{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T11:09:55Z","timestamp":1755601795891,"version":"3.37.3"},"reference-count":39,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003824","name":"Hunan University","doi-asserted-by":"publisher","award":["19XKY053","2017NK2390","2019-yzkj-10"],"award-info":[{"award-number":["19XKY053","2017NK2390","2019-yzkj-10"]}],"id":[{"id":"10.13039\/501100003824","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002767","name":"Hunan Provincial Science and Technology Department","doi-asserted-by":"publisher","award":["19XKY053","2017NK2390","2019-yzkj-10"],"award-info":[{"award-number":["19XKY053","2017NK2390","2019-yzkj-10"]}],"id":[{"id":"10.13039\/501100002767","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Yongzhou Guiding Science and Technology Program","award":["19XKY053","2017NK2390","2019-yzkj-10"],"award-info":[{"award-number":["19XKY053","2017NK2390","2019-yzkj-10"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,10]]},"abstract":"<jats:p>The collection and analysis of patient cases can effectively help researchers to extract case feature and to achieve the objectives of precision medicine, but it may cause privacy issues for patients. Although encryption is a good way to protect privacy, it is not conducive to the sharing and analysis of medical cases. In order to address this problem, this paper proposes a federated learning verification model, which combines blockchain technology, homomorphic encryption, and federated learning technology to effectively solve privacy issues. Moreover, we present a FL-EM-GMM Algorithm (Federated Learning Expectation Maximization Gaussian Mixture Model Algorithm), which can make model training without data exchange for protecting patient\u2019s privacy. Finally, we conducted experiments on the federated task of datasets from two organizations in our model system, where the data has the same sample ID with different subset features, and this system is capable of handling privacy and security issues. The results show that the model was trained by our system with better usability, security, and higher efficiency, which is compared with the model trained by traditional machine learning methods.<\/jats:p>","DOI":"10.1155\/2020\/6647562","type":"journal-article","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:50:18Z","timestamp":1607633418000},"page":"1-12","source":"Crossref","is-referenced-by-count":15,"title":["A Privacy-Protection Model for Patients"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1161-4353","authenticated-orcid":true,"given":"Wenzhi","family":"Cheng","sequence":"first","affiliation":[{"name":"School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou 425199, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9990-5747","authenticated-orcid":true,"given":"Wei","family":"Ou","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou 425199, Hunan, China"}]},{"given":"Xiangdong","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou 425199, Hunan, China"}]},{"given":"Wanqin","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou 425199, Hunan, China"}]},{"given":"Dingwan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou 425199, Hunan, China"}]},{"given":"Chunyan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou 425199, Hunan, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.018"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.01.016"},{"key":"3","article-title":"A survey on security threats and countermeasures in internet of medical things (IoMT)","volume":"e4049","author":"M. Papaioannou","year":"2020","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"1","key":"4","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s12553-016-0127-5","article-title":"Patient privacy and security concerns on big data for personalized medicine","volume":"6","author":"B. Bernd","year":"2016","journal-title":"Health and Technology"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3389\/fmed.2019.00034"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2017.0350"},{"issue":"4","key":"7","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1007\/s11036-020-01535-1","article-title":"Mining consuming behaviors with temporal evolution for personalized recommendation in mobile marketing apps","volume":"25","author":"H. Gao","year":"2020","journal-title":"ACM\/Springer Mobile Networks and Applications (MONET)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01246-2"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0272-7"},{"key":"10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TITS.2020.2983835","article-title":"V2VR: reliable hybrid-network-oriented V2V data transmission and routing considering RSUs and connectivity probability","volume":"99","author":"H. Gao","year":"2020","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8843584"},{"key":"12","article-title":"An IoT-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing","volume":"2019","author":"X. Ma","year":"2019","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"13","doi-asserted-by":"crossref","first-page":"305","DOI":"10.46586\/tches.v2019.i3.305-339","article-title":"Leaky noise: new side-channel attack vectors in mixed-signal IoT devices","volume":"3","author":"D. R. E. Gnad","year":"2019","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1144-x"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5978636"},{"key":"16","article-title":"Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data","volume":"99","author":"H. Li","year":"2017","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4960964"},{"key":"18","article-title":"Authenticated medical documents releasing with privacy protection and release control","author":"J. Liu","year":"2019","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.070"},{"key":"20","article-title":"Bitcoin: a peer-to-peer electronic cash system","author":"S. Nakamoto","year":"2019","journal-title":"Manubot"},{"issue":"6\u201310","key":"21","article-title":"Blockchain technology: beyond bitcoin","volume":"2","author":"M. Crosby","year":"2016","journal-title":"Applied Innovation"},{"volume-title":"Mastering Blockchain: Distributed Ledger Technology, Decentralization, and Smart Contracts Explained","year":"2018","author":"I. Bashir","key":"22"},{"author":"J. Liu","key":"23","article-title":"BPDS: a blockchain based privacy-preserving data sharing for electronic medical records"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0995-5"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0998-2"},{"first-page":"534","article-title":"Medibchain: a blockchain based privacy preserving platform for healthcare data","author":"A. Al Omar","key":"26"},{"first-page":"97","article-title":"A review of homomorphic encryption and its applications","author":"L. Zhang","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102362"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.150"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2929298"},{"volume-title":"A fully homomorphic encryption scheme","year":"2009","author":"C. Gentry","key":"32"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2020.2975749"},{"article-title":"A survey on federated learning systems: vision, hype and reality for data privacy and protection","year":"2019","author":"Q. Li","key":"34"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"article-title":"Federated learning for healthcare informatics","year":"2019","author":"J. Xu","key":"36"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-69250-1"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.2200\/s00960ed2v01y201910aim043"},{"key":"39"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6647562.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6647562.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6647562.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:50:24Z","timestamp":1607633424000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/6647562\/"}},"subtitle":[],"editor":[{"given":"Honghao","family":"Gao","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":39,"alternative-id":["6647562","6647562"],"URL":"https:\/\/doi.org\/10.1155\/2020\/6647562","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,12,10]]}}}