Multi-Institution Encrypted Medical Imaging AI Validation Without Data Sharing

نویسندگان

چکیده

Adoption of artificial intelligence medical imaging applications is often impeded by barriers between healthcare systems and algorithm developers given that access to both private patient data commercial model IP important perform pre-deployment evaluation. This work investigates a framework for secure, privacy-preserving AI-enabled inference using CrypTFlow2, state-of-the-art end-to-end compiler allowing cryptographically secure 2-party Computation (2PC) protocols the machine learning vendor target owner. A common DenseNet-121 chest x-ray diagnosis was evaluated on multi-institutional radiographic datasets with without CrypTFlow2 two test sets spanning seven sites across US India, comprising 1,149 images. We measure comparative AUROC performance insecure in multiple pathology classification tasks, explore output distributional shifts resource constraints introduced inference. Secure demonstrated no significant difference all diagnoses, outputs from methods were distributionally equivalent. The use may allow off-the-shelf 2PC AI vendors imaging, changes performance, can facilitate scalable infrastructure real-world evaluation exposure or IP.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Explorer Efficient Encrypted Keyword Search for Multi - user Data Sharing

In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...

متن کامل

Efficient Encrypted Keyword Search for Multi-user Data Sharing

In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...

متن کامل

Efficient Sharing of Encrypted Data

This paper describes the design of a censorship-resistant distributed file sharing protocol which has been implemented on top of gnunet, an anonymous, reputation-based network. We focus on the encoding layer of the gnunet file-sharing protocol which supports efficient dissemination of encrypted data as well as queries over encrypted data. The main idea advocated in this paper is that simple cry...

متن کامل

Private predictive analysis on encrypted medical data

Increasingly, confidential medical records are being stored in data centers hosted by hospitals or large companies. As sophisticated algorithms for predictive analysis on medical data continue to be developed, it is likely that, in the future, more and more computation will be done on private patient data. While encryption provides a tool for assuring the privacy of medical information, it limi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Social Science Research Network

سال: 2021

ISSN: ['1556-5068']

DOI: https://doi.org/10.2139/ssrn.3942127