{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:11:09Z","timestamp":1777486269411,"version":"3.51.4"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T00:00:00Z","timestamp":1740614400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T00:00:00Z","timestamp":1740614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01098-6","type":"journal-article","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T12:53:47Z","timestamp":1740747227000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach"],"prefix":"10.1186","volume":"12","author":[{"given":"Vankamamidi S.","family":"Naresh","sequence":"first","affiliation":[]},{"given":"Sivaranjani","family":"Reddi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,27]]},"reference":[{"issue":"1","key":"1098_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. l-diversity: privacy beyond k-anonymity. ACM Trans Knowl Disc Data (TKDD). 2007;1(1):3.","journal-title":"ACM Trans Knowl Disc Data (TKDD)"},{"issue":"6","key":"1098_CR2","first-page":"41","volume":"60","author":"JC Duchi","year":"2013","unstructured":"Duchi JC, Jordan MI, Wainwright MJ. Privacy-aware learning. J ACM (JACM). 2013;60(6):41.","journal-title":"J ACM (JACM)"},{"key":"1098_CR3","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H. B., Mironov, I., Talwar, K., & Zhang, L. (2016). Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS'16) (pp. 308\u2013318).","DOI":"10.1145\/2976749.2978318"},{"key":"1098_CR4","unstructured":"Abadi, M., & Andersen, D. G. (2016). Learning to protect communications with adversarial neural cryptography."},{"key":"1098_CR5","doi-asserted-by":"crossref","unstructured":"Chandramohan, D., Vengattaraman, T., Rajaguru, D., Baskaran, R., &Dhavachelvan, P. (2013). Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information. IEEE.","DOI":"10.1109\/ICGHPC.2013.6533904"},{"issue":"21","key":"1098_CR6","doi-asserted-by":"publisher","first-page":"2792","DOI":"10.3390\/math9212792","volume":"9","author":"Z Chen","year":"2021","unstructured":"Chen Z, Hu G, Zheng M, Song X, Chen L. Bibliometrics of machine learning research using homomorphic encryption. Mathematics. 2021;9(21):2792. https:\/\/doi.org\/10.3390\/math9212792.","journal-title":"Mathematics"},{"key":"1098_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2019.103291","volume":"99","author":"L Huang","year":"2019","unstructured":"Huang L, Shea AL, Qian H, Masurkar A, Deng H, Liu D. Patient clustering improves efficiency of federated machine learning to predict mortality and hospital stay time using distributed electronic medical records. J Biomed Inform. 2019;99: 103291. https:\/\/doi.org\/10.1016\/j.jbi.2019.103291.","journal-title":"J Biomed Inform"},{"key":"1098_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102769","volume":"171","author":"Y Fan","year":"2020","unstructured":"Fan Y, Bai J, Lei X, Zhang Y, Zhang B, Li KC, Tan G. Privacy preserving based logistic regression on big data. J Netw Comput Appl. 2020;171: 102769. https:\/\/doi.org\/10.1016\/j.jnca.2020.102769.","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"1098_CR9","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1515\/jmc-2019-0026","volume":"14","author":"C Boura","year":"2020","unstructured":"Boura C, Gama N, Georgieva M, Jetchev D. Chimera: Combining ring-lwe-based fully homomorphic encryption schemes. J Mathe Cryptol. 2020;14(1):316\u201338. https:\/\/doi.org\/10.1515\/jmc-2019-0026.","journal-title":"J Mathe Cryptol"},{"key":"1098_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.comcom.2020.10.022","volume":"165","author":"W Ren","year":"2021","unstructured":"Ren W, Tong X, Du J, Wang N, Li SC, Min G, Zhao Z, Bashir AK. Privacy-preserving using homomorphic encryption in Mobile IoT systems. Comput Commun. 2021;165:105\u201311. https:\/\/doi.org\/10.1016\/j.comcom.2020.10.022.","journal-title":"Comput Commun"},{"key":"1098_CR11","doi-asserted-by":"publisher","first-page":"132084","DOI":"10.1109\/ACCESS.2021.3114581","volume":"9","author":"JMS Paul","year":"2021","unstructured":"Paul JMS, Annamalai MSMS, Ming W, Badawi AA, Veeravalli B, Aung KMM. Privacy-preserving collective learning with homomorphic encryption. In IEEE Access. 2021;9:132084\u201396. https:\/\/doi.org\/10.1109\/ACCESS.2021.3114581.","journal-title":"In IEEE Access"},{"key":"1098_CR12","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.future.2020.07.023","volume":"113","author":"X Guo","year":"2020","unstructured":"Guo X, Lin H, Wu Y, Peng M. A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems. Futur Gener Comput Syst. 2020;113:407\u201317. https:\/\/doi.org\/10.1016\/j.future.2020.07.023.","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"1098_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3394658","volume":"53","author":"A Wood","year":"2021","unstructured":"Wood A, Najarian K, Kahrobaei D. Homomorphic encryption for machine learning in medicine and bioinformatics. ACM Comput Surv. 2021;53(4):1\u201335. https:\/\/doi.org\/10.1145\/3394658.","journal-title":"ACM Comput Surv"},{"key":"1098_CR14","doi-asserted-by":"publisher","first-page":"93097","DOI":"10.1109\/ACCESS.2021.3093005","volume":"9","author":"E Sarkar","year":"2021","unstructured":"Sarkar E, Chielle E, G\u00fcrsoy G, Mazonka O, Gerstein M, Maniatakos M. Fast and scalable private genotype imputation using machine learning and partially homomorphic encryption. In IEEE Access. 2021;9:93097\u2013110. https:\/\/doi.org\/10.1109\/ACCESS.2021.3093005.","journal-title":"In IEEE Access"},{"issue":"1","key":"1098_CR15","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1186\/s12910-022-00852-2","volume":"23","author":"J Scheibner","year":"2022","unstructured":"Scheibner J, Ienca M, Vayena E. Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study. BMC Med Ethics. 2022;23(1):121. https:\/\/doi.org\/10.1186\/s12910-022-00852-2.","journal-title":"BMC Med Ethics"},{"issue":"18","key":"1098_CR16","doi-asserted-by":"publisher","first-page":"8757","DOI":"10.3390\/app11188757","volume":"11","author":"MM Salim","year":"2021","unstructured":"Salim MM, Kim I, Doniyor U, Lee C, Park JH. Homomorphic encryption based privacy-preservation for IoMT. Appl Sci. 2021;11(18):8757. https:\/\/doi.org\/10.3390\/app11188757.","journal-title":"Appl Sci"},{"issue":"5","key":"1098_CR17","doi-asserted-by":"publisher","first-page":"2864","DOI":"10.1109\/TNSE.2022.3185327","volume":"10","author":"L Zhang","year":"2022","unstructured":"Zhang L, Xu J, Vijayakumar P, Sharma PK, Ghosh U. Homomorphic encryption-based privacy-preserving federated learning in iot-enabled healthcare system. IEEE Trans Network Sci Eng. 2022;10(5):2864\u201380. https:\/\/doi.org\/10.1109\/TNSE.2022.3185327.","journal-title":"IEEE Trans Network Sci Eng"},{"key":"1098_CR18","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ins.2020.03.041","volume":"526","author":"J Li","year":"2020","unstructured":"Li J, Kuang X, Lin S, Ma X, Tang Y. Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf Sci. 2020;526:166\u201379. https:\/\/doi.org\/10.1016\/j.ins.2020.03.041.","journal-title":"Inf Sci"},{"key":"1098_CR19","volume-title":"Logistic regression and logistic regression-genetic algorithm for classification of liver cancer data","author":"VVP Wibowo","year":"2021","unstructured":"Wibowo VVP, Rustam Z, Laeli AR. Logistic regression and logistic regression-genetic algorithm for classification of liver cancer data. New York: IEEE Publications; 2021."},{"key":"1098_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/1321198","volume":"2022","author":"X Yu","year":"2022","unstructured":"Yu X, Zhao W, Huang Y, Ren J, Tang D. Privacy-preserving outsourced logistic regression on encrypted data from homomorphic encryption. Sec Commun Networks. 2022;2022:1\u201317. https:\/\/doi.org\/10.1155\/2022\/1321198.","journal-title":"Sec Commun Networks"},{"issue":"Suppl. 7","key":"1098_CR21","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1186\/s12920-020-0723-0","volume":"13","author":"S Carpov","year":"2020","unstructured":"Carpov S, Gama N, Georgieva M, Troncoso-Pastoriza JR. Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption. BMC Med Genomics. 2020;13(Suppl. 7):88. https:\/\/doi.org\/10.1186\/s12920-020-0723-0.","journal-title":"BMC Med Genomics"},{"issue":"1","key":"1098_CR22","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1186\/s12911-022-01811-y","volume":"22","author":"AR Ghavamipour","year":"2022","unstructured":"Ghavamipour AR, Turkmen F, Jiang X. Privacy-preserving logistic regression with secret sharing. BMC Med Inform Decis Mak. 2022;22(1):89. https:\/\/doi.org\/10.1186\/s12911-022-01811-y.","journal-title":"BMC Med Inform Decis Mak"},{"key":"1098_CR23","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.future.2023.02.022","volume":"144","author":"Y Zhou","year":"2023","unstructured":"Zhou Y, Song L, Liu Y, Vijayakumar P, Gupta BB, Alhalabi W, Alsharif H. A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare. Futur Gener Comput Syst. 2023;144:63\u201373. https:\/\/doi.org\/10.1016\/j.future.2023.02.022.","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"1098_CR24","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1007\/s12083-020-01017-x","volume":"14","author":"Q Wei","year":"2021","unstructured":"Wei Q, Li Q, Zhou Z, Ge Z, Zhang Y. Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing. Peer-to-Peer Networking Appl. 2021;14(3):1379\u201387. https:\/\/doi.org\/10.1007\/s12083-020-01017-x.","journal-title":"Peer-to-Peer Networking Appl"},{"key":"1098_CR25","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TIFS.2019.2925496","volume":"15","author":"M Kim","year":"2019","unstructured":"Kim M, Lee J, Ohno-Machado L, Jiang X. Secure and differentially private logistic regression for horizontally distributed data. IEEE Trans Inf Forensics Secur. 2019;15:695\u2013710. https:\/\/doi.org\/10.1109\/TIFS.2019.2925496.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1098_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.372","author":"VVL Divakar Allavarpu","year":"2024","unstructured":"Divakar Allavarpu VVL, Naresh VS, Krishna Mohan A. Privacy-preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud. Security Privacy. 2024. https:\/\/doi.org\/10.1002\/spy2.372.","journal-title":"Security Privacy"},{"key":"1098_CR27","unstructured":"Dataset: https:\/\/www.kaggle.com\/datasets\/johnsmith88\/heart-disease-dataset"},{"key":"1098_CR28","doi-asserted-by":"crossref","unstructured":"Aono, Y., Hayashi, T., Trieu Phong, L., & Wang, L. (2016). Scalable and secure logistic regression via homomorphic encryption. In\u00a0Proceedings of the sixth ACM conference on data and application security and privacy\u00a0(pp. 142\u2013144).","DOI":"10.1145\/2857705.2857731"},{"key":"1098_CR29","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s12920-018-0397-z","volume":"11","author":"H Chen","year":"2018","unstructured":"Chen H, Gilad-Bachrach R, Han K, Huang Z, Jalali A, Laine K, Lauter K. Logistic regression over encrypted data from fully homomorphic encryption. BMC Med Genomics. 2018;11:3\u201312.","journal-title":"BMC Med Genomics"},{"issue":"4","key":"1098_CR30","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/LNET.2022.3200724","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Makkar A, Singh AK. Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Networking Lett. 2022;4(4):174\u20138.","journal-title":"IEEE Networking Lett"},{"issue":"2","key":"1098_CR31","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1109\/JSYST.2022.3218894","volume":"17","author":"R Gupta","year":"2022","unstructured":"Gupta R, Gupta I, Singh AK, Saxena D, Lee CN. An iot-centric data protection method for preserving security and privacy in cloud. IEEE Syst J. 2022;17(2):2445\u201354.","journal-title":"IEEE Syst J"},{"issue":"4","key":"1098_CR32","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Singh AK. Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Networking Letters. 2022;4(4):217\u201321.","journal-title":"IEEE Networking Letters"},{"issue":"3","key":"1098_CR33","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s00354-022-00185-z","volume":"40","author":"R Gupta","year":"2022","unstructured":"Gupta R, Singh AK. A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. New Gen Comput. 2022;40(3):737\u201364.","journal-title":"New Gen Comput"},{"issue":"23","key":"1098_CR34","doi-asserted-by":"publisher","first-page":"33127","DOI":"10.1007\/s11042-021-11751-w","volume":"81","author":"AK Singh","year":"2022","unstructured":"Singh AK, Gupta R. A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimed Tools Appl. 2022;81(23):33127\u201350.","journal-title":"Multimed Tools Appl"},{"key":"1098_CR35","unstructured":"Dataset: https:\/\/www.kaggle.com\/datasets\/aasheesh200\/framingham-heart-study-dataset"},{"key":"1098_CR36","unstructured":"Dataset: https:\/\/www.kaggle.com\/datasets\/shubamsumbria\/statlog-heart-data-set"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01098-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01098-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01098-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T12:53:52Z","timestamp":1740747232000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01098-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,27]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1098"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01098-6","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,27]]},"assertion":[{"value":"10 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable\u2019.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to Participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"52"}}