Why the search for a privacy-preserving data sharing mechanism is failing.

Nat Comput Sci

SPRING Lab, EPFL, Lausanne, Switzerland.

Published: April 2022

Download full-text PDF

Source
http://dx.doi.org/10.1038/s43588-022-00236-xDOI Listing

Publication Analysis

Top Keywords

search privacy-preserving
4
privacy-preserving data
4
data sharing
4
sharing mechanism
4
mechanism failing
4
search
1
data
1
sharing
1
mechanism
1
failing
1

Similar Publications

In this paper, we introduce ACE, a consent-embedded searchable encryption scheme. ACE enables dynamic consent management by supporting the physical deletion of associated data at the time of consent revocation. This ensures instant real deletion of data, aligning with privacy regulations and preserving individuals' rights.

View Article and Find Full Text PDF

This systematic review investigates the application of federated learning in mental health and human activity recognition. A comprehensive search was conducted to identify studies utilizing federated learning for these domains. The included studies were evaluated based on publication year, task, dataset characteristics, federated learning algorithms, and personalization methods.

View Article and Find Full Text PDF

Private detection of relatives in forensic genomics using homomorphic encryption.

BMC Med Genomics

November 2024

Intel Labs, Intel Corporation, Santa Clara, California, USA.

Background: Forensic analysis heavily relies on DNA analysis techniques, notably autosomal Single Nucleotide Polymorphisms (SNPs), to expedite the identification of unknown suspects through genomic database searches. However, the uniqueness of an individual's genome sequence designates it as Personal Identifiable Information (PII), subjecting it to stringent privacy regulations that can impede data access and analysis, as well as restrict the parties allowed to handle the data. Homomorphic Encryption (HE) emerges as a promising solution, enabling the execution of complex functions on encrypted data without the need for decryption.

View Article and Find Full Text PDF

The introduction of trusted execution environments (TEEs), such as secure enclaves provided by the Intel SGX technology has enabled secure and privacy-preserving computation on the cloud. The stringent resource limitations, such as memory constraints, required by some TEEs necessitates the development of computational approaches with reduced memory usage, such as sketching. One example is the SkSES method for GWAS on a cohort of case and control samples from multiple institutions, which identifies the most significant SNPs in a privacy-preserving manner without disclosing sensitive genotype information to other institutions or the cloud service provider.

View Article and Find Full Text PDF

Assessing the Potential of EEG in Early Detection of Alzheimer's Disease: A Systematic Comprehensive Review (2000-2023).

J Alzheimers Dis Rep

August 2024

Department of Biomedical Engineering, Hygiene Faculty, Medical Branch, Islamic Azad University, Tehran, Iran.

Background: As the prevalence of Alzheimer's disease (AD) grows with an aging population, the need for early diagnosis has led to increased focus on electroencephalography (EEG) as a non-invasive diagnostic tool.

Objective: This review assesses advancements in EEG analysis, including the application of machine learning, for detecting AD from 2000 to 2023.

Methods: Following PRISMA guidelines, a search across major databases resulted in 25 studies that met the inclusion criteria, focusing on EEG's application in AD diagnosis and the use of novel signal processing and machine learning techniques.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!