2022
DOI: 10.1016/j.jisa.2022.103158
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preservation using game theory in e-health application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
0
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
0
0
Order By: Relevance
“…Akkaoui et al [26] studied a blockchain-based sharing framework, constructed a patient-requester game model from an EGT perspective, investigated the impact of relevant parameters in medical big data sharing in terms of trust, and validated the results through numerical simulations. In the e-health application scenario, Sfar et al [27] proposed a Markov process-based privacy-preserving game model (MTGM), which can not only enhance privacy protection and improve time efficiency but also resolve the conflict of interest between data holders and data requesters to a certain extent. To balance the accuracy of medical diagnosis and the security of patient privacy, Jiang et al [28] proposed a multi-party evolutionary game model based on UPHFPR to quantify the risk of physician visits.…”
Section: Game Theory On Data Sharingmentioning
confidence: 99%
“…Akkaoui et al [26] studied a blockchain-based sharing framework, constructed a patient-requester game model from an EGT perspective, investigated the impact of relevant parameters in medical big data sharing in terms of trust, and validated the results through numerical simulations. In the e-health application scenario, Sfar et al [27] proposed a Markov process-based privacy-preserving game model (MTGM), which can not only enhance privacy protection and improve time efficiency but also resolve the conflict of interest between data holders and data requesters to a certain extent. To balance the accuracy of medical diagnosis and the security of patient privacy, Jiang et al [28] proposed a multi-party evolutionary game model based on UPHFPR to quantify the risk of physician visits.…”
Section: Game Theory On Data Sharingmentioning
confidence: 99%
“…These approaches employ variety of operations such as generalization [14], suppression [15], bucketization [16], hash functions [17], cryptographic primitives [18], lattice-based encryption [19], parameter sharing [20], masking [21,22], pseudonyms [23][24][25][26], and joint operations [27][28][29][30] in order to preserve the privacy of the individual. Recently, machine learning (ML) approaches have also been employed to preserve the privacy of individuals in data analysis and publishing [31][32][33][34][35].…”
Section: State-of-the-art Privacy Preserving Approachesmentioning
confidence: 99%
“…Tadic et al [167] designed a prototype that preserves the privacy and security of activists online. Sfar et al [18] proposed generalized privacy-preserving solutions for e-health applications using the game theory concept. Zhang et al [168] discussed the concept of visual privacy which has become a major threat to the individual as well as group privacy amid rapid developments in AI tools.…”
Section: Group Privacy: a New Dimension Of Privacymentioning
confidence: 99%
See 1 more Smart Citation