Cargando…
Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications
Computing model may train on a distributed dataset using Medical Applications, which is a distributed computing technique. Instead of a centralised server, the model trains on device data. The server then utilizes this model to train a joint model. The aim of this study is that Medical Applications...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8856810/ https://www.ncbi.nlm.nih.gov/pubmed/35186118 http://dx.doi.org/10.1155/2022/1201339 |
_version_ | 1784653920943996928 |
---|---|
author | Ahmed, Osman Sirajeldeen Omer, Emad Eldin Alshawwa, Samar Zuhair Alazzam, Malik Bader Khan, Reefat Arefin |
author_facet | Ahmed, Osman Sirajeldeen Omer, Emad Eldin Alshawwa, Samar Zuhair Alazzam, Malik Bader Khan, Reefat Arefin |
author_sort | Ahmed, Osman Sirajeldeen |
collection | PubMed |
description | Computing model may train on a distributed dataset using Medical Applications, which is a distributed computing technique. Instead of a centralised server, the model trains on device data. The server then utilizes this model to train a joint model. The aim of this study is that Medical Applications claims no data is transferred, thereby protecting privacy. Botnet assaults are identified through deep autoencoding and decentralised traffic analytics. Rather than enabling data to be transmitted or relocated off the network edge, the problem of the study is in privacy and security in Medical Applications strategies. Computation will be moved to the edge layer to achieve previously centralised outcomes while boosting data security. Study Results in our suggested model detects anomalies with up to 98 percent accuracy utilizing MAC IP and source/destination/IP for training. Our method beats a traditional centrally controlled system in terms of attack detection accuracy. |
format | Online Article Text |
id | pubmed-8856810 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-88568102022-02-19 Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications Ahmed, Osman Sirajeldeen Omer, Emad Eldin Alshawwa, Samar Zuhair Alazzam, Malik Bader Khan, Reefat Arefin Appl Bionics Biomech Research Article Computing model may train on a distributed dataset using Medical Applications, which is a distributed computing technique. Instead of a centralised server, the model trains on device data. The server then utilizes this model to train a joint model. The aim of this study is that Medical Applications claims no data is transferred, thereby protecting privacy. Botnet assaults are identified through deep autoencoding and decentralised traffic analytics. Rather than enabling data to be transmitted or relocated off the network edge, the problem of the study is in privacy and security in Medical Applications strategies. Computation will be moved to the edge layer to achieve previously centralised outcomes while boosting data security. Study Results in our suggested model detects anomalies with up to 98 percent accuracy utilizing MAC IP and source/destination/IP for training. Our method beats a traditional centrally controlled system in terms of attack detection accuracy. Hindawi 2022-02-11 /pmc/articles/PMC8856810/ /pubmed/35186118 http://dx.doi.org/10.1155/2022/1201339 Text en Copyright © 2022 Osman Sirajeldeen Ahmed et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Ahmed, Osman Sirajeldeen Omer, Emad Eldin Alshawwa, Samar Zuhair Alazzam, Malik Bader Khan, Reefat Arefin Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications |
title | Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications |
title_full | Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications |
title_fullStr | Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications |
title_full_unstemmed | Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications |
title_short | Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications |
title_sort | approaches to federated computing for the protection of patient privacy and security using medical applications |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8856810/ https://www.ncbi.nlm.nih.gov/pubmed/35186118 http://dx.doi.org/10.1155/2022/1201339 |
work_keys_str_mv | AT ahmedosmansirajeldeen approachestofederatedcomputingfortheprotectionofpatientprivacyandsecurityusingmedicalapplications AT omeremadeldin approachestofederatedcomputingfortheprotectionofpatientprivacyandsecurityusingmedicalapplications AT alshawwasamarzuhair approachestofederatedcomputingfortheprotectionofpatientprivacyandsecurityusingmedicalapplications AT alazzammalikbader approachestofederatedcomputingfortheprotectionofpatientprivacyandsecurityusingmedicalapplications AT khanreefatarefin approachestofederatedcomputingfortheprotectionofpatientprivacyandsecurityusingmedicalapplications |