2023
DOI: 10.3389/fpubh.2023.1125011
|View full text |Cite
|
Sign up to set email alerts
|

An anonymization-based privacy-preserving data collection protocol for digital health data

Abstract: Digital health data collection is vital for healthcare and medical research. But it contains sensitive information about patients, which makes it challenging. To collect health data without privacy breaches, it must be secured between the data owner and the collector. Existing data collection research studies have too stringent assumptions such as using a third-party anonymizer or a private channel amid the data owner and the collector. These studies are more susceptible to privacy attacks due to third-party i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 71 publications
0
3
0
Order By: Relevance
“…Healthcare: The digitization of patients' health records proves advantageous for both patients and healthcare providers in terms of sharing, monitoring, tracking, and analyzing healthcare information 169 . In addition to safeguarding data collection, for instance, works 170 and 171 employed k‐anonymity methods to protect data. Furthermore, FL in the medical field contributes to the integration of healthcare data from various medical institutions, fostering research in disease prediction, personalized treatment, and related areas.…”
Section: Introduction To Federated Learningmentioning
confidence: 99%
“…Healthcare: The digitization of patients' health records proves advantageous for both patients and healthcare providers in terms of sharing, monitoring, tracking, and analyzing healthcare information 169 . In addition to safeguarding data collection, for instance, works 170 and 171 employed k‐anonymity methods to protect data. Furthermore, FL in the medical field contributes to the integration of healthcare data from various medical institutions, fostering research in disease prediction, personalized treatment, and related areas.…”
Section: Introduction To Federated Learningmentioning
confidence: 99%
“…Furthermore, ransomware grew by nearly 13%, equivalent to the increase over the previous five years [1]. In the healthcare industry, implementing network security tools is imperative to protect healthcare data against unauthorized access and disclosure under the legal, ethical, and medical domains [2]. Hence, developing an effective network security tool to protect data and detect such threats is vital, as cyber-attack frequency and complexity rise yearly and are highly variable [3].…”
Section: Introductionmentioning
confidence: 99%
“…There are many protection methods for the two types of location privacy mentioned above, such as differential privacy [8,9], the homomorphic encryption method [10], coordinate transformation [11], anonymous steganography, etc. K-anonymity [12] belongs to anonymous steganography, which constructs an anonymous area by combining the user's real location with K-1 virtual locations. When the requesting user sends an LBS request, the user replaces his/her real location with the anonymous area and submits it to the LSP, effectively protecting his/her personal location privacy [13,14].…”
Section: Introductionmentioning
confidence: 99%