SHFL: K-Anonymity-Based Secure Hierarchical Federated Learning Framework for Smart Healthcare Systems
نویسندگان
چکیده
Dynamic and smart Internet of Things (IoT) infrastructures allow the development healthcare systems, which are equipped with mobile health embedded sensors to enable a broad range applications. These IoT applications provide access clients’ information. However, rapid increase in number devices social networks has generated concerns regarding secure sharing client’s location. In this regard, federated learning (FL) is an emerging paradigm decentralized machine that guarantees training shared global model without compromising data privacy client. To end, we propose K-anonymity-based hierarchical (SHFL) framework for systems. proposed FL approach, centralized server communicates hierarchically multiple directly indirectly connected devices. particular, SHFL formulates clusters location-based services achieve distributed FL. addition, utilizes K-anonymity method hide location cluster Finally, evaluated performance by configuring different architectures datasets. The experiments validated provides adequate generalization network scalability accurate systems privacy.
منابع مشابه
A Framework for a Secure Federated Patient Healthcare System
Medical records contain personal information like names, Social Security Number (SSN), Birth Date etc. The exposure of this information could cause considerable damage and lends itself to misuse in multiple ways However it is widely recognized that information from hospital information systems is needed for research and development. In this paper we propose a new framework to secure data from m...
متن کاملSecure Smart Card Based Password Authentication Scheme with User Anonymity
Recently, a smart card based authentication and key agreement scheme preserving the user anonymity was proposed by Wang, Juang and Lei, that is designed to provide users with secure activities in ubiquitous computing environments. The authors proved that their scheme delivers important security properties and functionalities, such as without maintaining password/verification tables, freedom on ...
متن کاملA reciprocal framework for spatial K-anonymity
Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does ...
متن کاملFederated, Secure Trust Networks for Distributed Healthcare IT Services
Recent federal regulations mandate the privacy and security of healthcare data at a level never previously contemplated; compliance with those requirements will require a complete rethinking of how data is utilized, stored, and transmitted. To better understand these issues in the context of a modern distributed system, our research group is developing a prototype healthcare IT system and medic...
متن کاملPassive Atta k Analysis for Conne tion-Based Anonymity Systems
In this paper we onsider low laten y onne tion-based anonymity system whi h an be used for appli ations like web browsing or SSH. Although several su h systems have been designed and built, their anonymity has so far not been adequately evaluated. We analyse the anonymity of onne tion-based systems against passive adversaries. We give a pre ise des ription of two atta ks, evaluate their e e tiv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Internet
سال: 2022
ISSN: ['1999-5903']
DOI: https://doi.org/10.3390/fi14110338