{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:35:32Z","timestamp":1772724932438,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11432-020-3062-8","type":"journal-article","created":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T06:02:36Z","timestamp":1631685756000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Jupiter: a modern federated learning platform for regional medical care"],"prefix":"10.1007","volume":"64","author":[{"given":"Ju","family":"Xing","sequence":"first","affiliation":[]},{"given":"Jiadong","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Zexun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jiali","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"3062_CR1","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1016\/j.ijmedinf.2009.07.001","volume":"78","author":"T M\u00e4enp\u00e4\u00e4","year":"2009","unstructured":"M\u00e4enp\u00e4\u00e4 T, Suominen T, Asikainen P, et al. The outcomes of regional healthcare information systems in health care: a review of the research literature. Int J Med Inf, 2009, 78: 757\u2013771","journal-title":"Int J Med Inf"},{"key":"3062_CR2","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1377\/hlthaff.27.1.w60","volume":"26","author":"J Adler-Milstein","year":"2007","unstructured":"Adler-Milstein J, McAfee A P, Bates D W, et al. The state of regional health information organizations: current activities and financing. Health Affairs, 2007, 26: 60\u201369","journal-title":"Health Affairs"},{"key":"3062_CR3","doi-asserted-by":"publisher","first-page":"26094","DOI":"10.1038\/srep26094","volume":"6","author":"R Miotto","year":"2016","unstructured":"Miotto R, Li L, Kidd B A, et al. Deep patient: an unsupervised representation to predict the future of patients from the electronic health records. Sci Rep, 2016, 6: 26094","journal-title":"Sci Rep"},{"key":"3062_CR4","unstructured":"Kone\u010dn\u00e4 J, McMahan H B, Yu F X, et al. Federated learning: strategies for improving communication efficiency. 2016. ArXiv:1610.05492"},{"key":"3062_CR5","doi-asserted-by":"crossref","unstructured":"Zhang S, Zhang S, Chen X, et al. Cloud computing research and development trend. In: Proceedings of 2010 2nd International Conference on Future Networks, 2010. 93\u201397","DOI":"10.1109\/ICFN.2010.58"},{"key":"3062_CR6","doi-asserted-by":"crossref","unstructured":"Wang H, Shi P, Zhang Y. Jointcloud: a cross-cloud cooperation architecture for integrated internet service customization. In: Proceedings of 2017 IEEE 37th International Conference On Distributed Computing Systems (ICDCS), 2017. 1846\u20131855","DOI":"10.1109\/ICDCS.2017.237"},{"key":"3062_CR7","doi-asserted-by":"crossref","unstructured":"Jiang Z, Yin H. Adaptive routing algorithm for joint cloud video delivery. In: Proceedings of 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2017. 316\u2013319","DOI":"10.1109\/ICDCSW.2017.33"},{"key":"3062_CR8","doi-asserted-by":"crossref","unstructured":"Shi P, Wang H, Yue X, et al. Corporation architecture for multiple cloud service providers in jointcloud computing. In: Proceedings of 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2017. 294\u2013298","DOI":"10.1109\/ICDCSW.2017.9"},{"key":"3062_CR9","unstructured":"McMahan H B, Moore E, Ramage D, et al. Communication-efficient learning of deep networks from decentralized data. 2016. ArXiv:1602.05629"},{"key":"3062_CR10","unstructured":"Li Q, Wen Z, He B. Federated learning systems: vision, hype and reality for data privacy and protection. 2019. ArXiv:1907.09693"},{"key":"3062_CR11","unstructured":"Liu D, Miller T, Sayeed R, et al. FADL: federated-autonomous deep learning for distributed electronic health record. 2018. ArXiv:1811.11400"},{"key":"3062_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3339474","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T, et al. Federated machine learning. ACM Trans Intell Syst Technol, 2019, 10: 1\u201319","journal-title":"ACM Trans Intell Syst Technol"},{"key":"3062_CR13","unstructured":"Sahu A K, Li T, Sanjabi M, et al. On the convergence of federated optimization in heterogeneous networks. 2018. ArXiv:1812.06127"},{"key":"3062_CR14","unstructured":"Jiang P, Agrawal G. A linear speedup analysis of distributed deep learning with sparse and quantized communication. In: Proceedings of Advances in Neural Information Processing Systems, 2018. 2525\u20132536"},{"key":"3062_CR15","doi-asserted-by":"crossref","unstructured":"Shokri R, Shmatikov V. Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015. 1310\u20131321","DOI":"10.1145\/2810103.2813687"},{"key":"3062_CR16","unstructured":"Melis L, Song C, de Cristofaro E, et al. Inference attacks against collaborative learning. 2018. ArXiv:1805.04049"},{"key":"3062_CR17","doi-asserted-by":"crossref","unstructured":"Bonawitz K, Ivanov V, Kreuter B, et al. Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017. 1175\u20131191","DOI":"10.1145\/3133956.3133982"},{"key":"3062_CR18","unstructured":"Geyer R C, Klein T, Nabi M. Differentially private federated learning: a client level perspective. 2017. ArXiv:1712.07557"},{"key":"3062_CR19","unstructured":"McMahan H B, Ramage D, Talwar K, et al. Learning differentially private recurrent language models. 2017. ArXiv:1710.06963"},{"key":"3062_CR20","unstructured":"Wang H, Sievert S, Liu S, et al. ATOMO: communication-efficient learning via atomic sparsification. In: Proceedings of Advances in Neural Information Processing Systems, 2018. 9850\u20139861"},{"key":"3062_CR21","unstructured":"Bonawitz K, Eichner H, Grieskamp W, et al. Towards federated learning at scale: system design. 2019. ArXiv:1902.01046"},{"key":"3062_CR22","first-page":"1","volume":"2016","author":"V Costan","year":"2016","unstructured":"Costan V, Devadas S. Intel SGX explained. IACR Cryptol ePrint Archive, 2016, 2016: 1\u2013118","journal-title":"IACR Cryptol ePrint Archive"},{"key":"3062_CR23","doi-asserted-by":"crossref","unstructured":"Taassori M, Shafiee A, Balasubramonian R. VAULT: reducing paging overheads in SGX with efficient integrity verification structures. In: Proceedings of the 23rd International Conference on Architectural Support for Programming Languages and Operating Systems, 2018. 665\u2013678","DOI":"10.1145\/3296957.3177155"},{"key":"3062_CR24","doi-asserted-by":"crossref","unstructured":"Orenbach M, Lifshits P, Minkin M, et al. Eleos: exitless OS services for SGX enclaves. In: Proceedings of the 12th European Conference on Computer Systems, 2017. 238\u2013253","DOI":"10.1145\/3064176.3064219"},{"key":"3062_CR25","doi-asserted-by":"crossref","unstructured":"Xing B C, Shanahan M, Leslie-Hurd R. Intel\u00ae software guard extensions (Intel\u00ae SGX) software support for dynamic memory allocation inside an enclave. In: Proceedings of the Hardware and Architectural Support for Security and Privacy, 2016. 11","DOI":"10.1145\/2948618.2954330"},{"key":"3062_CR26","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/3140659.3080208","volume":"45","author":"O Weisse","year":"2017","unstructured":"Weisse O, Bertacco V, Austin T. Regaining lost cycles with hotcalls: a fast interface for SGX secure enclaves. SIGARCH Comput Archit News, 2017, 45: 81\u201393","journal-title":"SIGARCH Comput Archit News"},{"key":"3062_CR27","unstructured":"Krahn R, Trach B, Vahldiek-Oberwagner A, et al. Pesos: policy enhanced secure object store. In: Proceedings of the 13th ACM European Conference on Computer Systems (EuroSys), 2018. 25"},{"key":"3062_CR28","doi-asserted-by":"crossref","unstructured":"Priebe C, Vaswani K, Costa M. EnclaveDB: a secure database using SGX. In: Proceedings of 2018 IEEE Symposium on Security and Privacy (SP), 2018. 264\u2013278","DOI":"10.1109\/SP.2018.00025"},{"key":"3062_CR29","doi-asserted-by":"crossref","unstructured":"Kim T, Park J, Woo J, et al. Shieldstore: shielded in-memory key-value storage with SGX. In: Proceedings of the 14th ACM European Conference on Computer Systems (EuroSys), 2019. 14","DOI":"10.1145\/3302424.3303951"},{"key":"3062_CR30","unstructured":"Bailleu M, Thalheim J, Bhatotia P, et al. SPEICHER: securing LSM-based key-value stores using shielded execution. In: Proceedings of 17th USENIX Conference on File and Storage Technologies (FAST 19), 2019. 173\u2013190"},{"key":"3062_CR31","unstructured":"Tsai C C, Porter D E, Vij M. Graphene-SGX: a practical library OS for unmodified applications on SGX. In: Proceedings of 2017 USENIX Annual Technical Conference (USENIX ATC 17), 2017. 645\u2013658"},{"key":"3062_CR32","unstructured":"Arnautov S, Trach B, Gregor F, et al. SCONE: secure linux containers with Intel SGX. In: Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), 2016. 689\u2013703"},{"key":"3062_CR33","doi-asserted-by":"crossref","unstructured":"Ahmad A, Kim K, Sarfaraz M I, et al. Obliviate: a data oblivious filesystem for Intel SGX. In: Proceedings of Network and Distributed System Security Symposium, 2018","DOI":"10.14722\/ndss.2018.23284"},{"key":"3062_CR34","unstructured":"Shinde S, Wang S, Yuan P, et al. BesFS: mechanized proof of an iago-safe filesystem for enclaves. 2018. ArXiv:1807.00477"},{"key":"3062_CR35","doi-asserted-by":"crossref","unstructured":"Duan H, Wang C, Yuan X, et al. Lightbox: full-stack protected stateful middlebox at lightning speed. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019. 2351\u20132367","DOI":"10.1145\/3319535.3339814"},{"key":"3062_CR36","unstructured":"Poddar R, Lan C, Popa R A, et al. Safebricks: shielding network functions in the cloud. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), 2018. 201\u2013216"},{"key":"3062_CR37","unstructured":"Kim S, Han J, Ha J, et al. Enhancing security and privacy of tor\u2019s ecosystem by using trusted execution environments. In: Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 2017. 145\u2013161"},{"key":"3062_CR38","doi-asserted-by":"crossref","unstructured":"Goltzsche D, Wulf C, Muthukumaran D, et al. Trustjs: trusted client-side execution of javascript. In: Proceedings of the 10th European Workshop on Systems Security, 2017. 7","DOI":"10.1145\/3065913.3065917"},{"key":"3062_CR39","unstructured":"Ghosn A, Larus J R, Bugnion E. Secured routines: language-based construction of trusted execution environments. In: Proceedings of 2019 USENIX Annual Technical Conference (USENIX ATC 19), 2019. 571\u2013586"},{"key":"3062_CR40","unstructured":"Zheng W, Dave A, Beekman J G, et al. Opaque: an oblivious and encrypted distributed analytics platform. In: Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 2017. 283\u2013298"},{"key":"3062_CR41","doi-asserted-by":"crossref","unstructured":"Havet A, Pires R, Felber P, et al. Securestreams: a reactive middleware framework for secure data stream processing. In: Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems, 2017. 124\u2013133","DOI":"10.1145\/3093742.3093927"},{"key":"3062_CR42","doi-asserted-by":"crossref","unstructured":"Schuster F, Costa M, Fournet C, et al. VC3: trustworthy data analytics in the cloud using SGX. In: Proceedings of 2015 IEEE Symposium on Security and Privacy, 2015. 38\u201354","DOI":"10.1109\/SP.2015.10"},{"key":"3062_CR43","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/96602.96604","volume":"22","author":"A P Sheth","year":"1990","unstructured":"Sheth A P, Larson J A. Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Comput Surv, 1990, 22: 183\u2013236","journal-title":"ACM Comput Surv"},{"key":"3062_CR44","unstructured":"Jayarajan A, Wei J, Gibson G, et al. Priority-based parameter propagation for distributed DNN training. 2019. ArXiv:1905.03960"},{"key":"3062_CR45","doi-asserted-by":"crossref","unstructured":"Nasr M, Shokri R, Houmansadr A. Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In: Proceedings of 2019 IEEE Symposium on Security and Privacy (SP), 2019. 739\u2013753","DOI":"10.1109\/SP.2019.00065"},{"key":"3062_CR46","doi-asserted-by":"crossref","unstructured":"Cho J, Chang H, Mukherjee S, et al. Typhoon: an SDN enhanced real-time big data streaming framework. In: Proceedings of the 13th International Conference on Emerging Networking Experiments and Technologies, 2017. 310\u2013322","DOI":"10.1145\/3143361.3143398"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-3062-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-020-3062-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-3062-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T21:46:00Z","timestamp":1668894360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-020-3062-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":46,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["3062"],"URL":"https:\/\/doi.org\/10.1007\/s11432-020-3062-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,9]]},"assertion":[{"value":"21 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"202101"}}