Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 20 de 8.744
Filter
1.
Sci Eng Ethics ; 30(4): 28, 2024 Jul 16.
Article in English | MEDLINE | ID: mdl-39012561

ABSTRACT

The rapidly advancing field of brain-computer (BCI) and brain-to-brain interfaces (BBI) is stimulating interest across various sectors including medicine, entertainment, research, and military. The developers of large-scale brain-computer networks, sometimes dubbed 'Mindplexes' or 'Cloudminds', aim to enhance cognitive functions by distributing them across expansive networks. A key technical challenge is the efficient transmission and storage of information. One proposed solution is employing blockchain technology over Web 3.0 to create decentralised cognitive entities. This paper explores the potential of a decentralised web for coordinating large brain-computer constellations, and its associated benefits, focusing in particular on the conceptual and ethical challenges this innovation may pose pertaining to (1) Identity, (2) Sovereignty (encompassing Autonomy, Authenticity, and Ownership), (3) Responsibility and Accountability, and (4) Privacy, Safety, and Security. We suggest that while a decentralised web can address some concerns and mitigate certain risks, underlying ethical issues persist. Fundamental questions about entity definition within these networks, the distinctions between individuals and collectives, and responsibility distribution within and between networks, demand further exploration.


Subject(s)
Brain-Computer Interfaces , Internet , Personal Autonomy , Privacy , Humans , Brain-Computer Interfaces/ethics , Social Responsibility , Blockchain/ethics , Computer Security/ethics , Ownership/ethics , Politics , Cognition , Safety , Technology/ethics
2.
Front Public Health ; 12: 1414076, 2024.
Article in English | MEDLINE | ID: mdl-39022418

ABSTRACT

While healthcare big data brings great opportunities and convenience to the healthcare industry, it also inevitably raises the issue of privacy leakage. Nowadays, the whole world is facing the security threat of healthcare big data, for which a sound policy framework can help reduce privacy risks of healthcare big data. In recent years, the Chinese government and industry self-regulatory organizations have issued a series of policy documents to reduce privacy risks of healthcare big data. However, China's policy framework suffers from the drawbacks of the mismatched operational model, the inappropriate operational method, and the poorly actionable operational content. Based on the experiences of the European Union, Australia, the United States, and other extra-territorial regions, strategies are proposed for China to amend the operational model of the policy framework, improve the operational method of the policy framework, and enhance the operability of the operational content of the policy framework. This study enriches the research on China's policy framework to reduce privacy risks of healthcare big data and provides some inspiration for other countries.


Subject(s)
Big Data , Health Policy , China , Humans , Privacy , Confidentiality , Computer Security
3.
J Law Med Ethics ; 52(S1): 70-74, 2024.
Article in English | MEDLINE | ID: mdl-38995251

ABSTRACT

Here, we analyze the public health implications of recent legal developments - including privacy legislation, intergovernmental data exchange, and artificial intelligence governance - with a view toward the future of public health informatics and the potential of diverse data to inform public health actions and drive population health outcomes.


Subject(s)
Artificial Intelligence , Humans , Artificial Intelligence/legislation & jurisprudence , United States , Confidentiality/legislation & jurisprudence , Public Health Informatics/legislation & jurisprudence , Public Health/legislation & jurisprudence , Privacy/legislation & jurisprudence
4.
Sci Rep ; 14(1): 15763, 2024 Jul 09.
Article in English | MEDLINE | ID: mdl-38982129

ABSTRACT

The timely identification of autism spectrum disorder (ASD) in children is imperative to prevent potential challenges as they grow. When sharing data related to autism for an accurate diagnosis, safeguarding its security and privacy is a paramount concern to fend off unauthorized access, modification, or theft during transmission. Researchers have devised diverse security and privacy models or frameworks, most of which often leverage proprietary algorithms or adapt existing ones to address data leakage. However, conventional anonymization methods, although effective in the sanitization process, proved inadequate for the restoration process. Furthermore, despite numerous scholarly contributions aimed at refining the restoration process, the accuracy of restoration remains notably deficient. Based on the problems identified above, this paper presents a novel approach to data restoration for sanitized sensitive autism datasets with improved performance. In the prior study, we constructed an optimal key for the sanitization process utilizing the proposed Enhanced Combined PSO-GWO framework. This key was implemented to conceal sensitive autism data in the database, thus avoiding information leakage. In this research, the same key was employed during the data restoration process to enhance the accuracy of the original data recovery. Therefore, the study enhanced the restoration process for ASD data's security and privacy by utilizing an optimal key produced via the Enhanced Combined PSO-GWO framework. When compared to existing meta-heuristic algorithms, the simulation results from the autism data restoration experiments demonstrated highly competitive accuracies with 99.90%, 99.60%, 99.50%, 99.25%, and 99.70%, respectively. Among the four types of datasets used, this method outperforms other existing methods on the 30-month autism children dataset, mostly.


Subject(s)
Algorithms , Autism Spectrum Disorder , Databases, Factual , Humans , Autistic Disorder/diagnosis , Computer Security , Child , Privacy
7.
Hastings Cent Rep ; 54(3): 2, 2024 May.
Article in English | MEDLINE | ID: mdl-38842868

ABSTRACT

The privacy of the dead is an interesting area of concern for bioethicists. There is a legal doctrine that the dead can't have privacy rights, but also a body of contrary law ascribing privacy rights to the deceased and kin in relation to the deceased. As women's abortion privacy is under assault by American courts and legislatures, the implications of ascribing privacy rights to embryos and fetuses is more important than ever. Caution is called for in this domain.


Subject(s)
Abortion, Induced , Privacy , Humans , Female , United States , Abortion, Induced/legislation & jurisprudence , Abortion, Induced/ethics , Privacy/legislation & jurisprudence , Pregnancy , Abortion, Legal/legislation & jurisprudence , Abortion, Legal/ethics
8.
J Law Health ; 37(2): 105-126, 2024.
Article in English | MEDLINE | ID: mdl-38833598

ABSTRACT

Concern about individual rights and the desire to protect them has been part of our nation since its founding, and continues to be so today. The Ninth Amendment was created to assuage the Framers' concerns that enumerating some rights in the Bill of Rights would leave unenumerated rights unrecognized and unprotected, affirming that those rights are not disparaged or denied by their lack of textual support. The Ninth Amendment has appeared infrequently in our jurisprudence, and Courts initially construed it rather narrowly. But starting in the 1960s, the Ninth Amendment emerged as a powerful tool not just for recognizing unanticipated rights, but for protecting or expanding even enumerated rights. The right to privacy--encompassing the right to contraception and abortion--the right to preserve the integrity of your family, the right to vote, the right to own a firearm as an individual--all these rights have been asserted under and found to be supported by the Ninth Amendment. In its Dobbs v. Jackson Women's Health decision overturning Roe, the Supreme Court found that there is no right to abortion because it is not in the Constitution. But the potential of the Ninth Amendment is such that reproductive choice need not be mentioned in the Constitution to be protected. Reproductive choice may rightfully be considered as part of a right to privacy, an unenumerated right that nevertheless has abundant precedent behind it. The Ninth Amendment, and its counterparts found in many state constitutions, has the power to protect not just reproductive choice, but all of our fundamental rights.


Subject(s)
Reproductive Rights , Humans , United States , Female , Reproductive Rights/legislation & jurisprudence , Privacy/legislation & jurisprudence , Supreme Court Decisions , Abortion, Induced/legislation & jurisprudence , Contraception , Women's Rights/legislation & jurisprudence , Pregnancy , Abortion, Legal/legislation & jurisprudence
9.
J Law Health ; 37(2): 187-213, 2024.
Article in English | MEDLINE | ID: mdl-38833601

ABSTRACT

Since the overturning of prior abortion precedents in Dobbs v. Jackson Women's Health Organization, there has been a question on the minds of many women in this country: how will this decision affect me and my rights? As we have seen in the aftermath of Dobbs, many states have pushed for stringent anti-abortion measures seeking to undermine the foundation on which women's reproductive freedom had been grounded on for decades. This includes right here in Ohio, where Republican lawmakers have advocated on numerous occasions for implementing laws seeking to limit abortion rights, including a 6-week abortion ban advocated for and passed by the Ohio Republican legislature and signed into law by Ohio Governor Mike DeWine. Despite this particular ban being successfully challenged and stayed, significant problems persist regarding due process rights for women in Ohio, particularly in the aftermath of Justice Thomas's concurrence in Dobbs advising the Court to revisit prior precedents, such as Griswold v. Connecticut providing for the right to contraception. If the Court were to revisit and strike down Griswold, it would further undermine privacy and due process rights that have been granted to women across this country, including here in Ohio, for decades. Justice Thomas's concurrence, while merely dicta, encapsulates a Court that has become increasingly hostile to treasured fundamental rights for women, a hostility mirrored in numerous Republican legislatures, including right here in Ohio.


Subject(s)
Women's Rights , Humans , Ohio , Female , Women's Rights/legislation & jurisprudence , Pregnancy , Privacy/legislation & jurisprudence , Abortion, Induced/legislation & jurisprudence
10.
BMC Med Inform Decis Mak ; 24(1): 167, 2024 Jun 14.
Article in English | MEDLINE | ID: mdl-38877563

ABSTRACT

BACKGROUND: Consider a setting where multiple parties holding sensitive data aim to collaboratively learn population level statistics, but pooling the sensitive data sets is not possible due to privacy concerns and parties are unable to engage in centrally coordinated joint computation. We study the feasibility of combining privacy preserving synthetic data sets in place of the original data for collaborative learning on real-world health data from the UK Biobank. METHODS: We perform an empirical evaluation based on an existing prospective cohort study from the literature. Multiple parties were simulated by splitting the UK Biobank cohort along assessment centers, for which we generate synthetic data using differentially private generative modelling techniques. We then apply the original study's Poisson regression analysis on the combined synthetic data sets and evaluate the effects of 1) the size of local data set, 2) the number of participating parties, and 3) local shifts in distributions, on the obtained likelihood scores. RESULTS: We discover that parties engaging in the collaborative learning via shared synthetic data obtain more accurate estimates of the regression parameters compared to using only their local data. This finding extends to the difficult case of small heterogeneous data sets. Furthermore, the more parties participate, the larger and more consistent the improvements become up to a certain limit. Finally, we find that data sharing can especially help parties whose data contain underrepresented groups to perform better-adjusted analysis for said groups. CONCLUSIONS: Based on our results we conclude that sharing of synthetic data is a viable method for enabling learning from sensitive data without violating privacy constraints even if individual data sets are small or do not represent the overall population well. Lack of access to distributed sensitive data is often a bottleneck in biomedical research, which our study shows can be alleviated with privacy-preserving collaborative learning methods.


Subject(s)
Information Dissemination , Humans , United Kingdom , Cooperative Behavior , Confidentiality/standards , Privacy , Biological Specimen Banks , Prospective Studies
11.
BMC Med Inform Decis Mak ; 24(1): 162, 2024 Jun 12.
Article in English | MEDLINE | ID: mdl-38915012

ABSTRACT

Many state-of-the-art results in natural language processing (NLP) rely on large pre-trained language models (PLMs). These models consist of large amounts of parameters that are tuned using vast amounts of training data. These factors cause the models to memorize parts of their training data, making them vulnerable to various privacy attacks. This is cause for concern, especially when these models are applied in the clinical domain, where data are very sensitive. Training data pseudonymization is a privacy-preserving technique that aims to mitigate these problems. This technique automatically identifies and replaces sensitive entities with realistic but non-sensitive surrogates. Pseudonymization has yielded promising results in previous studies. However, no previous study has applied pseudonymization to both the pre-training data of PLMs and the fine-tuning data used to solve clinical NLP tasks. This study evaluates the effects on the predictive performance of end-to-end pseudonymization of Swedish clinical BERT models fine-tuned for five clinical NLP tasks. A large number of statistical tests are performed, revealing minimal harm to performance when using pseudonymized fine-tuning data. The results also find no deterioration from end-to-end pseudonymization of pre-training and fine-tuning data. These results demonstrate that pseudonymizing training data to reduce privacy risks can be done without harming data utility for training PLMs.


Subject(s)
Natural Language Processing , Humans , Privacy , Sweden , Anonyms and Pseudonyms , Computer Security/standards , Confidentiality/standards , Electronic Health Records/standards
12.
Comput Biol Med ; 177: 108646, 2024 Jul.
Article in English | MEDLINE | ID: mdl-38824788

ABSTRACT

Improved data sharing between healthcare providers can lead to a higher probability of accurate diagnosis, more effective treatments, and enhanced capabilities of healthcare organizations. One critical area of focus is brain tumor segmentation, a complex task due to the heterogeneous appearance, irregular shape, and variable location of tumors. Accurate segmentation is essential for proper diagnosis and effective treatment planning, yet current techniques often fall short due to these complexities. However, the sensitive nature of health data often prohibits its sharing. Moreover, the healthcare industry faces significant issues, including preserving the privacy of the model and instilling trust in the model. This paper proposes a framework to address these privacy and trust issues by introducing a mechanism for training the global model using federated learning and sharing the encrypted learned parameters via a permissioned blockchain. The blockchain-federated learning algorithm we designed aggregates gradients in the permissioned blockchain to decentralize the global model, while the introduced masking approach retains the privacy of the model parameters. Unlike traditional raw data sharing, this approach enables hospitals or medical research centers to contribute to a globally learned model, thereby enhancing the performance of the central model for all participating medical entities. As a result, the global model can learn about several specific diseases and benefit each contributor with new disease diagnosis tasks, leading to improved treatment options. The proposed algorithm ensures the quality of model data when aggregating the local model, using an asynchronous federated learning procedure to evaluate the shared model's quality. The experimental results demonstrate the efficacy of the proposed scheme for the critical and challenging task of brain tumor segmentation. Specifically, our method achieved a 1.99% improvement in Dice similarity coefficient for enhancing tumors and a 19.08% reduction in Hausdorff distance for whole tumors compared to the baseline methods, highlighting the significant advancement in segmentation performance and reliability.


Subject(s)
Algorithms , Brain Neoplasms , Humans , Brain Neoplasms/diagnostic imaging , Blockchain , Machine Learning , Privacy , Magnetic Resonance Imaging/methods
13.
Sci Rep ; 14(1): 13243, 2024 06 09.
Article in English | MEDLINE | ID: mdl-38853152

ABSTRACT

Although the number of older adults requiring care is rapidly increasing, nursing homes have long faced issues such as the absence of a home-like environment. This exploratory mixed-method study investigated how residents (n = 15) in a long-term care unit in South Korea perceive home-like features and privacy in their living spaces. The results indicated that most participants were satisfied with the homeliness and privacy of their environment, but some were unhappy with the level of privacy. Most participants had low scores on the Geriatric Depression Scale and the Pittsburgh Sleep Quality Index, indicating low levels of depression and sleep disorders. Sleep quality was affected by factors such as sensory environment, staff visits, and room temperature. Although participants appreciated social support and private rooms, they expressed a desire for larger rooms. Overall, this study provides preliminary insights into older adults' views on their living spaces in long-term care with implications for improving their quality of life.


Subject(s)
Long-Term Care , Nursing Homes , Quality of Life , Humans , Female , Male , Aged , Aged, 80 and over , Republic of Korea , Privacy , Sleep Quality , Home Environment , Depression , Surveys and Questionnaires
14.
PLoS One ; 19(5): e0304446, 2024.
Article in English | MEDLINE | ID: mdl-38814927

ABSTRACT

In privacy protection methods based on location services, constructing anonymous areas using location information shared by collaborative users is the main method. However, this collaborative process not only increases the risk of mobile users' location privacy being leaked, but also reduces positioning accuracy. In response to this problem, we propose a balancing strategy, which transforms the problem of protecting mobile users' location privacy and improving positioning accuracy into a balance issue between location privacy and positioning accuracy. The cooperation of mobile users with different collaborating users is then modeled as an objective optimization problem, and location privacy and positioning accuracy are evaluated separately to make different selection strategies. Finally, an optimization function is constructed to select the optimal selection strategies. Experimental results show that our proposed strategy can effectively achieve the balance between location privacy and positioning accuracy.


Subject(s)
Privacy , Humans , Algorithms , Models, Theoretical , Geographic Information Systems
15.
Am J Manag Care ; 30(6 Spec No.): SP459-SP463, 2024 May.
Article in English | MEDLINE | ID: mdl-38820187

ABSTRACT

OBJECTIVE: To examine patient and provider perspectives on privacy and security considerations in telemedicine during the COVID-19 pandemic. STUDY DESIGN: Qualitative study with patients and providers from primary care practices in 3 National Patient-Centered Clinical Research Network sites in New York, New York; North Carolina; and Florida. METHODS: Semistructured interviews were conducted, audio recorded, transcribed verbatim, and coded using an inductive process. Data related to privacy and information security were analyzed. RESULTS: Sixty-five patients and 21 providers participated. Patients and providers faced technology-related security concerns as well as difficulties ensuring privacy in the transformed shared space of telemedicine. Patients expressed increased comfort doing telemedicine from home but often did not like their providers to offer virtual visits from outside an office setting. Providers initially struggled to find secure and Health Insurance Portability and Accountability Act-compliant platforms and devices to host the software. Whereas some patients preferred familiar platforms such as FaceTime, others recognized potential security concerns. Audio-only encounters sometimes raised patient concerns that they would not be able to confirm the identity of the provider. CONCLUSIONS: Telemedicine led to novel concerns about privacy because patients and providers were often at home or in public spaces, and they shared concerns about software and hardware security. In addition to technological safeguards, our study emphasizes the critical role of physical infrastructure in ensuring privacy and security. As telemedicine continues to evolve, it is important to address and mitigate concerns around privacy and security to ensure high-quality and safe delivery of care to patients in remote settings.


Subject(s)
COVID-19 , Computer Security , Primary Health Care , Telemedicine , Humans , Telemedicine/organization & administration , Primary Health Care/organization & administration , Female , Male , Middle Aged , Confidentiality , Adult , Qualitative Research , Privacy , SARS-CoV-2 , United States , Aged , Health Insurance Portability and Accountability Act
16.
Cien Saude Colet ; 29(5): e15552022, 2024 May.
Article in English | MEDLINE | ID: mdl-38747777

ABSTRACT

The conceptions, values, and experiences of students from public and private high schools in two Brazilian state capitals, Vitória-ES and Campo Grande-MS, were analyzed regarding digital control and monitoring between intimate partners and the unauthorized exposure of intimate material on the Internet. Data from eight focus groups with 77 adolescents were submitted to thematic analysis, complemented by a questionnaire answered by a sample of 530 students. Most students affirmed that they do not tolerate the control/monitoring and unauthorized exposure of intimate materials but recognized that such activity is routine. They point out jealousy, insecurity, and "curiosity" as their main reasons. They detail the various dynamics of unauthorized exposure of intimate material and see it as a severe invasion of privacy and a breach of trust between partners. Their accounts suggest that such practices are gender violence. They also reveal that each platform has its cultural appropriation and that platforms used by the family, such as Facebook, cause more significant damage to the victim's reputation.


Subject(s)
Focus Groups , Sexual Partners , Students , Humans , Brazil , Adolescent , Female , Male , Surveys and Questionnaires , Students/psychology , Sexual Partners/psychology , Internet , Intimate Partner Violence/statistics & numerical data , Privacy , Gender-Based Violence , Interpersonal Relations , Jealousy , Schools , Young Adult
17.
Sensors (Basel) ; 24(10)2024 May 11.
Article in English | MEDLINE | ID: mdl-38793906

ABSTRACT

Smartwatch health sensor data are increasingly utilized in smart health applications and patient monitoring, including stress detection. However, such medical data often comprise sensitive personal information and are resource-intensive to acquire for research purposes. In response to this challenge, we introduce the privacy-aware synthetization of multi-sensor smartwatch health readings related to moments of stress, employing Generative Adversarial Networks (GANs) and Differential Privacy (DP) safeguards. Our method not only protects patient information but also enhances data availability for research. To ensure its usefulness, we test synthetic data from multiple GANs and employ different data enhancement strategies on an actual stress detection task. Our GAN-based augmentation methods demonstrate significant improvements in model performance, with private DP training scenarios observing an 11.90-15.48% increase in F1-score, while non-private training scenarios still see a 0.45% boost. These results underline the potential of differentially private synthetic data in optimizing utility-privacy trade-offs, especially with the limited availability of real training samples. Through rigorous quality assessments, we confirm the integrity and plausibility of our synthetic data, which, however, are significantly impacted when increasing privacy requirements.


Subject(s)
Privacy , Wearable Electronic Devices , Humans , Monitoring, Physiologic/methods , Monitoring, Physiologic/instrumentation , Algorithms
18.
PLoS One ; 19(5): e0302924, 2024.
Article in English | MEDLINE | ID: mdl-38758778

ABSTRACT

Online research methods have grown in popularity due in part to the globalised and far-reaching nature of the internet but also linked to the Covid-19 pandemic whereby restrictions to travel and face to face contact necessitated a shift in methods of research recruitment and data collection. Ethical guidance exists to support researchers in conducting online research, however this is lacking within health fields. This scoping review aims to synthesise formal ethical guidance for applying online methods within health research as well as provide examples of where guidance has been used. A systematic search of literature was conducted, restricted to English language records between 2013 and 2022. Eligibility focused on whether the records were providing ethical guidance or recommendations, were situated or relevant to health disciplines, and involved the use or discussion of online research methods. Following exclusion of ineligible records and duplicate removal, three organisational ethical guidance and 24 research papers were charted and thematically analysed. Four key themes were identified within the guidance documents, 1) consent, 2) confidentiality and privacy, 3) protecting participants from harm and 4) protecting researchers from harm with the research papers describing additional context and understanding around these issues. The review identified that there are currently no specific guidelines aimed at health researchers, with the most cited guidance coming from broader methodological perspectives and disciplines or auxiliary fields. All guidance discussed each of the four key themes within the wider context of sensitive topics and vulnerable populations, areas and issues which are often prominent within health research thus highlighting the need for unifying guidance specific for health researchers. Further research should aim to understand better how online health studies apply ethical principles, to support in informing gaps across both research and guidance.


Subject(s)
Internet , Humans , COVID-19/epidemiology , Confidentiality/ethics , Informed Consent/ethics , Privacy , SARS-CoV-2 , Biomedical Research/ethics , Pandemics , Guidelines as Topic , Ethics, Research
19.
JMIR Nurs ; 7: e53592, 2024 May 09.
Article in English | MEDLINE | ID: mdl-38723253

ABSTRACT

BACKGROUND: Health monitoring technologies help patients and older adults live better and stay longer in their own homes. However, there are many factors influencing their adoption of these technologies. Privacy is one of them. OBJECTIVE: The aim of this study was to provide an overview of the privacy barriers in health monitoring from current research, analyze the factors that influence patients to adopt assisted living technologies, provide a social psychological explanation, and propose suggestions for mitigating these barriers in future research. METHODS: A scoping review was conducted, and web-based literature databases were searched for published studies to explore the available research on privacy barriers in a health monitoring environment. RESULTS: In total, 65 articles met the inclusion criteria and were selected and analyzed. Contradictory findings and results were found in some of the included articles. We analyzed the contradictory findings and provided possible explanations for current barriers, such as demographic differences, information asymmetry, researchers' conceptual confusion, inducible experiment design and its psychological impacts on participants, researchers' confirmation bias, and a lack of distinction among different user roles. We found that few exploratory studies have been conducted so far to collect privacy-related legal norms in a health monitoring environment. Four research questions related to privacy barriers were raised, and an attempt was made to provide answers. CONCLUSIONS: This review highlights the problems of some research, summarizes patients' privacy concerns and legal concerns from the studies conducted, and lists the factors that should be considered when gathering and analyzing people's privacy attitudes.


Subject(s)
Privacy , Humans , Privacy/legislation & jurisprudence , Monitoring, Physiologic/methods
20.
Sci Rep ; 14(1): 11746, 2024 05 23.
Article in English | MEDLINE | ID: mdl-38778050

ABSTRACT

With the rapid development of modern medical technology and the dramatic increase in the amount of medical data, traditional centralized medical information management is facing many challenges. In recent years blockchain, which is a peer-to-peer distributed database, has been increasingly accepted and adopted by different industries and use cases. Key areas of healthcare blockchain applications include electronic medical record (EMR) management, medical device supply chain management, remote condition monitoring, insurance claims and personal health data (PHD) management, among others. Even so, there are a number of challenges in applying blockchain concepts to healthcare and its data, including interoperability, data security privacy, scalability, TPS and so on. While these challenges may hinder the development of blockchain in healthcare scenarios, they can be improved with existing technologies In this paper, we propose a blockchain-based healthcare operations management framework that is combined with the Interplanetary File System (IPFS) for managing EMRs, protects data privacy through a distributed approach while ensuring that this medical ledger is tamper-proof. Doctors act as full nodes, patients can participate in network maintenance either as light nodes or as full nodes, and the hospital acts as the endpoint database of data, i.e., the IPFS node, which saves the arithmetic power of nodes and allows the data stored in the hospitals and departments to be shared with the other organizations that have uploaded the data. Therefore, the integration of blockchain and zero-knowledge proof proposed in this paper helps to protect data privacy and is efficient, better scalable, and more throughput.


Subject(s)
Blockchain , Computer Security , Confidentiality , Electronic Health Records , Humans , Privacy
SELECTION OF CITATIONS
SEARCH DETAIL