skip to main content
research-article

Energy Efficient and Secure Neural Network–based Disease Detection Framework for Mobile Healthcare Network

Published:15 April 2023Publication History
Skip Abstract Section

Abstract

Adopting mobile healthcare network (MHN) services such as disease detection is fraught with concerns about the security and privacy of the entities involved and the resource restrictions at the Internet of Things (IoT) nodes. Hence, the essential requirements for disease detection services are to (i) produce accurate and fast disease detection without jeopardizing the privacy of health clouds and medical users and (ii) reduce the computational and transmission overhead (energy consumption) of the IoT devices while maintaining the privacy. For privacy preservation of widely used neural network– (NN) based disease detection, existing literature suggests either computationally heavy public key fully homomorphic encryption (FHE), or secure multiparty computation, with a large number of interactions. Hence, the existing privacy-preserving NN schemes are energy consuming and not suitable for resource-constrained IoT nodes in MHN. This work proposes a lightweight, fully homomorphic, symmetric key FHE scheme (SkFhe) to address the issues involved in implementing privacy-preserving NN. Based on SkFhe, widely used non-linear activation functions ReLU and Leaky ReLU are implemented over the encrypted domain. Furthermore, based on the proposed privacy-preserving linear transformation and non-linear activation functions, an energy-efficient, accurate, and privacy-preserving NN is proposed. The proposed scheme guarantees privacy preservation of the health cloud’s NN model and medical user’s data. The experimental analysis demonstrates that the proposed solution dramatically reduces the overhead in communication and computation at the user side compared to the existing schemes. Moreover, the improved energy efficiency at the user is accomplished with reduced diagnosis time without sacrificing classification accuracy.

REFERENCES

  1. [1] Zhang Kuan, Yang Kan, Liang Xiaohui, Su Zhou, Shen Xuemin, and Luo Henry H.. 2015. Security and privacy for mobile healthcare networks: From a quality of protection perspective. IEEE Wireless Commun. 22, 4 (August 2015), 104–112. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Sahi Muneer Ahmed, Abbas Haider, Saleem Kashif, Yang Xiaodong, Derhab A., Orgun Mehmet A., Iqbal Waseem, Rashid Imran, and Yaseen Asif. 2018. Privacy preservation in e-healthcare environments: State of the art and future directions. IEEE Access 6, (Februarty 2018), 464–478. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Alhirabi Nada, Rana Omer, and Perera Charith. 2021. Security and privacy requirements for the internet of things: A survey. ACM Trans. Internet Things 2, 1, Article 6 (February 2021), 1–37. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Barwad Adarsh, Dey Pranab, and Susheilia Shaily. 2012. Artificial neural network in diagnosis of metastatic carcinoma in effusion cytology. Cytom. Part B Clin. Cytom. 82B, 2 (March 2012), 107–111. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Saghiri M. A., Asgar K., Boukani K. K., Lotfi M., Aghili H., Delvarani A., Karamifar K., Saghiri A. M., Mehrvarzfar P., and Garcia-Godoy F.. 2012. A new approach for locating the minor apical foramen using an artificial neural network. Int. Endod. J. 45, 3 (March 2012), 257–265. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Phong Le Trieu and Thi Phuong Tran. 2019. Privacy-preserving deep learning via weight transmission. IEEE Trans. Inf. Forens. Secur. 14, 11 (November 2019), 3003–3015. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Parhi Rahul and D. Nowak Robert. 2020. The role of neural network activation functions. IEEE Sign. Process Lett. 27, (September 2020), 1779–1783. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Hu He. 2018. vReLU Activation functions for artificial neural networks. In Proceedings of the 14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD’18), 856–860. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Seo Jihoon, Lee Juyul, and Kim Keunyoung. 2017. Activation functions of deep neural networks for polar decoding applications. In Proceedings of the IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’17). 1–5. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Liu Jian, Juuti Mika, Lu Yao, and Asokan N.. 2017. Oblivious neural network ppredictions via MiniONN transformations. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 619–631.Google ScholarGoogle Scholar
  11. [11] Chen Jialu, Zhou Jun, Cao Zhenfu, V. Vasilakos Athanasios, Dong Xiaolei, and Raymond Kim-Kwang. 2020. Lightweight privacy-preserving training and evaluation for discretized neural networks. IEEE IoT J. 7, 4 (April 2020), 2663–2678. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Kwabena Owusu-Agyemang, Qin Zhen, Zhuang Tianming, and Qin Zhiguang. 2019. MSCryptoNet: Multi-scheme privacy-preserving deep learning in cloud computing. IEEE Access 7, (February 2019), 29344–29354. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Wang Weiru, Gan Yanfen, Vong Chi-Man, and Chen Chuangquan. 2019. Homo-ELM: fully homomorphic extreme learning machine. Int. J. Mach. Learn. Cyber. 11, (December 2019), 1531–1540. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Aono Yoshinori, Hayashi Takuya, Trieu Phong Le, and Wang Lihua. 2016. Privacy-preserving logistic regression with distributed data sources via homomorphic encryption, IEICE Trans. Inf. Syst. 99-D, 8 (August 2016), 2079–2089. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Aono Yoshinori, Hayashi Takuya, Phong Le Trieu, and Wang Lihua. 2016. Scalable and secure logistic regression via homomorphic encryption. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. 142–144. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Yang Yuchen, Wu Longfei, Yin Guisheng, Li Lijie, and Zhao Hongbin. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE IoT J. 4, 5 (October 2017), 1250–1258. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Trappe Wade, Howard Richard, and S. Moore Robert. 2015. Low-energy security: Limits and opportunities in the Internet of Things. IEEE Secur. Priv. 13, 1 (February 2015), 14–21. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Zhou Jun, Cao Zhenfu, Dong Xiaolei, and Lin Xiaodong. 2015. PPDM: A privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J. Sel. Top. Sign. Process. 9, 7 (October 2015), 1332–1344. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] L. Rivest Ronald, Adleman Len, and L. Dertouzos Michael. 1978. On data banks and privacy homomorphisms. In Foundations of Secure Computation. Academic Press, New York, NY, 169–179.Google ScholarGoogle Scholar
  20. [20] Alex Sona, Dhanaraj K. J., and Deepthi P. P.. 2022. Private and energy-efficient decision tree-based disease detection for resource-constrained medical users in mobile healthcare network, IEEE Access 10, (February 2022), 17098–17112. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Chitravel S. and Lakshmi J. Ashta. 2017. Linear complexity of second order PN sequences addition with single order PN sequence in nonlinear filter generator, J. Discr. Math. Sci. Cryptogr. 20, 5 (November 2017), 1173–1181. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Ma Zhuoran, Ma Jianfeng, Miao Yinbin, Liu Ximeng, Raymond Choo Kim-Kwang, Yang Ruikang, and Wang Xiangyu. 2022. Lightweight privacy-preserving medical diagnosis in edge computing, IEEE Trans. Serv. Comput. 15, 3 (June 2022), 1606–1618. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Koya Aneesh M. and Deepthi P. P.. 2021. Efficient on-site confirmatory testing for atrial fibrillation with derived 12-lead ECG in a wireless body area network. J Amb. Intell. Hum. Comput. (November 2021), 1–19. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Dowlin Nathan, Gilad-Bachrach Ran, Laine Kim, Lauter Kristin, Naehrig Michael, and Wernsing John. 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In Proceedings of the 33rd International Conference on International Conference on Machine Learning. 201–210.Google ScholarGoogle Scholar
  25. [25] Golic J. D., Clark A., and Dawson E.. 2000. Generalized inversion attack on nonlinear filter generators, IEEE Trans. Comput. 49, 10 (October 2000), 1100–1109. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Brakerski Zvika, Gentry Craig, and Vaikuntanathan Vinod. 2012. (Leveled) Fully homomorphic encryption without bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. 309–325. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Lee Joon-Woo, Kang HyungChul, Lee Yongwoo, Choi Woosuk, Eom Jieun, Deryabin Maxim, Lee Eunsang, Lee Junghyun, Yoo Donghoon, Kim Young-Sik, and Jong-Seon . 2022. Privacy-Preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 10, (March 2022), 30039–30054. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Barni M., Orlandi C., and Piva A.. 2006. A privacy-preserving protocol for neural network-based computation. In Proceedings of the 8th Workshop on Multimedia and Security (MM&Sec’06). ACM, New York, NY, 146–151. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Shamir Adi. 1979. How to share a secret, Commun. ACM 22, 11 (November 1979), 612–613. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] C.-F. Chan Aldar. 2009. Symmetric-key homomorphic encryption for encrypted data processing. In Proceedings of the IEEE International Conference on Communications. 1–5. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] NIST. Recommendation for Key Management: Part 1–General. Retrieved September 13, 2022 from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf.Google ScholarGoogle Scholar
  32. [32] The PrimePages: Prime Number Research & Records. How Many Primes Are There? Retrieved June 10, 2021 from https://primes.utm.edu/howmany.html#pnt.Google ScholarGoogle Scholar
  33. [33] CS 255 (Introduction to Cryptography). Retrieved June 10, 2022 from https://www.cs.utexas.edu/dwu4/notes/CS255LectureNotes.pdf.Google ScholarGoogle Scholar
  34. [34] Katz Jonathan and Lindell Yehuda. 2020. Introduction to Modern Cryptography, Vol. 3. CRC Press, Boca Raton, FL. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Goldreich Oded. 2009. Foundations of Cryptography: Volume 2, Basic Applications, Vol. 2. Cambridge University Press, Cambridge, UK. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Lindell Yehuda and Pinkas Benny. 2009. A proof of security of YAOS protocol for two-party computation. J. Cryptol 22, 2 (April 2009), 161–188. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Liu Ximeng, Lu Rongxing, Ma Jianfeng, Chen Le, and Qin Baodong. 2016. Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE J. Biomed. Health Inform. 20, 2 (March 2016), 655–668. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Liu Ximeng, H. Deng Robert, Raymond Choo Kim-Kwang, and Weng Jian. 2016. An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forens. Secur. 11, 11 (November 2016), 2401–2414. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] The China Physiological Signal Challenge. 2018. Automatic Identification of the Rhythm/Morphology Abnormalities in 12-Lead ECGs. Retrieved June 10, 2021 from http://2018.icbeb.org/Challenge.html.Google ScholarGoogle Scholar
  40. [40] Sun Xiaoqiang, Zhang Peng, K. Liu Joseph, Yu Jianping, and Xie Weixin. 2018. Private machine learning classification based on fully homomorphic encryption. IEEE T. Emerg. Top. Com. 8, 2 (April/June 2018), 352–364. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Halevi Shai and Shoup Victor. 2013. Design and Implementation of a Homomorphic-Encryption Library. Retrieved from https://github.com/shaih/HElib.Google ScholarGoogle Scholar
  42. [42] Liu Ximeng, Deng Robert H., Raymond Choo Kim-Kwang, and Yang Yang. 2021. Privacy-preserving outsourced clinical decision support system in the cloud, IEEE Trans. Serv. Comput. 14, 1 (January 2021), 222–234. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] W. Bos Joppe, Lauter Kristin, Loftus Jake, and Naehrig Michael. 2013. Improved security for a ring-based fully homomorphic encryption scheme. In Proceedings of the IMA International Conference on Cryptography and Coding (IMACC’13), Lecture Notes in Computer Science, M. Stam (Ed.), 45–64. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Ma Zhuoran, Ma Jianfeng, Miao Yinbin, and Liu Ximeng. 2019. Privacy-preserving and high-accurate outsourced disease predictor on Random Forest. Inf. Sci. 496, (September 2019), 225–241. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Paillier Pascal. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptology and Information Security (EUROCRYPT’99), Lecture Notes in Computer Science, Vol. 1592, J. Stern (Ed.). Springer, 223238. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Lepoint Tancrede and Naehrig Michael. 2014. A comparison of the homomorphic encryption schemes fv and yashe. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptology (AFRICACRYPT’14). Springer, Cham, 318-335. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Guo Cheng, Tian Pengxu, and Raymond Choo Kim-Kwang. 2021. Enabling privacy-assured fog-based data aggregation in E-healthcare systems. IEEE Trans. Industr. Inform. 17, 3 (March 2021), 1948–1957. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Lakshmi V. S. and Deepthi P. P.. 2021. Collusion resistant secret sharing scheme for secure data storage and processing over cloud. J. Inf. Secur. Appl. 60, (August 2021). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Bortolotti Daniele, Mangia Mauro, Bartolini Andrea, Rovatti Riccardo, Setti Gianluca, and Benini Luca. 2018. Energy-aware bio-signal compressed sensing reconstruction on the WBSN-gateway. IEEE Trans. Emerg. Top. Comput. 6, 3 (July/September 2018), 370-381. DOI:Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Energy Efficient and Secure Neural Network–based Disease Detection Framework for Mobile Healthcare Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Privacy and Security
      ACM Transactions on Privacy and Security  Volume 26, Issue 3
      August 2023
      640 pages
      ISSN:2471-2566
      EISSN:2471-2574
      DOI:10.1145/3582895
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 April 2023
      • Online AM: 27 February 2023
      • Accepted: 22 February 2023
      • Revised: 6 October 2022
      • Received: 7 March 2022
      Published in tops Volume 26, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)206
      • Downloads (Last 6 weeks)19

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format