Affiliation:
1. University of Rochester, USA
Abstract
Transitioning US healthcare into the digital era is necessary to reduce operational costs at Healthcare Organizations (HCO) and provide better diagnostic tools for healthcare professionals by making digital patient data available in a timely fashion. Such a transition requires that the Personal Health Information (PHI) is protected in three different phases of the manipulation of digital patient data: 1) Acquisition, 2) Storage, and 3) Computation. While being able to perform analytics or using such PHI for long-term health monitoring can have significant positive impacts on the quality of healthcare, securing PHI in each one of these phases presents unique challenges in each phase. While established encryption techniques, such as Advanced Encryption Standard (AES), can secure PHI in Phases 1 (acquisition) and 2 (storage), they can only assure secure storage. Assuring the data privacy in Phase 3 (computation) is much more challenging, since there exists no method to perform computations, such as analytics and long-term health monitoring, on encrypted data efficiently. In this chapter, the authors study one emerging encryption technique, called Fully Homomorphic Encryption (FHE), as a candidate to perform secure analytics and monitoring on PHI in Phase 3. While FHE is in its developing stages and a mainstream application of it to general healthcare applications may take years to be established, the authors conduct a feasibility study of its application to long-term patient monitoring via cloud-based ECG data acquisition through existing ECG acquisition devices.
Reference56 articles.
1. Alivecor. (2013). ECG screening made easy. Retrieved from http://www.alivecor.com
2. Amazon. (n.d.). Amazon web services (AWS). Retrieved from http://aws.amazon.com
3. On Lovász' lattice reduction and the nearest lattice point problem.;L.Babai;STACS,1985
4. Evaluating 2-DNF Formulas on Ciphertexts
5. Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2012). (Leveled) fully homomorphic encryption without bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (pp. 309-325). ACM.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Framework for Generating Accelerators for Homomorphic Encryption Operations on FPGAs;2024 IEEE 35th International Conference on Application-specific Systems, Architectures and Processors (ASAP);2024-07-24
2. Performance-aware Scale Analysis with Reserve for Homomorphic Encryption;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1;2024-04-17
3. Privacy and Smart Cities: A Bibliometric Analysis;Springer Proceedings in Complexity;2024
4. Enabling inter-organizational analytics in business networks through meta machine learning;Information Technology and Management;2023-06-03
5. A Novel Framework for Privacy Enabled Healthcare Recommender Systems;Artificial Intelligence for Smart Healthcare;2023