Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2024 Nov 4:10:20552076241282242.
doi: 10.1177/20552076241282242. eCollection 2024 Jan-Dec.

Application of privacy protection technology to healthcare big data

Affiliations
Review

Application of privacy protection technology to healthcare big data

Hyunah Shin et al. Digit Health. .

Abstract

With the advent of the big data era, data security issues are becoming more common. Healthcare organizations have more data to use for analysis, but they lose money every year due to their inability to prevent data leakage. To overcome these challenges, research on the use of data protection technologies in healthcare is actively underway, particularly research on state-of-the-art technologies, such as federated learning announced by Google and blockchain technology, which has recently attracted attention. To learn about these research efforts, we explored the research, methods, and limitations of the most widely used privacy technologies. After investigating related papers published between 2017 and 2023 and identifying the latest technology trends, we selected related papers and reviewed related technologies. In the process, four technologies were the focus of this study: blockchain, federated learning, isomorphic encryption, and differential privacy. Overall, our analysis provides researchers with insight into privacy technology research by suggesting the limitations of current privacy technologies and suggesting future research directions.

Keywords: Blockchain; differential privacy; federated learning; healthcare; homomorphic encryption privacy protection.

PubMed Disclaimer

Conflict of interest statement

The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

Figures

Figure 1.
Figure 1.
A schematic diagram of keyword calculation through word counting.
Figure 2.
Figure 2.
Flow of research for systematic literature review.
Figure 3.
Figure 3.
Personal information protection technology trends (2013–2023 in PubMed).
Figure 4.
Figure 4.
Conceptual schematic diagram of blockchain.
Figure 5.
Figure 5.
Conceptual diagram of the federated learning technology.
Figure 6.
Figure 6.
Conceptual diagram of the DP technology.
Figure 7.
Figure 7.
Conceptual diagram of the homomorphic encryption technology.

Similar articles

Cited by

References

    1. Lee J, Kim H, Choi SJ. Do hospital data breaches affect health information technology investment? Digit Health 2024; 10: 1–11. DOI: 10.1177/20552076231224164. - DOI - PMC - PubMed
    1. Personal Data Protection Laws. Korean Law Information Center. https://www.law.go.kr/%EB%B2%95%EB%A0%B9/%EA%B0%9C%EC%9D%B8%EC%A0%95%EB%...
    1. General Data Protection Regulation. Intersoft consulting. https://gdpr-info.eu (accessed 5 August 2020).
    1. Stone MA, Redsell SA, Ling JTet al. et al. Sharing patient data: competing demands of privacy, trust and research in primary care. Br J Gen Pract 2005; 55: 783–789. - PMC - PubMed
    1. Hasselgren A, Kralevska K, Gligoroski D, et al. Blockchain in healthcare and health sciences—a scoping review. Int J Med Inf 2020; 134: 104040. - PubMed

LinkOut - more resources