic platform and the practical application of differential privacy. Furthermore, more knowledge about researchers' and developers' expectations are required.
Conclusions
References
- Centers for Disease Control and Prevention. (2018, September 14). Health Insurance Portability and accountability act of 1996 (HIPAA). Centers for Disease Control and Prevention. Retrieved January 31, 2022, from https://www.cdc.gov/phlp/publications/topic/hipaa.html.
- Compliancy Group. (2022, July 22). The CIA triad: Confidentiality, integrity, availability for HIPAA. Compliancy Group. Retrieved December 2, 2022, from https://compliancy-group.com/the-cia-triad-confidentiality-integrity-availability-for-hipaa/.
- J. Zhang, X. Liang, Z. Zhang, S. He, and Z. Shi, “Re-dpoctor: Real-time health data releasing with w-day differential privacy,” arXiv preprint arXiv:1711.00232, 2017. arXiv:1711.00232, 2017.
- M. U. Hassan, M. H. Rehmani and J. Chen, "Differential Privacy Techniques for Cyber Physical Systems: A Survey," in IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 746-789, Firstquarter 2020. [CrossRef]
- Keshta,I., & Odeh, A. Security and Privacy of Electronic Health Records: Concerns and Challenges, Egyptian Informatics Journal, Volume 22, Issue 2, 2021, Pages 177-183, ISSN 1110-8665, (https://www.sciencedirect.com/science/article/pii/S1110866520301365). [CrossRef]
- G. Perera, A. Holbrook, L. Thabane, G. Foster, D.J. Willison Views on Health Information Sharing and Privacy from Primary care Practices using Electronic Medical Records Int J Med Informatics, 80 (2) (2011), pp. 94-101. [CrossRef]
- J. Ancker, M. Silver, M. Miller, R. Kaushal Consumer Experience with and Attitude Toward Health Information Technology: A Nationwide Survey Am Medical Informatics Assoc, 1 (2012), pp. 152-156 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3555333/.
- (OCR), O. for C. R. (2021, June 28). Health insurer pays $5.1 million to settle data breach affecting over 9.3 million people. HHS.gov. Retrieved February 1, 2022, from https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/excellus/index.html.
- EHRIntelligence, K. M. (2018, September 18). Ehr Design, Interoperability Top List of physician pain points. EHRIntelligence. Retrieved February 1, 2022, from https://ehrintelligence.com/news/ehr-design-interoperability-top-list-of-physician-pain-points.
- H. Wang, Z. Zheng, S. Xie, H. N. Dai, and X. Chen, “Blockchain Challenges and Opportunities: A Survey,” International Journal of Web and Grid Services, vol. 14, no. 4, p. 352, 2018, https://www.inderscienceonline.com/doi/abs/10.1504/IJWGS.2018.095647. [CrossRef]
- R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. Johnson, ... & Song, D. (2019, June). Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 185-200). IEEE. https://ieeexplore.ieee.org/abstract/document/8806762/authors.
- Y. Sun, L. Zhang, G. Feng, B. Yang, B. Cao and M. A. Imran, "Blockchain-Enabled Wireless Internet of Things: Performance Analysis and Optimal Communication Node Deployment," in IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5791-5802, June 2019, https://ieeexplore.ieee.org/abstract/document/8668426. [CrossRef]
- S. Sarmah, (2018). Understanding Blockchain Technology. Computer Science and Engineering, 8(2), 23-29.
- Y. Zou, T. Meng, P. Zhang, W. Zhang and H. Li, "Focus on Blockchain: A Comprehensive Survey on Academic and Application," in IEEE Access, vol. 8, pp. 187182-187201, 2020, https://ieeexplore.ieee.org/abstract/document/9220919. [CrossRef]
- P. Garret, & J. Seidman. (2011, August 26). EMR vs EHR – What is the Difference? Health IT Buzz. Retrieved January 31, 2022, from https://www.healthit.gov/buzz-blog/electronic-health-and-medical-records/emr-vs-ehr-difference.
- M. Chen, Y. Ma, Y. Li, D. Wu, Y. Zhang and C. Youn, "Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems," in IEEE Communications Magazine, vol. 55, no. 1, pp. 54-61, January 2017, https://ieeexplore.ieee.org/document/7823338. [CrossRef]
- B. Cao, Z. Zhang, D. Feng, S. Zhang, L. Zhang, M. Peng, Y. Li, Performance analysis and comparison of PoW, PoS and DAG based blockchains, Digital Communications and Networks, Volume 6, Issue 4, 2020, Pages 480-485, ISSN 2352-8648 (https://www.sciencedirect.com/science/article/pii/S2352864819301476). [CrossRef]
- F. Casino, T. Dasaklis, C. Patsakis, A systematic literature review of blockchain-based applications: Current status, classification and open issues, Telematics and Informatics, Volume 36, 2019, Pages 55-81, https://www.sciencedirect.com/science/article/pii/S0736585318306324. [CrossRef]
- Dubovitskaya, Z. Xu, S. Ryu, M. Schumacher, & F. Wang (2018). Secure and Trustable Electronic Medical Records Sharing using Blockchain. AMIA ... Annual Symposium proceedings. AMIA Symposium, 2017, 650–659. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5977675/.
- Roehrs, C. A. da Costa, and R. da Rosa Righi, “OmniPHR: A distributed architecture model to integrate personal health records,” Journal of Biomedical Informatics, vol. 71, pp. 70–81, Jul. 2017, https://www.sciencedirect.com/science/article/pii/S1532046417301089. [CrossRef]
- 21. S. Ølnes, J. Ubacht, M. Janssen, Blockchain in government: Benefits and implications of distributed ledger technology for information sharing, Government Information Quarterly, Volume 34, Issue 3, 2017, Pages 355-364, ISSN 0740-624X. [CrossRef]
- M. Iansiti and K. R. Lakhani, “The Truth About Blockchain,” Harvard Business Review, no. January-February 2017, Jan. 01, 2017.
- H. Wang, Z. Zheng, S. Xie, H. N. Dai, and X. Chen, “Blockchain Challenges and Opportunities: A Survey,” International Journal of Web and Grid Services, vol. 14, no. 4, p. 352, 2018. [CrossRef]
- M. C. Wong, K. C. Yee, and C. Nohr, “Socio-technical consideration for Blockchain Technology in healthcare: the technological innovation needs clinical transformation to achieve the outcome of improving quality and safety of patient care,” Studies in Health Technology and Informatics, vol. 247, pp. 636–640, 2018. [CrossRef]
- W. Peters, B. M. Till, J. G. Meara, and S. Afshar, “Blockchain technology in health care: A primer for surgeons,” The Bulletin, Dec. 06, 2017.
- IBM, “Blockchain: The Chain of Trust and its Potential to Transform Healthcare – Our Point of View,” Aug. 2016. Accessed: Feb. 11, 2022. [Online]. Available: https://www.healthit.gov/sites/default/files/8-31-blockchain-ibm_ideation-challenge_aug8.pdf.
- C. Lin, T. C. Liao. A Survey of Blockchain Security Issues and Challenges. Int. J. Netw. Secur. 2017, 19, 653–659.
- T. Clohessy, T. Acton, and N. Rogers. (2019). “Blockchain Adoption: Technological, Organisational and Environmental Considerations”, in Treiblmaier, H. and Beck, R. "Business Transformation through Blockchain", Volume 1, Cham, Switzerland: Palgrave Macmillan, pp.47-76. [CrossRef]
- T. McGhin, K.-K. R. Choo, C. Z. Liu, and D. He, “Blockchain in healthcare applications: Research challenges and opportunities,” Journal of Network and Computer Applications, vol. 135, pp. 62–75, Jun. 2019. [CrossRef]
- G. Zyskind, O. Nathan, and A. Pentland, Decentralizing privacy: Using blockchain to protect personal data. Proceedings of IEEE Security and Privacy Workshops:180–184, 2015. [CrossRef]
- Lippman, T. Vieira, A. Ekblaw, A. Azaria, et al., MedRec: Using blockchain for medical data. Presented at International Conference on Open & Big Data. 2016. Available: http://ieeexplore.ieee.org/document/7573685/.
- S. Hogan, H. Fraser, P. Korsten, V. Pureswaran, and R. Gopinath, “Healthcare rallies for blockchains Keeping patients at the center,” IBM Institute for Business Value, Dec. 2016. https://www.ibm.com/downloads/cas/BBRQK3WY.
- Deloitte, “Blockchain to Blockchains in Life Sciences and Health Care,” Deloitte, 2018. https://www2.deloitte.com/uk/en/insights/topics/understanding-blockchain-potential/global-blockchain-survey-2019/2019-adoption-by-industry.
- Dwork. (2008). Differential Privacy: A Survey of Results. Lecture Notes in Computer Science Theory and Applications of Models of Computation, 1-19. [CrossRef]
- Dwork, A. Roth, "The Algorithmic Foundations of Differential Privacy," in The Algorithmic Foundations of Differential Privacy , now, 2014. https://ieeexplore.ieee.org/document/8187424. [CrossRef]
- J. Lee , C. Clifton.. (2011) How Much Is Enough? Choosing ϵ for Differential Privacy. In: Lai X., Zhou J., Li H. (eds) Information Security. ISC 2011. Lecture Notes in Computer Science, vol 7001. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24861-0_22. [CrossRef]
- J. Hsu et al., "Differential Privacy: An Economic Method for Choosing Epsilon," 2014 IEEE 27th Computer Security Foundations Symposium, Vienna, 2014, pp. 398-410. [CrossRef]
- Dwork, “A firm foundation for private data analysis,” Communications of the ACM, vol. 54, no. 1, pp. 86–95, 2011. [CrossRef]
- C. Dwork, A. Roth. et al.: An adaptive approach to real-time aggregate monitoring with differential privacy. Foundations and Trends®in Theoretical Computer Science 9(3–4), 211 (2014).
- Liu, “Generalized Gaussian Mechanism for Differential privacy,” IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 4, pp. 747 – 756, Apr. 2018. https://par.nsf.gov/servlets/purl/10066992. [CrossRef]
- T. Zhu, G. Li, W. Zhou, & S. Y. Philip. (2017). Differential privacy and applications. Cham, Switzerland: Springer International Publishing.
- J. Soria-Comas, J. Domingo-Ferrer, D. S´anchez, and D. Meg´ıas, “Individual differential privacy: A utility-preserving formulation of differential privacy guarantees,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 6, pp. 1418–1429, 2017.
- ElSalamouny and S. Gambs, “Differential privacy models for location-based services,” Transactions on Data Privacy, vol. 9, no. 1, pp. 15–48, 2016.
- X. He, G. Cormode, A. Machanavajjhala, C. M. Procopiuc, and D. Srivastava, “Dpt: differentially private trajectory synthesis using hierarchical reference systems,” Proceedings of the VLDB Endowment, vol. 8, no. 11, pp. 1154–1165, 2015.
- Machanavajjhala, A. Korolova, and A. D. Sarma. Personalized social recommendations - accurate or private? PVLDB, 4(7):440–450, 2011. https://arxiv.org/ftp/arxiv/papers/1105/1105.4254.pdf.
- McSherry and R. Mahajan. Differentially-private network trace analysis. In Proc. SIGCOMM, pages 123–134, 2010. https://ratul.org/papers/sigcomm2010-privacy.pdf.
- Dwork, K. Talwar, A. Thakurta, and L. Zhang, “Analyze gauss: optimal bounds for privacy-preserving principal component analysis,” in Proceedings of the forty-sixth annual ACM symposium on Theory of computing, 2014, pp. 11–20.
- T. Li, A. K. Sahu, A. Talwalkar. & V. Smith. Federated learning: Challenges, methods, and future directions. IEEE Signal Processing Magazine 37, 50–60 (IEEE, 2020).
- Kairouz, P. et al. Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977 (2019). [CrossRef]
- N. Rieke, J. Hancox, W. Li. et al. The future of digital health with federated learning. npj Digit. Med. 3, 119 (2020). [CrossRef]
- N. Rieke, J. Hancox, W. Li. et al. The future of digital health with federated learning. npj Digit. Med. 3, 119 (2020). https://doi.org/10.1038/s41746-020-00323-1. [CrossRef]
- J. Lee. et al. Privacy-preserving patient similarity learning in a federated environment: development and analysis. JMIR Med. Inform. 6, e20 (2018). [CrossRef]
- T.S. Brisimi. et al. Federated learning of predictive models from federated electronic health records. Int. J. Med. Inform. 112, 59–67 (2018). [CrossRef]
- G. Roy, S. Siddiqui, S. Pölsterl, N. Navab, & C. Wachinger Braintorrent: a peer-to-peer environment for decentralized federated learning. arXiv preprint arXiv:1905.06731 (2019). arXiv:1905.06731 (2019).
- Wang, F., Casalino, L. P. & Khullar, D. Deep learning in medicine—promise, progress, and challenges. JAMA Intern. Med. 179, 293–294 (2019).
- Sheller, M. J., Reina, G. A., Edwards, B., Martin, J. & Bakas, S. Multi-institutional deep learning modeling without sharing patient data: a feasibility study on brain tumor segmentation. In International MICCAI Brainlesion Workshop, 92–104 (Springer, 2018). [CrossRef]
- Kairouz, P. et al. Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977 (2019). [CrossRef]
- Abadi, M. et al. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 308–318 (ACM, 2016.
- Li, X. et al. Multi-site fmri analysis using privacy-preserving federated learning and domain adaptation: abide results. arXiv preprint arXiv:2001.05647 (2020). [CrossRef]
- S. Garfinkel, J. Abowd, and S. Powazek. 2018. Issues Encountered Deploying Differential Privacy. In Proceedings of the 2018 Workshop on Privacy in the Electronic Society (WPES'18). Association for Computing Machinery, New York, NY, USA, 133–137. https://doi.org/10.1145/3267323.3268949. [CrossRef]
- P. Jain, M. Gyanchandani, & N. Khare. Differential privacy: its technological prescriptive using big data. J Big Data 5, 15 (2018). https://link.springer.com/article/10.1186/s40537-018-0124-9. [CrossRef]
- M. Hassan, M. H. Rehmani, J. Chen,Differential privacy in Blockchain Technology: A futuristic approach, Journal of Parallel and Distributed Computing, Volume 145,2020, Pages 50-74, ISSN 0743-7315, (https://www.sciencedirect.com/science/article/pii/S0743731520303105). [CrossRef]
- P. Wang, J. Huang, Z. Cui, L. Xie, J. Chen, A Gaussian error correction multi-objective positioning model with nsga-ii, Concurr. Comput.: Pract. Exper. 32 (5) (2020) e5464. [CrossRef]
- X. Cai, Y. Niu, S. Geng, J. Zhang, Z. Cui, J. Li, J. Chen, An under-sampled software defect prediction method based on hybrid multi-objectivecuckoo search, Concurr. Comput.: Pract. Exper. 32 (5) (2020) e5478.
- L. Axon, Privacy-Awareness in Blockchain-Based PKI, University of Oxford, 2015.
- Y.-A. De Montjoye, L. Radaelli, V.K. Singh, et al., Unique in the shopping mall: On the reidentifiability of credit card metadata, Science 347 (6221) (2015) 536–539.
- G. Eibl, D. Engel, Differential privacy for real smart metering data, Comput. Sci.-Res. Dev. 32 (1–2) (2017) 173–182. [CrossRef]
- J. Xie, H. Tang, T. Huang, F.R. Yu, R. Xie, J. Liu, Y. Liu, A survey of Blockchain Technology applied to smart cities: Research issues and challenges, IEEE Commun. Surv. Tutor. (2019). [CrossRef]
- J. Vora, A. Nayyar, S. Tanwar, S. Tyagi, N. Kumar, M.S. Obaidat, J.J.Rodrigues, BHEEM: A blockchain-based framework for securing electronic health records, in: IEEE Globecom Workshops (GC Wkshps), 2018,pp. 1–6. https://ieeexplore.ieee.org/abstract/document/8644088.
- A. Dewey, & A. Drahota (2016) Introduction to systematic reviews: online learning module Cochrane Training https://training.cochrane.org/interactivelearning/module-1-introduction-conducting-systematic-reviews.
- M. Salama, R. Bahsoon, N. Bencomo, Chapter 11 - Managing Trade-offs in Self-Adaptive Software Architectures: A Systematic Mapping Study,Editor(s): Ivan Mistrik, Nour Ali, Rick Kazman, John Grundy, Bradley Schmerl,Managing Trade-Offs in Adaptable Software Architectures,Morgan Kaufmann, 2017, Pages 249-297,ISBN 9780128028551,(https://www.sciencedirect.com/science/article/pii/B9780128028551000113).
- https://arxiv.org/ftp/arxiv/papers/1702/1702.02653.pdf.
- Fink, A.: Conducting research literature reviews: from the internet to paper. Thousand Oaks, Thousand Oaks (2019).
- M.S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli, M.H. Rehmani, Applications of blockchains in the internet of things: A comprehensive survey, IEEE Commun. Surv. Tutor. 21 (2) (2018) 1676–1717. [CrossRef]
- X. Wang, K. Yang, Asynchronous blockchain-based privacypreserving training framework for disease diagnosis, in: IEEE International Conference on Big Data (Big Data), 2019, pp. 5469–5473.
- Q. Hu, R. Chen, H. Yang, and S. Kumara, ‘‘Privacy-preserving data mining for smart manufacturing,’’ Smart Sustain. Manuf. Syst., vol. 4, no. 2, Jul. 2020, Art. no. 20190043. [CrossRef]
- N. Saleheen, S. Chakraborty, N. Ali, M. M. Rahman, S. M. Hossain, R. Bari, E. Buder, M Srivastava, S. Kumar.: In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (2016), pp. 706–717.
- C. Lin, Z. Song, H. Song, Y. Zhou, Y. Wang, G. Wu.: Differential privacy preserving in big data analytics for connected health. J. Med. Syst. 40(4), 97 (2016). [CrossRef]
- K. Prema, A. Sriharsha: Differential privacy in big data analytics for haptic applications. Technology 8(3), 11 (2017).
- M. Hadian, X. Liang, T. Altuwaiyan, M. M. Mahmoud: In: 2016 IEEE Global Communications Conference (GLOBECOM) (IEEE, 2016), pp. 1–6.
- Z. Guan, Z. Lv, X. Du, L. Wu, and M. Guizani, “Achieving data utilityprivacy tradeoff in internet of medical things: A machine learning approach,” Future Generation Computer Systems, in Print, 2019. [CrossRef]
- J. W. Kim, J. H. Lim, S. M. Moon, H. Yoo, B. Jang: In: 2019 IEEE International Conference on Consumer Electronics (ICCE) (IEEE, 2019), pp. 1–4.
- R. Gao, X. Ma: In: 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom) (IEEE, 2018), pp. 737–743.
- C. Luo, X. Liu, W. Xue, Y. Shen, J. Li, W. Hu, Liu, A.X.: Predictable privacy-preserving mobile crowd sensing: a tale of two roles. IEEE/ACM Trans. Network. 27(1), 361 (2019). [CrossRef]
- M. Yang: Improving privacy preserving in modern applications. Deakin University, Tech. rep. (2019).
- Z. Zhang, B. Han, H. C. Chao, F. Sun, L. Uden, Tang, D.: A new weight and sensitivity based variable maximum distance to average vector algorithm for wearable sensor data privacy protection. IEEE Access 7, 104045 (2019). [CrossRef]
- Y. Zhang, Y. Qu, L. Gao, T. H. Luan, X. Zheng, S. Chen, Y. Xiang: APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home. IEEE Access 7, 166593 (2019).
- V. Rastogi, S. Nath: In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data (2010), pp. 735–746.
- L. Fan, L. Xiong: An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Trans. Knowl. Data Eng. 26(9), 2094 (2013).
- Fan, L., Xiong, L.: In: Proceedings of the 21st ACM international conference on Information and knowledge management (2012), pp. 2169–2173.
- A. C. Valdez and M. Ziefle, “The users’ perspective on the privacyutility trade-offs in health recommender systems,” International Journal of Human-Computer Studies, in Print, vol. 121, pp. 108–121, Jan. 2019 https://moam.info/arxiv181202282v1-cscr-6-dec-2018_5c362c14097c478d538b456d.html. [CrossRef]
- J. Zhang, X. Liang, Z. Zhang, S. He, and Z. Shi, “Re-dpoctor: Real-time health data releasing with w-day differential privacy,” arXiv preprint arXiv:1711.00232, 2017. https://arxiv.org/pdf/1812.02282v1.pdf.
- Alnemari, C. J. Romanowski, and R. K. Raj, “An adaptive differential privacy algorithm for range queries over healthcare data,” in IEEE International Conference on Healthcare Informatics (ICHI), 2017, pp. 397–402 https://ieeexplore.ieee.org/abstract/document/8031181.
- H. Li, Y. Dai, and X. Lin, “Efficient e-health data release with consistency guarantee under differential privacy,” in IEEE 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015, pp. 602–608.
- Z. Guan, Z. Lv, X. Du, L. Wu, and M. Guizani, “Achieving data utilityprivacy tradeoff in internet of medical things: A machine learning approach,” Future Generation Computer Systems, in Print, 2019. [CrossRef]
- B. K. Beaulieu-Jones, W. Yuan, S. G. Finlayson, and Z. S. Wu, “Privacy-preserving distributed deep learning for clinical data,” arXiv preprint arXiv:1812.01484, 2018.
- N. Mohammed, S. Barouti, D. Alhadidi, and R. Chen, “Secure and private management of healthcare databases for data mining,” in IEEE 28th International Symposium on Computer-Based Medical Systems (CBMS), 2015, pp. 191–196.
- J. L. Raisaro, J. Troncoso-Pastoriza, M. Misbach, J. S. Sousa, S. Pradervand, E. Missiaglia, O. Michielin, B. Ford, and J.-P. Hubaux, “Medco: Enabling secure and privacy-preserving exploration of distributed clinical and genomic data,” IEEE/ACM transactions on computational biology and bioinformatics, in Print, 2018. [CrossRef]
- J. L. Raisaro, G. Choi, S. Pradervand, R. Colsenet, N. Jacquemont, N. Rosat, V. Mooser, and J.-P. Hubaux, “Protecting privacy and security of genomic data in i2b2 with homomorphic encryption and differential privacy,” IEEE/ACM transactions on computational biology and bioinformatics, vol. 15, no. 5, pp. 1413 – 1426, Sep. 2018. [CrossRef]
- W. Tang, J. Ren, K. Deng, and Y. Zhang, “Secure Data Aggregation of Lightweight E-healthcare IoT Devices with Fair Incentives,” IEEE Internet of Things Journal, in Print, 2019. [CrossRef]
- Z. Guan, Z. Lv, X. Du, L. Wu, and M. Guizani, “Achieving data utilityprivacy tradeoff in internet of medical things: A machine learning approach,” Future Generation Computer Systems, in Print, 2019. https://arxiv.org/ftp/arxiv/papers/1902/1902.02898.pdf. [CrossRef]
- W. Tang, J. Ren, K. Deng, and Y. Zhang, “Secure Data Aggregation of Lightweight E-healthcare IoT Devices with Fair Incentives,” IEEE Internet of Things Journal, in Print, 2019 https://ieeexplore.ieee.org/abstract/document/8737719. [CrossRef]
- Gao, R., Ma, X.: In: 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications.
- A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In Proc. S&P. IEEE, May 2008 https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf.
- A. Narayanan and V. Shmatikov. De-anonymizing social networks. In IEEE Symposium on Security and Privacy (S&P), Oakland, California, pages 173–187, 2009 https://ieeexplore.ieee.org/abstract/document/5207644.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).