Multi-Institution Encrypted Medical Imaging AI Validation Without Data Sharing
نویسندگان
چکیده
Adoption of artificial intelligence medical imaging applications is often impeded by barriers between healthcare systems and algorithm developers given that access to both private patient data commercial model IP important perform pre-deployment evaluation. This work investigates a framework for secure, privacy-preserving AI-enabled inference using CrypTFlow2, state-of-the-art end-to-end compiler allowing cryptographically secure 2-party Computation (2PC) protocols the machine learning vendor target owner. A common DenseNet-121 chest x-ray diagnosis was evaluated on multi-institutional radiographic datasets with without CrypTFlow2 two test sets spanning seven sites across US India, comprising 1,149 images. We measure comparative AUROC performance insecure in multiple pathology classification tasks, explore output distributional shifts resource constraints introduced inference. Secure demonstrated no significant difference all diagnoses, outputs from methods were distributionally equivalent. The use may allow off-the-shelf 2PC AI vendors imaging, changes performance, can facilitate scalable infrastructure real-world evaluation exposure or IP.
منابع مشابه
Fuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملExplorer Efficient Encrypted Keyword Search for Multi - user Data Sharing
In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...
متن کاملEfficient Encrypted Keyword Search for Multi-user Data Sharing
In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...
متن کاملEfficient Sharing of Encrypted Data
This paper describes the design of a censorship-resistant distributed file sharing protocol which has been implemented on top of gnunet, an anonymous, reputation-based network. We focus on the encoding layer of the gnunet file-sharing protocol which supports efficient dissemination of encrypted data as well as queries over encrypted data. The main idea advocated in this paper is that simple cry...
متن کاملPrivate predictive analysis on encrypted medical data
Increasingly, confidential medical records are being stored in data centers hosted by hospitals or large companies. As sophisticated algorithms for predictive analysis on medical data continue to be developed, it is likely that, in the future, more and more computation will be done on private patient data. While encryption provides a tool for assuring the privacy of medical information, it limi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Social Science Research Network
سال: 2021
ISSN: ['1556-5068']
DOI: https://doi.org/10.2139/ssrn.3942127