Skip to main content

Privacy-Preserving Multivariant Regression Analysis over Blockchain-Based Encrypted IoMT Data

  • Chapter
  • First Online:
Artificial Intelligence and Blockchain for Future Cybersecurity Applications

Abstract

Most of the studies related to privacy-preserving linear regression training with the Internet of Medical Things (IoMT) data from various entities do not satisfy all the privacy issues of the data owner. This article proposes a secure design in order to protect privacy issues of IoMT data at the time of training a linear regression model. Blockchain is employed with a partially homomorphic cryptosystem known as Paillier to protect all participant’s data privacy. To eliminate the territory on a third-party, the proposed study unites secure building blocks in secure linear regression. Firstly, a guarded data-sharing platform is developed among various data providers, where encrypted IoMT data is registered on a shared ledger. Secondly, secure polynomial operation (SPO), and secure comparison (SC) are outlined using the homomorphic property of Paillier. Secure linear regression does not need any trusted third-party. It requires only three interplays in each iteration. Severe security inquiry proves that secure linear regression preserves sensitive data privacy for each data provider and analyst. The secure linear regression achieved 0.78, 0.066, and 0.196 adjusted \(R^{2}\) on BCWD, HDD, and DD datasets respectively. The performance of secure linear regression is nearly similar to the general linear regression.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Joyia, G.J., et al.: Internet of Medical Things (IOMT): applications, benefits and future challenges in healthcare domain. J. Commun. 12(4), 240–247 (2017)

    Google Scholar 

  2. Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., Zhang, L.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308–318. ACM, New York (2016)

    Google Scholar 

  3. Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: Proceedings of Network and Distributed System Security Symposium, San Diego, California, 23–26 February 2014 (2014)

    Google Scholar 

  4. Hasan, A.S.M.T., Qu, Q., Li, C., Chen, L., Jiang, Q.: An effective privacy architecture to preserve user trajectories in reward-based LBS applications. ISPRS Int. J. Geo-Inf. 7, 53 (2018)

    Article  Google Scholar 

  5. Hasan, A.S.M.T., Jiang, Q., Chen, H., Wang, S.: A new approach to privacy-preserving multiple independent data publishing. Appl. Sci. 8, 783 (2018)

    Article  Google Scholar 

  6. Hasan, A.S.M.T., Jiang, Q., Li, C.: An effective grouping method for privacy-preserving bike-sharing data publishing. Future Internet 9, 65 (2017)

    Article  Google Scholar 

  7. Hasan, A.S.M.T., Jiang, Q., Luo, J., Li, C., Chen, L.: An effective value swapping method for privacy-preserving data publishing. Secur. Commun. Netw. 9, 3219–3228 (2016). https://doi.org/10.1002/sec.1527

    Article  Google Scholar 

  8. Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M.: Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 6, 7702–7712 (2019). https://doi.org/10.1109/JIOT.2019.2901840

    Article  Google Scholar 

  9. Haque, R.U., Hasan, A.S.M.T., Jiang, Q., Qu, Q.: Privacy-preserving K-nearest neighbors training over blockchain-based encrypted health data. Electronics 9, 2096 (2020). https://doi.org/10.3390/electronics9122096

    Article  Google Scholar 

  10. Senavirathne, N., Torra, V.: Approximating robust linear regression with an integral privacy guarantee. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), Belfast, pp. 1–10 (2018). https://doi.org/10.1109/PST.2018.8514161

  11. Qiu, G., Gui, X., Zhao, Y.: Privacy-preserving linear regression on distributed data by homomorphic encryption and data masking. IEEE Access 8, 107601–107613 (2020). https://doi.org/10.1109/ACCESS.2020.3000764

    Article  Google Scholar 

  12. Giacomelli, I., et al.: Privacy-preserving ridge regression with only linearly-homomorphic encryption. In: International Conference on Applied Cryptography and Network Security. Springer, Cham (2018)

    Google Scholar 

  13. Dong, X., et al.: Privacy-preserving locally weighted linear regression over encrypted millions of data. IEEE Access 8, 2247–2257 (2019)

    Article  Google Scholar 

  14. Gascón, A., et al.: Privacy-preserving distributed linear regression on high-dimensional data. Proc. Priv. Enhanc. Technol. 2017(4), 345–364 (2017)

    Google Scholar 

  15. Katz, J., Lindell, Y.: Introduction to modern cryptography. In: CRC Cryptography and Network Security Series. CRC Press, Boca Raton (2014)

    Google Scholar 

  16. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf. Accessed 19 Dec 2020

  17. Montgomery, D.C., Peck, E.A., Vining, G.G.: Introduction to Linear Regression Analysis, vol. 821. Wiley, Hoboken (2012)

    MATH  Google Scholar 

  18. Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 1310–1321. ACM, New York (2015). https://doi.org/10.1145/2810103.2813687

  19. Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, Cambridge (2009)

    MATH  Google Scholar 

  20. Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143–202 (2000). https://doi.org/10.1007/s001459910006

    Article  MathSciNet  MATH  Google Scholar 

  21. Dheeru, D., Karra, T.E.: UCI Machine Learning Repository. University of California, Irvine, CA, School of Information and Computer Science (2017)

    Google Scholar 

  22. Detrano, R., Janosi, A., Steinbrunn, W., Pfisterer, M., Schmid, J., Sandhu, S., Guppy, K.H., Lee, S., Froelicher, V.: International application of a new probability algorithm for the diagnosis of coronary artery disease. Am. J. Cardiol. 64, 304–310 (1989)

    Article  Google Scholar 

Download references

Acknowledgements

Authors thanks the school of computer science and technology of the University of Chinese Academy of Science, Beijing, China, and the Department of Computer Science and Engineering of University of Asia Pacific, Dhaka, Bangladesh for their support towards this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. S. M. Touhidul Hasan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haque, R.U., Hasan, A.S.M.T. (2021). Privacy-Preserving Multivariant Regression Analysis over Blockchain-Based Encrypted IoMT Data. In: Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., Romdhani, I. (eds) Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Studies in Big Data, vol 90. Springer, Cham. https://doi.org/10.1007/978-3-030-74575-2_3

Download citation

Publish with us

Policies and ethics