4.6 Article

Private predictive analysis on encrypted medical data

Journal

JOURNAL OF BIOMEDICAL INFORMATICS
Volume 50, Issue -, Pages 234-243

Publisher

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jbi.2014.04.003

Keywords

Homomorphic encryption; Encrypted medical data; Predictive analysis; Logistic regression; Proportional hazard model

Ask authors/readers for more resources

Increasingly, confidential medical records are being stored in data centers hosted by hospitals or large companies. As sophisticated algorithms for predictive analysis on medical data continue to be developed, it is likely that, in the future, more and more computation will be done on private patient data. While encryption provides a tool for assuring the privacy of medical information, it limits the functionality for operating on such data. Conventional encryption methods used today provide only very restricted possibilities or none at all to operate on encrypted data without decrypting it first. Homomorphic encryption provides a tool for handling such computations on encrypted data, without decrypting the data, and without even needing the decryption key. In this paper, we discuss possible application scenarios for homomorphic encryption in order to ensure privacy of sensitive medical data. We describe how to privately conduct predictive analysis tasks on encrypted data using homomorphic encryption. As a proof of concept, we present a working implementation of a prediction service running in the cloud (hosted on Microsoft's Windows Azure), which takes as input private encrypted health data, and returns the probability for suffering cardiovascular disease in encrypted form. Since the cloud service uses homomorphic encryption, it makes this prediction while handling only encrypted data, learning nothing about the submitted confidential medical data. (C) 2014 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

Arithmetic Considerations for Isogeny-Based Cryptography

Joppe W. Bos, Simon J. Friedberger

IEEE TRANSACTIONS ON COMPUTERS (2019)

Article Computer Science, Theory & Methods

Fast Cryptography in Genus 2

Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter

JOURNAL OF CRYPTOLOGY (2016)

Article Computer Science, Theory & Methods

White-Box Cryptography: Don't Forget About Grey-Box Attacks

Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff

JOURNAL OF CRYPTOLOGY (2019)

Article Energy & Fuels

Efficient privacy-preserving aggregation for demand side management of residential loads

Emilio J. Palacios-Garcia, Xavier Carpent, Joppe W. Bos, Geert Deconinck

Summary: Residential demand side management (DMS) is an effective tool for maintaining network balance, but privacy concerns related to user personal consumption data have hindered its widespread adoption. This paper proposes a privacy-preserving aggregation algorithm based on additive random shares and a combination of symmetric and asymmetric key cryptography methods. The algorithm is compared with other techniques such as additive homomorphic encryption (AHE) and state-of-the-art MPC protocols. The results show that while generic techniques like homomorphic encryption are computationally expensive, MPC approaches provide better performance and resilience for large networks. The proposed additive random shares algorithm is considered the most balanced choice for DSM, offering good performance, simpler information flow, and the ability to add redundant intermediary parties for enhanced resilience.

APPLIED ENERGY (2022)

Article Computer Science, Theory & Methods

Faster modular arithmetic for isogeny-based crypto on embedded devices

Joppe W. Bos, Simon J. Friedberger

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2020)

Proceedings Paper Computer Science, Software Engineering

Differential Attacks on Deterministic Signatures

Christopher Ambrose, Joppe W. Bos, Bjoern Fay, Marc Joye, Manfred Lochter, Bruce Murray

TOPICS IN CRYPTOLOGY - CT-RSA 2018 (2018)

Proceedings Paper Computer Science, Software Engineering

Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling

Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren

PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017 (2017)

Proceedings Paper Computer Science, Theory & Methods

Fast Arithmetic Modulo 2xpy ± 1

Joppe W. Bos, Simon Friedberger

2017 IEEE 24TH SYMPOSIUM ON COMPUTER ARITHMETIC (ARITH) (2017)

Article Computer Science, Theory & Methods

Computational aspects of correlation power analysis

Paul Bottinelli, Joppe W. Bos

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Faster Homomorphic Function Evaluation Using Non-integral Base Encoding

Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren

CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017 (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough

Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen

CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016 (2016)

Proceedings Paper Computer Science, Information Systems

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE

Joppe Bos, Craig Costello, Leo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Theory & Methods

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila

2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)

Proceedings Paper Computer Science, Theory & Methods

Mersenne Factorization Factory

Thorsten Kleinjung, Joppe W. Bos, Aden K. Lenstra

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I (2014)

No Data Available