Securing Health Data on the Blockchain: A Differential Privacy and Federated Learning Framework (2405.11580v1)
Abstract: This study proposes a framework to enhance privacy in Blockchain-based Internet of Things (BIoT) systems used in the healthcare sector. The framework addresses the challenge of leveraging health data for analytics while protecting patient privacy. To achieve this, the study integrates Differential Privacy (DP) with Federated Learning (FL) to protect sensitive health data collected by IoT nodes. The proposed framework utilizes dynamic personalization and adaptive noise distribution strategies to balance privacy and data utility. Additionally, blockchain technology ensures secure and transparent aggregation and storage of model updates. Experimental results on the SVHN dataset demonstrate that the proposed framework achieves strong privacy guarantees against various attack scenarios while maintaining high accuracy in health analytics tasks. For 15 rounds of federated learning with an epsilon value of 8.0, the model obtains an accuracy of 64.50%. The blockchain integration, utilizing Ethereum, Ganache, Web3.py, and IPFS, exhibits an average transaction latency of around 6 seconds and consistent gas consumption across rounds, validating the practicality and feasibility of the proposed approach.
- S. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K.-S. Kwak, “The internet of things for health care: a comprehensive survey,” IEEE access, vol. 3, pp. 678–708, 2015, publisher: IEEE. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7113786/
- D. V. Dimitrov, “Medical internet of things and big data in healthcare,” Healthcare informatics research, vol. 22, no. 3, p. 156, 2016, publisher: Korean Society of Medical Informatics. [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4981575/
- J. J. Hathaliya and S. Tanwar, “An exhaustive survey on security and privacy issues in Healthcare 4.0,” Computer Communications, vol. 153, pp. 311–335, 2020, publisher: Elsevier. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0140366419311880
- B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial intelligence and statistics. PMLR, 2017, pp. 1273–1282. [Online]. Available: https://proceedings.mlr.press/v54/mcmahan17a?ref=https://githubhelp.com
- Q. Yang, Y. Liu, T. Chen, and Y. Tong, “Federated Machine Learning: Concept and Applications,” ACM Transactions on Intelligent Systems and Technology, vol. 10, no. 2, pp. 1–19, Mar. 2019. [Online]. Available: https://dl.acm.org/doi/10.1145/3298981
- L. Melis, C. Song, E. De Cristofaro, and V. Shmatikov, “Exploiting unintended feature leakage in collaborative learning,” in 2019 IEEE symposium on security and privacy (SP). IEEE, 2019, pp. 691–706.
- M. Nasr, R. Shokri, and A. Houmansadr, “Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning,” in 2019 IEEE symposium on security and privacy (SP). IEEE, 2019, pp. 739–753.
- C. Dwork and A. Roth, “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014, publisher: Now Publishers, Inc. [Online]. Available: https://www.nowpublishers.com/article/Details/TCS-042
- M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep Learning with Differential Privacy,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Vienna Austria: ACM, Oct. 2016, pp. 308–318. [Online]. Available: https://dl.acm.org/doi/10.1145/2976749.2978318
- B. Jayaraman and D. Evans, “Evaluating differentially private machine learning in practice,” in 28th USENIX Security Symposium (USENIX Security 19), 2019, pp. 1895–1912. [Online]. Available: https://www.usenix.org/conference/usenixsecurity19/presentation/jayaraman
- X. Yang, W. Huang, and M. Ye, “Dynamic personalized federated learning with adaptive differential privacy,” Advances in Neural Information Processing Systems, vol. 36, pp. 72 181–72 192, 2023.
- T. M. Fernández-Caramés and P. Fraga-Lamas, “A Review on the Use of Blockchain for the Internet of Things,” Ieee Access, vol. 6, pp. 32 979–33 001, 2018, publisher: IEEE. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8370027/
- T. McGhin, K.-K. R. Choo, C. Z. Liu, and D. He, “Blockchain in healthcare applications: Research challenges and opportunities,” Journal of network and computer applications, vol. 135, pp. 62–75, 2019, publisher: Elsevier.
- J. Xu, B. S. Glicksberg, C. Su, P. Walker, J. Bian, and F. Wang, “Federated Learning for Healthcare Informatics,” Journal of Healthcare Informatics Research, vol. 5, no. 1, pp. 1–19, Mar. 2021. [Online]. Available: http://link.springer.com/10.1007/s41666-020-00082-4
- X. Li, Y. Gu, N. Dvornek, L. H. Staib, P. Ventola, and J. S. Duncan, “Multi-site fMRI analysis using privacy-preserving federated learning and domain adaptation: ABIDE results,” Medical Image Analysis, vol. 65, p. 101765, 2020, publisher: Elsevier. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1361841520301298
- C. Dwork, “Differential Privacy,” in Automata, Languages and Programming, D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, vol. 4052, pp. 1–12, series Title: Lecture Notes in Computer Science. [Online]. Available: http://link.springer.com/10.1007/11787006_1
- X. Gu, M. Li, Y. Cheng, L. Xiong, and Y. Cao, “{PCKV}: Locally differentially private correlated {Key-Value} data collection with optimized utility,” in 29th USENIX security symposium (USENIX security 20), 2020, pp. 967–984. [Online]. Available: https://www.usenix.org/conference/usenixsecurity20/presentation/gu
- A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “Medrec: Using blockchain for medical data access and permission management,” in 2016 2nd international conference on open and big data (OBD). IEEE, 2016, pp. 25–30.
- Q. Xia, E. B. Sifah, A. Smahi, S. Amofa, and X. Zhang, “BBDS: Blockchain-based data sharing for electronic medical records in cloud environments,” Information, vol. 8, no. 2, p. 44, 2017, publisher: MDPI. [Online]. Available: https://www.mdpi.com/2078-2489/8/2/44
- H. Kim, J. Park, M. Bennis, and S.-L. Kim, “Blockchained on-device federated learning,” IEEE Communications Letters, vol. 24, no. 6, pp. 1279–1283, 2019, publisher: IEEE.
- P. Kairouz, H. B. McMahan, B. Avent, A. Bellet, M. Bennis, A. N. Bhagoji, K. Bonawitz, Z. Charles, G. Cormode, and R. Cummings, “Advances and open problems in federated learning,” Foundations and Trends® in Machine Learning, vol. 14, no. 1–2, pp. 1–210, 2021, publisher: Now Publishers, Inc. [Online]. Available: https://www.nowpublishers.com/article/Details/MAL-083
- C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” Journal of Privacy and Confidentiality, vol. 7, no. 3, pp. 17–51, 2016. [Online]. Available: https://journalprivacyconfidentiality.org/index.php/jpc/article/view/405
- S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized Business Review, p. 21260, 2008.
- G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32, 2014. [Online]. Available: https://cryptodeep.ru/doc/paper.pdf
- V. Buterin, “A next-generation smart contract and decentralized application platform,” white paper, vol. 3, no. 37, pp. 2–1, 2014.
- “Home - Truffle Suite,” Feb. 2024. [Online]. Available: https://archive.trufflesuite.com/
- “The Merge.” [Online]. Available: https://ethereum.org/en/roadmap/merge/
- V. Buterin and V. Griffith, “Casper the Friendly Finality Gadget,” Jan. 2019, arXiv:1710.09437 [cs]. [Online]. Available: http://arxiv.org/abs/1710.09437
- Y. Netzer, T. Wang, A. Coates, A. Bissacco, B. Wu, and A. Y. Ng, “Reading digits in natural images with unsupervised feature learning,” in NIPS workshop on deep learning and unsupervised feature learning, vol. 2011. Granada, Spain, 2011, p. 7, issue: 5. [Online]. Available: http://research.google.com/pubs/archive/37648.pdf
- J. Benet, “IPFS - Content Addressed, Versioned, P2P File System,” Jul. 2014, arXiv:1407.3561 [cs]. [Online]. Available: http://arxiv.org/abs/1407.3561
- Daniel Commey (6 papers)
- Sena Hounsinou (3 papers)
- Garth V. Crosby (6 papers)