{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T19:00:47Z","timestamp":1777057247470,"version":"3.51.4"},"reference-count":32,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,24]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Securing medical records is a significant task in Healthcare communication. The major setback during the transfer of medical data in the electronic medium is the inherent difficulty in preserving data confidentiality and patients\u2019 privacy. The innovation in technology and improvisation in the medical field has given numerous advancements in transferring the medical data with foolproof security. In today\u2019s healthcare industry, federated network operation is gaining significance to deal with distributed network resources due to the efficient handling of privacy issues. The design of a federated security system for healthcare services is one of the intense research topics. This article highlights the importance of federated learning in healthcare. Also, the article discusses the privacy and security issues in communicating the e-health data.<\/jats:p>","DOI":"10.1515\/comp-2022-0230","type":"journal-article","created":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T17:38:35Z","timestamp":1645897115000},"page":"57-65","source":"Crossref","is-referenced-by-count":7,"title":["Security and privacy issues in federated healthcare\u2009\u2013\u2009An overview"],"prefix":"10.1515","volume":"12","author":[{"given":"Jansi Rani","family":"Amalraj","sequence":"first","affiliation":[{"name":"Department of Computer Science, Government Arts College , Coimbatore-641 018 , Tamil Nadu , India"},{"name":"Department of Information Technology, Nirmala College for Women (Autonomous) , Coimbatore-641018 , Tamil Nadu , India"}]},{"given":"Robert","family":"Lourdusamy","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Government Arts College , Coimbatore-641 018 , Tamil Nadu , India"}]}],"member":"374","published-online":{"date-parts":[[2022,2,24]]},"reference":[{"key":"2022081707553235039_j_comp-2022-0230_ref_001","unstructured":"W. Y. B. Lim, N. C. Luong, D. T. Hoang, Y. Jiao, Y. -C. Liang, Q. Yang, et al., \u201cFederated learning in mobile edge networks: A comprehensive survey.\u201d, arXiv preprint arXiv:1909.11875, 2019."},{"key":"2022081707553235039_j_comp-2022-0230_ref_002","unstructured":"EU, Regulation (EU) 2016\/679 of the European parliament and of the council. Retrieved december 26, 2016. 2018 from https:\/\/eur-lex.europa.eu\/legal-content\/en\/txt."},{"key":"2022081707553235039_j_comp-2022-0230_ref_003","doi-asserted-by":"crossref","unstructured":"D. Bogdanov, S. Laur, and J. Willemson, \u201cSharemind: A framework for fast privacy-preserving computations.\u201d, European Symposium on Research in Computer Security, Berlin, Heidelberg, Springer, 2008, pp. 192\u2013206.","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"2022081707553235039_j_comp-2022-0230_ref_004","doi-asserted-by":"crossref","unstructured":"R. Agrawal and R. Srikant, \u201cPrivacy-preserving data mining.\u201d, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 2000, pp. 439\u2013450.","DOI":"10.1145\/335191.335438"},{"key":"2022081707553235039_j_comp-2022-0230_ref_005","unstructured":"R. Rivest, L. Adleman, and M. Dertouzos, \u201cOn data banks and privacy homomorphisms.\u201d Found. Secure Comput. vol. 4, no. 11. pp. 169\u2013180, 1978."},{"key":"2022081707553235039_j_comp-2022-0230_ref_006","doi-asserted-by":"crossref","unstructured":"Q. Yang, Y. Liu, T. Chen, and Y. Tong, \u201cFederated machine learning: Concept and applications.\u201d ACM Trans. Intell. Syst. Technol. (TIST.), vol. 10, no. 2. pp. 1\u201319, 2019.","DOI":"10.1145\/3298981"},{"key":"2022081707553235039_j_comp-2022-0230_ref_007","unstructured":"Q. Li, Z. Wen, and B. He, \u201cFederated learning systems: Vision, hype and reality for data privacy and protection.\u201d, arXiv preprint arXiv:1907.09693, 2019, T19."},{"key":"2022081707553235039_j_comp-2022-0230_ref_008","doi-asserted-by":"crossref","unstructured":"K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H. Brendan McMahan, S. Patel, et al., \u201cPractical secure aggregation for privacy-preserving machine learning.\u201d Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175\u20131191.","DOI":"10.1145\/3133956.3133982"},{"key":"2022081707553235039_j_comp-2022-0230_ref_009","unstructured":"Y. Liu, T. Chen, and Q. Yang, \u201cSecure federated transfer learning.\u201d, arXiv preprint arXiv:1812.03337, 2018."},{"key":"2022081707553235039_j_comp-2022-0230_ref_010","unstructured":"D. Chai, L. Wang, K. Chen, and Q. Yang, \u201cSecure Federated Matrix Factorization.\u201d, arXiv preprint arXiv:1906.0, 2019, 5108."},{"key":"2022081707553235039_j_comp-2022-0230_ref_011","unstructured":"S. Hardy, W. Henecka, H. Ivey-Law, R. Nock, G. Patrini, G. Smith, et al., \u201cPrivate federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption.\u201d, arXiv preprint arXiv:1711.10677, 2017."},{"key":"2022081707553235039_j_comp-2022-0230_ref_012","doi-asserted-by":"crossref","unstructured":"R. Shokri, and V. Shmatikov, \u201cPrivacy-preserving deep learning.\u201d, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1310\u20131321.","DOI":"10.1145\/2810103.2813687"},{"key":"2022081707553235039_j_comp-2022-0230_ref_013","unstructured":"H. B. McMahan, D. Ramage, K. Talwar, and L. Zhang., \u201cLearning differentially private recurrent language models.\u201d,  arXiv preprint arXiv:1710.06963, 2017."},{"key":"2022081707553235039_j_comp-2022-0230_ref_014","unstructured":"R. C. Geyer, T. Klein, and M. Nabi, \u201cDifferentially private federated learning: A client level perspective.\u201d,  arXiv preprint arXiv:1712.07557, 2017."},{"key":"2022081707553235039_j_comp-2022-0230_ref_015","unstructured":"Q. Chen, C. Xiang, M. Xue, B. Li, N. Borisov, D. Kaarfar, et al., \u201cDifferentially private data generative models.\u201d,  arXiv preprint arXiv:1812.02274, 2018."},{"key":"2022081707553235039_j_comp-2022-0230_ref_016","unstructured":"K. Cheng, T. Fan, Y. Jin, Y. Liu, T. Chen, and Q. Yang, \u201cSecureboost: A lossless federated learning framework.\u201d arXiv preprint arXiv:1901.08755, 2019."},{"key":"2022081707553235039_j_comp-2022-0230_ref_017","unstructured":"J. Xu and F. Wang, \u201cFederated Learning for Healthcare Informatics.\u201d  arXiv preprint arXiv:1911.06270, 2019."},{"key":"2022081707553235039_j_comp-2022-0230_ref_018","doi-asserted-by":"crossref","unstructured":"M. Sicuranza, M. Ciampi, G. D. Pietro, and C. Esposito, \u201cSecure healthcare data sharing among federated health information systems.\u201d Int. J. Crit. Computer-Based Syst., vol. 4, no. 4. pp. 349\u2013373, 2013.","DOI":"10.1504\/IJCCBS.2013.059023"},{"key":"2022081707553235039_j_comp-2022-0230_ref_019","doi-asserted-by":"crossref","unstructured":"B. Alhaqbani and C. Fidge, \u201cAccess control requirements for processing electronic health records.\u201d, International Conference on Business Process Management, Berlin, Heidelberg, Springer, 2007, pp. 371\u2013382.","DOI":"10.1007\/978-3-540-78238-4_38"},{"key":"2022081707553235039_j_comp-2022-0230_ref_020","doi-asserted-by":"crossref","unstructured":"J. Heurix, M. Karlinger, M. Schrefl, and T. Neubauer, \u201cA hybrid approach integrating encryption and pseudonymization for protecting electronic health records.\u201d Proceedings of the Eighth IASTED International Conference on Biomedical Engineering, 2011, pp. 117\u2013124.","DOI":"10.2316\/P.2011.723-117"},{"key":"2022081707553235039_j_comp-2022-0230_ref_021","doi-asserted-by":"crossref","unstructured":"N. Stolba, M. Banek, and A. M. Tjoa, \u201cThe security issue of federated data warehouses in the area of evidence-based medicine.\u201d First International Conference on Availability, Reliability and Security (ARES'06), IEEE, 2006, p. 11.","DOI":"10.1109\/ARES.2006.132"},{"key":"2022081707553235039_j_comp-2022-0230_ref_022","doi-asserted-by":"crossref","unstructured":"J. Sun, X. Zhu, C. Zhang, and Y. Fang, \u201cHCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare.\u201d 2011 31st International Conference on Distributed Computing Systems, IEEE, 2011, pp. 373\u2013382.","DOI":"10.1109\/ICDCS.2011.83"},{"key":"2022081707553235039_j_comp-2022-0230_ref_023","unstructured":"W. Schneble, and G. Thamilarasu, \u201cAttack Detection Using Federated Learning in Medical Cyber-Physical Systems.\u201d 28th International Conference on Computer Communications and Networks (ICCCN), 2019."},{"key":"2022081707553235039_j_comp-2022-0230_ref_024","unstructured":"T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, \u201cFederated learning: Challenges, methods, and future directions.\u201d,  arXiv preprint arXiv:1908.07873, 2019."},{"key":"2022081707553235039_j_comp-2022-0230_ref_025","unstructured":"A. Bhowmick, J. Duchi, J. Freudiger, G. Kapoor, and R. Rogers, \u201cProtection against reconstruction and its applications in private federated learning.\u201d  arXiv preprint arXiv:1812.00984, 2018."},{"key":"2022081707553235039_j_comp-2022-0230_ref_026","doi-asserted-by":"crossref","unstructured":"K. Bonawitz, V. Ivanov, B. Kreuter, H. Antonio Marcedone, B. McMahan, S. Patel, et al., \u201cPractical secure aggregation for privacy-preserving machine learning.\u201d Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175\u20131191.","DOI":"10.1145\/3133956.3133982"},{"key":"2022081707553235039_j_comp-2022-0230_ref_027","doi-asserted-by":"crossref","unstructured":"Y.-L. Gao, X.-B. Chen, Y.-L. Chen, Y. Sun, X.-X. Niu, and Y.-X. Yang, \u201cA secure cryptocurrency scheme based on post-quantum blockchain.\u201d IEEE Access., vol. 6, pp. 27205\u201327213, 2018.","DOI":"10.1109\/ACCESS.2018.2827203"},{"key":"2022081707553235039_j_comp-2022-0230_ref_028","doi-asserted-by":"crossref","unstructured":"S. Krawczyk, and A. Jain, \u201cSecuring electronic medical records using biometric authentication.\u201d International Conference on Audio-and Video-Based Biometric Person Authentication, Berlin, Heidelberg, Springer, 2005, pp. 1110\u20131119.","DOI":"10.1007\/11527923_115"},{"key":"2022081707553235039_j_comp-2022-0230_ref_029","doi-asserted-by":"crossref","unstructured":"S. Mandapati, S. Kadry, R. L. Kumar, K. Sutham, and O. Thinnukool, \u201cDeep learning model construction for a semi-supervised classification with feature learning.\u201d Complex. & Intell. Syst., pp. 1\u201311, 2022.","DOI":"10.1007\/s40747-022-00641-9"},{"key":"2022081707553235039_j_comp-2022-0230_ref_030","doi-asserted-by":"crossref","unstructured":"S. Sankar, R. Somula, R. L. Kumar, P. Srinivasan, and M. A. Jayanthi, \u201cTrust-Aware Routing Framework for Internet of Things.\u201d Int. J. Knowl. Syst. Sci. (IJKSS), vol. 12, no. 1. pp. 48\u201359, 2021.","DOI":"10.4018\/IJKSS.2021010104"},{"key":"2022081707553235039_j_comp-2022-0230_ref_031","doi-asserted-by":"crossref","unstructured":"I. Abunadi, and R. L. Kumar,  Blockchain and Business Process Management in Health Care, Especially for COVID-19 Cases, Security and Communication Networks, 2021.","DOI":"10.1155\/2021\/2245808"},{"key":"2022081707553235039_j_comp-2022-0230_ref_032","doi-asserted-by":"crossref","unstructured":"F. Khan, B. V. V. Siva Prasad, S. A. Syed, I. Ashraf, and L. K. Ramasamy, An Efficient, Ensemble-Based Classification Framework for Big Medical Data, Big Data, 2021.","DOI":"10.1089\/big.2021.0132"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0230\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0230\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T08:00:13Z","timestamp":1660723213000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0230\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3,16]]},"published-print":{"date-parts":[[2022,3,16]]}},"alternative-id":["10.1515\/comp-2022-0230"],"URL":"https:\/\/doi.org\/10.1515\/comp-2022-0230","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}