Submitted:
13 June 2025
Posted:
16 June 2025
You are already at the latest version
Abstract
Keywords:
Chapter 1: Introduction
1.1. Background
1.2. Importance of Auditing and Logging
- Monitoring Data Usage: Auditing systems track who accesses patient data, when, and for what purpose. This level of transparency is vital for identifying potential security breaches and unauthorized access.
- Incident Response: Effective logging mechanisms enable rapid detection of anomalies, allowing organizations to respond swiftly to potential privacy violations. This capability is critical in minimizing the impact of data breaches.
- Compliance: Regulatory bodies require organizations to demonstrate accountability in handling personal health information. Auditing and logging systems provide the necessary documentation to comply with legal obligations and protect against potential penalties.
- Continuous Improvement: Regular audits can identify weaknesses in data management practices, facilitating ongoing improvements in data privacy and security protocols.
1.3. Objectives of the Study
- Analyzing Privacy Challenges: To identify and analyze the unique privacy challenges associated with the use of AI in healthcare.
- Evaluating Auditing Mechanisms: To assess the effectiveness of various auditing and logging mechanisms in monitoring data usage and ensuring compliance with privacy regulations.
- Proposing a Framework: To develop a comprehensive framework for integrating auditing and logging systems into medical AI pipelines, emphasizing best practices for implementation.
- Highlighting Case Studies: To illustrate the practical application of auditing systems in diverse healthcare settings, showcasing their effectiveness in enhancing privacy assurance.
1.4. Structure of the Dissertation
- Chapter 2 reviews the existing literature on privacy challenges in healthcare AI and the role of auditing and logging systems in addressing these issues.
- Chapter 3 delves into the theoretical foundations of auditing and logging, discussing key concepts, best practices, and relevant regulatory frameworks.
- Chapter 4 presents a detailed analysis of various auditing mechanisms, evaluating their effectiveness and applicability in different healthcare contexts.
- Chapter 5 outlines the proposed framework for integrating auditing and logging systems into medical AI pipelines, including practical recommendations for implementation.
- Chapter 6 provides case studies that demonstrate the successful application of auditing systems in real-world healthcare settings, highlighting lessons learned and best practices.
- Chapter 7 concludes the dissertation, summarizing key findings and offering recommendations for future research in the field of privacy assurance in medical AI.
1.5. Conclusion
Chapter 2: Theoretical Foundations of Auditing and Logging Systems in Medical AI Pipelines
2.1. Introduction
2.2. Understanding Auditing and Logging
2.2.1. Definitions
- Auditing: In the context of information security, auditing refers to the systematic review and examination of data, processes, and activities to ensure compliance with policies and regulations. It aims to identify discrepancies, inefficiencies, and potential vulnerabilities within systems.
- Logging: Logging involves recording events or transactions within a system. Logs serve as detailed records of operations, providing valuable insights into data access, modifications, and processing activities. Effective logging is essential for traceability and accountability.
2.2.2. Importance in Healthcare
- Compliance: Regulatory frameworks such as HIPAA and GDPR mandate strict controls over patient data. Effective auditing and logging help organizations demonstrate compliance and accountability in data handling.
- Incident Response: In the event of a data breach or privacy incident, auditing and logging systems provide crucial information for investigating and mitigating the impact of the breach.
- Transparency: Maintaining detailed logs fosters transparency, enabling stakeholders to understand how data is accessed and used within AI systems.
- Trust: By implementing robust auditing and logging mechanisms, healthcare organizations can enhance patient trust, assuring them that their data is handled securely and responsibly.
2.3. Framework for Auditing and Logging in Medical AI Pipelines
2.3.1. Components of an Effective Auditing System
- Data Access Logs: Record details of who accessed patient data, when, and for what purpose. This includes tracking both user and system access to sensitive information.
- Change Logs: Document modifications made to data, algorithms, and model parameters, providing a historical record of changes and their justifications.
- Event Logs: Capture significant events within the AI pipeline, such as data ingestion, model training, and deployment. These logs should detail the context and outcomes of each event.
- Alerting Mechanisms: Implement automated alerts for suspicious activities or anomalies detected in the logs, facilitating timely responses to potential privacy violations.
2.3.2. Best Practices for Logging
- Granularity: Logs should be detailed enough to provide meaningful insights while avoiding excessive verbosity that may hinder analysis.
- Retention Policies: Establish clear retention policies to define how long logs will be stored, balancing the need for historical data with storage costs and privacy concerns.
- Secure Storage: Ensure that logs are stored securely, with access controls in place to prevent unauthorized access or tampering.
- Regular Audits: Conduct regular audits of logging systems to evaluate their effectiveness, compliance, and alignment with organizational policies.
2.4. Challenges in Implementing Auditing and Logging Systems
2.4.1. Technical Challenges
- Data Volume: The sheer volume of data generated in medical AI pipelines can overwhelm logging systems, making it challenging to capture and analyze all relevant events effectively.
- Integration: Integrating auditing and logging mechanisms into existing healthcare IT infrastructure can be complex, requiring careful planning and execution.
- Real-Time Monitoring: Implementing real-time monitoring systems that can process logs efficiently and detect anomalies poses significant technical challenges.
2.4.2. Compliance Challenges
- Regulatory Requirements: Navigating the complex landscape of privacy regulations and ensuring that auditing and logging practices align with legal obligations can be daunting for healthcare organizations.
- Patient Consent: Balancing the need for logging with patient consent requirements can complicate the implementation of effective auditing systems.
2.5. Conclusion
Chapter 3: Framework for Auditing and Logging Systems in Medical AI Pipelines
3.1. Introduction
3.2. Components of the Auditing and Logging Framework
3.2.1. Data Collection
- Identification of Data Sources: Recognizing all sources of data, including EHRs, medical imaging, and patient monitoring systems.
- Data Classification: Categorizing data based on sensitivity levels to apply appropriate logging practices. Sensitive data, such as personally identifiable information (PII), must be logged with heightened scrutiny.
3.2.2. Logging Mechanisms
- Access Logs: Documenting who accessed the data, when, and what actions were taken. Access logs should include user IDs, timestamps, and the nature of the access (read, write, modify).
- Change Logs: Recording modifications to data and model parameters, including timestamps and the identity of users making changes.
- Error Logs: Capturing errors and exceptions during data processing and model training, which can help identify vulnerabilities and areas for improvement.
3.2.3. Audit Trails
- Comprehensive Tracking: Ensuring that all interactions with the data, model training, and deployment processes are logged and retrievable.
- Data Integrity Checks: Implementing mechanisms to ensure the integrity of the logged data, such as cryptographic hash functions to detect unauthorized changes.
3.3. Processes for Effective Auditing
3.3.1. Continuous Monitoring
- Automated Alerts: Setting up automated alerts for suspicious activities, such as repeated failed access attempts or unauthorized data modifications.
- Real-Time Analytics: Employing analytics tools to assess logs in real-time, enabling prompt identification and response to potential privacy breaches.
3.3.2. Periodic Audits
- Scheduled Reviews: Conducting periodic reviews of access and change logs to ensure compliance with privacy policies and identify potential vulnerabilities.
- Compliance Checks: Verifying adherence to regulatory requirements, such as HIPAA and GDPR, by assessing logging practices against legal standards.
3.4. Best Practices for Implementation
3.4.1. Data Minimization
- Limit Data Access: Granting access only to individuals who require it for their roles, thereby reducing the risk of unauthorized access.
- Anonymization Techniques: Employing data anonymization or pseudonymization methods to protect patient identities while retaining the utility of the data for analysis.
3.4.2. Training and Awareness
- Regular Training Sessions: Conducting training programs for employees on the importance of data privacy, security protocols, and the proper use of auditing tools.
- Awareness Campaigns: Raising awareness about the implications of data breaches and the importance of compliance with auditing practices.
3.4.3. Integration with Existing Systems
- Interoperability: Ensuring that logging mechanisms can communicate effectively with other systems, such as EHRs and data analytics platforms.
- Scalability: Designing logging solutions that can scale with the growth of data and the complexity of AI applications.
3.5. Challenges and Considerations
3.5.1. Technical Complexity
3.5.2. Balancing Privacy and Usability
3.5.3. Regulatory Compliance
3.6. Conclusion
Chapter 4: Framework for Auditing and Logging Systems in Medical AI Pipelines
4.1. Introduction
4.2. Importance of Auditing and Logging in Medical AI
4.2.1. Privacy and Security Concerns
- Data Breaches: Unauthorized access to sensitive patient information can result in significant legal and financial repercussions.
- Compliance Risks: Adhering to regulations such as HIPAA and GDPR necessitates robust monitoring of data handling practices.
- Accountability: Ensuring that all stakeholders are accountable for data usage and decision-making processes is crucial for maintaining trust.
4.2.2. Role of Auditing and Logging
- Tracking Data Access: Monitoring who accesses patient data and when enhances transparency and accountability.
- Detecting Anomalies: Identifying irregular patterns of data access or modification can help prevent potential breaches.
- Supporting Compliance: Comprehensive logs can serve as evidence of compliance with regulatory requirements, facilitating audits and assessments.
4.3. Framework for Implementing Auditing and Logging Systems
4.3.1. Key Components of the Framework
- Data Collection: Establish mechanisms for capturing relevant events and actions across the medical AI pipeline, including data ingestion, processing, and output generation.
- Logging Mechanisms: Implement structured logging systems that capture detailed information about data access, user interactions, and model predictions. This should include timestamps, user identifiers, and the nature of the access.
- Audit Trails: Create comprehensive audit trails that document the sequence of events related to data usage and modifications. These trails should be immutable and securely stored to prevent tampering.
- Real-Time Monitoring: Develop real-time monitoring capabilities to detect anomalies and unauthorized access attempts. Automated alerts should be triggered for predefined suspicious activities.
- Reporting and Analysis: Design reporting tools that enable stakeholders to analyze logged data, identify trends, and generate compliance reports. These tools should support both ad-hoc queries and scheduled reports.
4.3.2. Best Practices for Implementation
- Define Clear Policies: Establish clear policies governing data access and usage, outlining roles and responsibilities for all stakeholders involved in the medical AI pipeline.
- Ensure Data Minimization: Collect only the data necessary for auditing purposes to reduce the risk of exposure and align with privacy regulations.
- Utilize Encryption: Implement encryption for logs to protect sensitive information and ensure that access is restricted to authorized personnel only.
- Regular Updates and Maintenance: Perform regular updates to auditing and logging systems to address emerging threats and vulnerabilities.
- Training and Awareness: Provide ongoing training for staff on the importance of privacy, data security, and compliance, fostering a culture of accountability.
4.4. Case Studies
4.4.1. Case Study 1: Hospital AI System
4.4.2. Case Study 2: Insurance Claims Processing
4.5. Challenges and Considerations
- Scalability: As the volume of data increases, ensuring that auditing systems can scale effectively is crucial. Organizations must plan for increased storage and processing capabilities.
- Data Integration: Integrating logging systems across various platforms and services can be complex. A standardized approach to logging is necessary for consistency.
- Balancing Privacy and Utility: Striking the right balance between comprehensive logging for accountability and the minimization of data collection for privacy can be challenging.
4.6. Conclusion
Chapter 5: Implementation and Case Studies of Auditing and Logging Systems in Medical AI Pipelines
5.1. Introduction
5.2. Framework for Auditing and Logging Systems
5.2.1. Components of an Effective System
- Data Collection: Establishing clear protocols for data collection that ensure only necessary data is gathered, minimizing exposure to sensitive information.
- Access Control: Implementing strict access control measures to limit who can view or modify data, ensuring that only authorized personnel have access.
- Comprehensive Logging: Designing a logging mechanism that captures all relevant activities, including data access, modifications, and processing events. This should include timestamps, user identification, and the nature of each action taken.
- Real-Time Monitoring: Incorporating real-time monitoring tools to detect anomalies and unauthorized access attempts, allowing for immediate response and mitigation of risks.
- Incident Response Protocols: Developing a clear incident response plan to address any potential breaches or privacy violations swiftly and effectively.
5.2.2. Integration into AI Pipelines
- Data Preprocessing: Logging data transformations and cleaning processes to ensure transparency in how data is prepared for analysis.
- Model Training: Recording model training activities, including parameter adjustments and data usage, to facilitate audits and evaluations of model performance.
- Deployment and Inference: Monitoring model deployment and inference processes, ensuring that all interactions with the model are logged for accountability.
5.3. Case Studies
5.3.1. Case Study 1: Predictive Analytics in Patient Outcomes
- Auditing Mechanism: The organization established a comprehensive logging system to track data access and model interactions. This included logging user actions, data inputs, and model outputs.
- Results: The auditing system revealed unauthorized access attempts, allowing the organization to implement additional security measures. Additionally, the transparency provided by the logs facilitated regulatory compliance audits, demonstrating adherence to HIPAA requirements.
5.3.2. Case Study 2: Fraud Detection in Insurance Claims
- Logging System: The company deployed a robust logging system that captured all interactions with the AI model, including data submissions, decision-making processes, and user access logs.
- Results: The logging system enabled the organization to identify discrepancies in claims processing, leading to more accurate fraud detection. The ability to trace decisions back to specific data inputs enhanced accountability and trust among stakeholders.
5.3.3. Case Study 3: Clinical Decision Support Systems (CDSS)
- Auditing Framework: The hospital implemented an auditing framework that logged all interactions between clinicians and the CDSS, including recommendations made and actions taken.
- Results: This framework provided insights into how clinicians interacted with the system, allowing for continuous improvement of the AI algorithms based on user feedback. Moreover, the logs served as a valuable resource for training and compliance reviews.
5.4. Challenges and Best Practices
5.4.1. Challenges
- Data Volume: The sheer volume of data generated by AI systems can complicate logging efforts, necessitating efficient data management strategies.
- Compliance Complexity: Navigating the regulatory landscape can be challenging, particularly when dealing with varying requirements across jurisdictions.
- User Resistance: Healthcare professionals may be resistant to additional logging processes, perceiving them as burdensome or intrusive.
5.4.2. Best Practices
- Automate Logging Processes: Utilize automated logging tools to minimize manual inputs and reduce errors.
- Regular Audits: Conduct regular audits of logging systems to ensure compliance and identify areas for improvement.
- User Training: Provide comprehensive training to healthcare staff on the importance of auditing and logging for privacy assurance, fostering a culture of accountability.
- Data Minimization: Adopt data minimization principles to limit the amount of sensitive information logged, reducing privacy risks.
5.5. Conclusion
Chapter 6: Conclusion and Future Directions
6.1. Summary of Findings
- Privacy Challenges: The integration of AI in healthcare presents unique privacy challenges, including data breaches, unauthorized access, and compliance with regulatory frameworks such as HIPAA and GDPR. These challenges necessitate robust mechanisms for monitoring and managing data usage.
- Importance of Auditing and Logging: Effective auditing and logging systems are essential for ensuring transparency and accountability in the handling of patient data. These systems enable healthcare organizations to track data access, facilitate incident response, and demonstrate compliance with legal requirements.
- Framework Development: We proposed a comprehensive framework for integrating auditing and logging systems into medical AI pipelines. This framework emphasizes best practices for implementation, including real-time monitoring, automated alerts, and continuous improvement processes.
- Case Study Insights: Through detailed case studies, we illustrated the practical application of auditing systems in various healthcare settings. These examples demonstrated the effectiveness of logging mechanisms in enhancing privacy assurance and protecting patient information.
6.2. Implications for Practice
- Healthcare Providers: By adopting auditing and logging systems, healthcare organizations can enhance their data governance practices. This not only protects patient privacy but also builds trust among patients, encouraging them to engage more openly with healthcare services.
- Regulatory Bodies: The insights gained can inform regulatory policies aimed at safeguarding patient data. By understanding the effectiveness of different auditing mechanisms, regulators can develop guidelines that promote best practices in privacy management.
- Technology Developers: Developers of healthcare AI applications can benefit from integrating auditing and logging features from the outset, ensuring compliance and enhancing user trust in their systems.
6.3. Limitations of the Study
- Generalizability: The case studies presented may not encompass all healthcare settings or AI applications. Future research should explore a broader array of contexts to validate the findings.
- Evolving Threat Landscape: The landscape of data privacy threats is constantly evolving. Ongoing research is necessary to adapt auditing and logging systems to address new challenges as they arise.
- Technical Complexity: The implementation of comprehensive auditing and logging systems can be technically complex and resource-intensive. Further studies should investigate ways to streamline these processes to enhance adoption among healthcare organizations.
6.4. Future Research Directions
- Enhanced Automation: Exploring the role of machine learning and artificial intelligence in automating auditing processes could significantly improve the efficiency and effectiveness of monitoring systems.
- Integration with Other Privacy-Preserving Techniques: Investigating how auditing and logging systems can work in conjunction with other privacy-preserving methodologies, such as differential privacy, will provide a more holistic approach to data protection.
- User-Centric Approaches: Understanding user perspectives on privacy and data sharing can inform the development of more effective auditing systems that align with patient expectations and ethical considerations.
- Longitudinal Studies: Conducting longitudinal studies to assess the long-term effectiveness of auditing and logging systems in various healthcare settings will provide deeper insights into their impact on patient trust and data security.
- Cross-Domain Applications: Researching the applicability of auditing and logging frameworks in other sectors, such as finance or education, could yield valuable insights and best practices that can be adapted for healthcare.
6.5. Conclusion
Chapter 7: Recommendations and Final Thoughts
7.1. Introduction
7.2. Recommendations for Implementation
7.2.1. Establish Clear Policies and Governance Structures
- Defining Roles and Responsibilities: Assign specific roles for data stewards, privacy officers, and IT personnel to ensure accountability in data management.
- Creating Standard Operating Procedures (SOPs): Develop SOPs for data access and modification that align with auditing requirements and regulatory standards.
7.2.2. Invest in Robust Auditing Technologies
- Automated Logging Capabilities: Implement systems that automatically record all relevant activities without manual intervention, reducing the risk of human error.
- Real-Time Monitoring Tools: Utilize real-time analytics to detect anomalies and unauthorized access attempts, enabling prompt responses to potential breaches.
7.2.3. Foster a Culture of Privacy Awareness
- Conduct Regular Training: Provide ongoing training programs to educate employees on data privacy, security protocols, and the importance of compliance with auditing practices.
- Encourage Reporting: Establish channels for employees to report potential privacy concerns without fear of retaliation, fostering an environment of transparency.
7.2.4. Facilitate Collaboration and Knowledge Sharing
- Participating in Industry Forums: Engaging in industry discussions and forums to share best practices, challenges, and solutions related to auditing and logging.
- Developing Shared Resources: Creating shared repositories of tools and guidelines that can be accessed by multiple organizations to standardize auditing practices.
7.2.5. Continuous Improvement and Evaluation
- Conducting Regular Audits: Implement periodic internal audits to assess the effectiveness of auditing practices and identify areas for enhancement.
- Adapting to Regulatory Changes: Stay abreast of changes in privacy regulations and adjust policies and systems accordingly to ensure ongoing compliance.
7.3. Broader Implications of the Findings
7.3.1. Enhancing Patient Trust
7.3.2. Supporting Regulatory Compliance
7.3.3. Promoting Ethical AI Deployment
7.4. Future Research Directions
- Exploration of Advanced Technologies: Investigate the potential of emerging technologies such as blockchain and machine learning to enhance auditing mechanisms and improve data integrity.
- User-Centric Studies: Conduct research focused on understanding user perceptions of privacy and data sharing in healthcare AI applications, aiming to design more effective auditing systems that align with user expectations.
- Longitudinal Impact Studies: Examine the long-term effects of auditing and logging systems on patient outcomes, data security incidents, and organizational compliance, providing insights into their effectiveness over time.
- Cross-Sector Applications: Explore the applicability of auditing frameworks developed in healthcare to other sectors, such as finance and education, to identify best practices that can be adapted across industries.
7.5. Final Thoughts
References
- Hossain, M.D.; Rahman, M.H.; Hossan, K.M.R. (2025). Artificial Intelligence in healthcare: Transformative applications, ethical challenges, and future directions in medical diagnostics and personalized medicine.
- Tayebi Arasteh, S.; Lotfinia, M.; Nolte, T.; Sähn, M.J.; Isfort, P.; Kuhl, C. . & Truhn, D. Securing collaborative medical AI by using differential privacy: Domain transfer for classification of chest radiographs. Radiology: Artificial Intelligence 2023, 6, e230212. [Google Scholar] [CrossRef]
- Yoon, J.; Mizrahi, M.; Ghalaty, N.F.; Jarvinen, T.; Ravi, A.S.; Brune, P. . & Pfister, T. EHR-Safe: generating high-fidelity and privacy-preserving synthetic electronic health records. NPJ digital medicine 2023, 6, 141. [Google Scholar] [CrossRef] [PubMed]
- Venugopal, R.; Shafqat, N.; Venugopal, I.; Tillbury, B.M.J.; Stafford, H.D.; Bourazeri, A. Privacy preserving generative adversarial networks to model electronic health records. Neural Networks 2022, 153, 339–348. [Google Scholar] [CrossRef] [PubMed]
- Ahmed, T.; Aziz, M.M.A.; Mohammed, N.; Jiang, X. (2021, August). Privacy preserving neural networks for electronic health records de-identification. In Proceedings of the 12th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics (pp. 1–6).
- Mohammadi, M.; Vejdanihemmat, M.; Lotfinia, M.; Rusu, M.; Truhn, D.; Maier, A.; Arasteh, S.T. Differential Privacy for Deep Learning in Medicine. arXiv 2025, arXiv:2506.00660. [Google Scholar]
- Khalid, N.; Qayyum, A.; Bilal, M.; Al-Fuqaha, A.; Qadir, J. Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Computers in Biology and Medicine 2023, 158, 106848. [Google Scholar] [CrossRef] [PubMed]
- Libbi, C.A.; Trienes, J.; Trieschnigg, D.; Seifert, C. Generating synthetic training data for supervised de-identification of electronic health records. Future Internet 2021, 13, 136. [Google Scholar] [CrossRef]
- Manwal, M.; Purohit, K.C. (2024, November). Privacy Preservation of EHR Datasets Using Deep Learning Techniques. In 2024 International Conference on Cybernation and Computation (CYBERCOM) (pp. 25–30). IEEE.
- Yadav, N.; Pandey, S.; Gupta, A.; Dudani, P.; Gupta, S.; Rangarajan, K. Data privacy in healthcare: In the era of artificial intelligence. Indian Dermatology Online Journal 2023, 14, 788–792. [Google Scholar] [CrossRef] [PubMed]
- de Arruda, M.S.M.S.; Herr, B. Personal Health Train: Advancing Distributed Machine Learning in Healthcare with Data Privacy and Security.
- Tian, M.; Chen, B.; Guo, A.; Jiang, S.; Zhang, A.R. Reliable generation of privacy-preserving synthetic electronic health record time series via diffusion models. Journal of the American Medical Informatics Association 2024, 31, 2529–2539. [Google Scholar] [CrossRef] [PubMed]
- Ghosheh, G.O.; Li, J.; Zhu, T. A survey of generative adversarial networks for synthesizing structured electronic health records. ACM Computing Surveys 2024, 56, 1–34. [Google Scholar] [CrossRef]
- Nowrozy, R.; Ahmed, K.; Kayes, A.S.M.; Wang, H.; McIntosh, T.R. Privacy preservation of electronic health records in the modern era: A systematic survey. ACM Computing Surveys 2024, 56, 1–37. [Google Scholar] [CrossRef]
- Williamson, S.M.; Prybutok, V. Balancing privacy and progress: a review of privacy challenges, systemic oversight, and patient perceptions in AI-driven healthcare. Applied Sciences 2024, 14, 675. [Google Scholar] [CrossRef]
- Alzubi, J.A.; Alzubi, O.A.; Singh, A.; Ramachandran, M. Cloud-IIoT-based electronic health record privacy-preserving by CNN and blockchain-enabled federated learning. IEEE Transactions on Industrial Informatics 2022, 19, 1080–1087. [Google Scholar] [CrossRef]
- Sidharth, S. (2015). Privacy-Preserving Generative AI for Secure Healthcare Synthetic Data Generation.
- Mullankandy, S.; Mukherjee, S.; Ingole, B.S. (2024, December). Applications of AI in Electronic Health Records, Challenges, and Mitigation Strategies. In 2024 International Conference on Computer and Applications (ICCA) (pp. 1–7). IEEE.
- Seh, A.H.; Al-Amri, J.F.; Subahi, A.F.; Agrawal, A.; Pathak, N.; Kumar, R.; Khan, R.A. An analysis of integrating machine learning in healthcare for ensuring confidentiality of the electronic records. Computer Modeling in Engineering & Sciences 2022, 130, 1387–1422. [Google Scholar] [CrossRef]
- Lin, W.C.; Chen, J.S.; Chiang, M.F.; Hribar, M.R. Applications of artificial intelligence to electronic health record data in ophthalmology. Translational vision science & technology 2020, 9, 13–13. [Google Scholar]
- Ali, M.; Naeem, F.; Tariq, M.; Kaddoum, G. Federated learning for privacy preservation in smart healthcare systems: A comprehensive survey. IEEE journal of biomedical and health informatics 2022, 27, 778–789. [Google Scholar] [CrossRef] [PubMed]
- Ng, J.C.; Yeoh, P.S.Q.; Bing, L.; Wu, X.; Hasikin, K.; Lai, K.W. (2024). A Privacy-Preserving Approach Using Deep Learning Models for Diabetic Retinopathy Diagnosis. IEEE Access. [CrossRef]
- Wang, Z.; Sun, J. (2022, December). PromptEHR: Conditional electronic healthcare records generation with prompt learning. In Proceedings of the Conference on Empirical Methods in Natural Language Processing. Conference on Empirical Methods in Natural Language Processing (Vol. 2022, p. 2873).
- Agrawal, V.; Kalmady, S.V.; Manoj, V.M.; Manthena, M.V.; Sun, W.; Islam, M.S.; ... & Greiner, R. (2024, May). Federated Learning and Differential Privacy Techniques on Multi-hospital Population-scale Electrocardiogram Data. In Proceedings of the 2024 8th International Conference on Medical and Health Informatics (pp. 143–152).
- Adusumilli, S.; Damancharla, H.; Metta, A. Enhancing Data Privacy in Healthcare Systems Using Blockchain Technology. Transactions on Latest Trends in Artificial Intelligence 2023, 4. [Google Scholar]
- Tayefi, M.; Ngo, P.; Chomutare, T.; Dalianis, H.; Salvi, E.; Budrionis, A.; Godtliebsen, F. Challenges and opportunities beyond structured data in analysis of electronic health records. Wiley Interdisciplinary Reviews: Computational Statistics 2021, 13, e1549. [Google Scholar] [CrossRef]
- Meduri, K.; Nadella, G.S.; Yadulla, A.R.; Kasula, V.K.; Maturi, M.H.; Brown, S. . & Gonaygunta, H. Leveraging federated learning for privacy-preserving analysis of multi-institutional electronic health records in rare disease research. Journal of Economy and Technology 2025, 3, 177–189. [Google Scholar] [CrossRef]
- Ghosheh, G.; Li, J.; Zhu, T. A review of Generative Adversarial Networks for Electronic Health Records: applications, evaluation measures and data sources. arXiv 2022, arXiv:2203.07018. [Google Scholar]
- Chukwunweike, J.N.; Praise, A.; Bashirat, B.A. Harnessing Machine Learning for Cybersecurity: How Convolutional Neural Networks are Revolutionizing Threat Detection and Data Privacy. International Journal of Research Publication and Reviews 2024, 5. [Google Scholar] [CrossRef]
- Tekchandani, P.; Bisht, A.; Das, A.K.; Kumar, N.; Karuppiah, M.; Vijayakumar, P.; Park, Y. (2024). Blockchain-Enabled Secure Collaborative Model Learning using Differential Privacy for IoT-Based Big Data Analytics. IEEE Transactions on Big Data. [CrossRef]
- Tekchandani, P.; Bisht, A.; Das, A.K.; Kumar, N.; Karuppiah, M.; Vijayakumar, P.; Park, Y. (2024). Blockchain-Enabled Secure Collaborative Model Learning using Differential Privacy for IoT-Based Big Data Analytics. IEEE Transactions on Big Data. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).