Journal of Frontiers of Computer Science and Technology ›› 2022, Vol. 16 ›› Issue (8): 1779-1791.DOI: 10.3778/j.issn.1673-9418.2101091
• Network and Information Security • Previous Articles Next Articles
LIU Tonglai1, ZHANG Zikai2, WU Jigang
Received:
2021-01-20
Revised:
2021-03-18
Online:
2022-08-01
Published:
2021-03-26
About author:
LIU Tonglai, born in 1982, Ph.D. candidate, member of CCF. His research interests include blockchain, intelligent computing and data mining.Supported by:
刘同来1, 章子凯2, 武继刚
作者简介:
刘同来(1982—),男,江苏连云港人,博士研究生,CCF会员,主要研究方向为区块链、智能计算、数据挖掘。基金资助:
CLC Number:
LIU Tonglai, ZHANG Zikai, WU Jigang. System Model and Access Control Schemes for Medical Image Collaborative Analysis[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(8): 1779-1791.
刘同来, 章子凯, 武继刚. 面向医疗图像协同分析的系统模型及访问控制[J]. 计算机科学与探索, 2022, 16(8): 1779-1791.
Add to citation manager EndNote|Ris|BibTeX
URL: http://fcst.ceaj.org/EN/10.3778/j.issn.1673-9418.2101091
层 | 类型 | 特征图大小 | 尺寸 | 步长 | 参数数量 |
---|---|---|---|---|---|
0 | Input | 88×88×3 | — | — | — |
1 | Conv | 88×88×24 | 5×5×24 | 1 | 624 |
2 | Conv | 80×80×16 | 3×3×16 | 1 | 160 |
3 | Conv | 78×78×8 | 3×3×8 | 1 | 80 |
4 | Max-pooling | 39×39×8 | 2×2 | 2 | — |
5 | FC | 64 | — | — | 778 688 |
6 | FC | 2 | — | — | 126 |
Table 1 Model parameters of data cleaning
层 | 类型 | 特征图大小 | 尺寸 | 步长 | 参数数量 |
---|---|---|---|---|---|
0 | Input | 88×88×3 | — | — | — |
1 | Conv | 88×88×24 | 5×5×24 | 1 | 624 |
2 | Conv | 80×80×16 | 3×3×16 | 1 | 160 |
3 | Conv | 78×78×8 | 3×3×8 | 1 | 80 |
4 | Max-pooling | 39×39×8 | 2×2 | 2 | — |
5 | FC | 64 | — | — | 778 688 |
6 | FC | 2 | — | — | 126 |
级别 | 编码 |
---|---|
个人级别 | 00 |
组级别 | 01 |
部门级别 | 10 |
医院级别 | 11 |
Table 2 Level of data access
级别 | 编码 |
---|---|
个人级别 | 00 |
组级别 | 01 |
部门级别 | 10 |
医院级别 | 11 |
角色 | 对象 | 操作权限 | 数据权限 | 基于属性的动态数据权限 |
---|---|---|---|---|
1010 | 01 | score≥90 and lesion=HA | ||
0100 | 00 | — | ||
0000 | 00 | — | ||
1110 | 10 | — | ||
1010 | 00 | — | ||
0000 | 00 | — |
Table 3 Control policy
角色 | 对象 | 操作权限 | 数据权限 | 基于属性的动态数据权限 |
---|---|---|---|---|
1010 | 01 | score≥90 and lesion=HA | ||
0100 | 00 | — | ||
0000 | 00 | — | ||
1110 | 10 | — | ||
1010 | 00 | — | ||
0000 | 00 | — |
模型 | RAC | ABCCC[ | E-RBAC[ | SAT-RBAC[ | ABAC-IaaS[ |
---|---|---|---|---|---|
支持属性 | 支持 | 支持 | 不支持 | 不支持 | 支持 |
灵活性 | 高 | 低 | 高 | 低 | 一般 |
动态性 | 高 | 低 | 低 | 低 | 高 |
扩展性 | 高 | 低 | 低 | 低 | 高 |
多层级 安全控制 | 支持 | 支持 | 不支持 | 不支持 | 不支持 |
模型安全 | 高 | 高 | 低 | 一般 | 低 |
Table 4 Comparison of role-based access control
模型 | RAC | ABCCC[ | E-RBAC[ | SAT-RBAC[ | ABAC-IaaS[ |
---|---|---|---|---|---|
支持属性 | 支持 | 支持 | 不支持 | 不支持 | 支持 |
灵活性 | 高 | 低 | 高 | 低 | 一般 |
动态性 | 高 | 低 | 低 | 低 | 高 |
扩展性 | 高 | 低 | 低 | 低 | 高 |
多层级 安全控制 | 支持 | 支持 | 不支持 | 不支持 | 不支持 |
模型安全 | 高 | 高 | 低 | 一般 | 低 |
应用场景 | 出血点 | 硬性渗出物 | 迭代次数 |
---|---|---|---|
未进行数据清洗 | 0.850 | 0.960 | 1 000 |
进行数据清洗 | 0.910 | 0.980 | 1 000 |
文献[20] | 0.626 | 0.876 | — |
文献[35] | — | 0.830 | — |
文献[36] | — | 0.820 | — |
文献[37] | 0.840 | — | — |
Table 5 Sensitivity of DR lesions classification
应用场景 | 出血点 | 硬性渗出物 | 迭代次数 |
---|---|---|---|
未进行数据清洗 | 0.850 | 0.960 | 1 000 |
进行数据清洗 | 0.910 | 0.980 | 1 000 |
文献[20] | 0.626 | 0.876 | — |
文献[35] | — | 0.830 | — |
文献[36] | — | 0.820 | — |
文献[37] | 0.840 | — | — |
[1] | ZHANG D Y, CHEN X J, WANG D K, et al. A survey on collaborative deep learning and privacy-preserving[C]// Pro-ceedings of the 3rd IEEE International Conference on Data Science in Cyberspace, Guangzhou, Jun 18-21, 2018. Pis-cataway: IEEE, 2018: 652-658. |
[2] | YUAN D N, ZHU X Y, WEI M K, et al. Collaborative deep learning for medical image analysis with differential privacy[C]// Proceedings of the 2019 IEEE Global Communications Conference, Waikoloa, Dec 9-13, 2019. Piscataway: IEEE, 2019: 1-6. |
[3] | FAN K, JIANG W, LI H, et al. Lightweight RFID protocol for medical privacy protection in IoT[J]. IEEE Transactions on Industrial Informatics, 2018, 14(4): 1656-1665. |
[4] | SALAMA U, YAO L N, PAIK H. An internet of things based multi-level privacy-preserving access control for smart living[J]. Informatics, 2018, 5(2): 23. |
[5] | ZHANG X P, WU J G, MENG M, et al. Feature-transfer net-work and local background suppression for microaneurysm detection[J]. Machine Vision and Applications, 2020, 32(1): 1-13. |
[6] | ZHANG X P, WU J G, PENG Z H, et al. SODNet: small object detection using deconvolutional neural network[J]. IET Image Processing, 2020, 14(8): 1662-1669. |
[7] | DROZDZAL M, VORONTSOV E, CHARTRAND G, et al. The importance of skip connections in biomedical image segmentation[C]// LNCS 10008: Proceedings of the 1st Inter-national Workshop on Deep Learning and Data Labeling for Medical Applications and 2nd International Workshop, Athens, Oct 17-21, 2016. Cham: Springer, 2016: 179-187. |
[8] | XIE Y T, XIA Y, ZHANG J P, et al. Knowledge-based colla-borative deep learning for Benign-Malignant lung nodule classification on chest CT[J]. IEEE Transactions on Medical Imaging, 2018, 38(4): 991-1004. |
[9] | LIU Y, WANG R, JIN R, et al. Shoulder joint image segme-ntation based on joint convolutional neural networks[C]// Proceedings of the 2019 International Conference on Robo-tics, Intelligent Control and Artificial Intelligence, Shanghai, Sep 20-22, 2019. New York: ACM, 2019: 236-241. |
[10] | POIROT M G, VEPAKOMMA P, CHANG K, et al. Split learning for collaborative deep learning in healthcare[J]. arXiv:1912.12115, |
[11] | BEGUM J N, KUMAR K, SUMATHY V. Two tier protocol for hierarchical access control in medical image transmission[C]// Proceedings of the 2014 International Conference on Computing for Sustainable Global Development, New Delhi, Mar 5-7, 2014. Piscataway: IEEE, 2014: 769-775. |
[12] | CHOI D, KIM D, PARK S. A framework for context sensitive risk-based access control in medical information systems[J]. Computational and Mathematical Methods in Medicine, 2015: 265132. |
[13] | JIN X, KRISHNAN R, SANDHU R. Role and attribute based collaborative administration of intra-tenant cloud IaaS[C]// Proceedings of the 10th IEEE International Conference on Collaborative Computing:Networking, Applications and Worksharing, Miami, Oct 22-25, 2014. Piscataway: IEEE, 2014: 261-274. |
[14] | XUE Y, XUE K, GAI N, et al. An attribute-based controlled collaborative access control scheme for public cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(11): 2927-2942. |
[15] | GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security, London, Oct 30-Nov 3, 2006. New York:ACM, 2006: 89-98. |
[16] | KAMAU G, BOORE C, MAINA E, et al. Blockchain tech-nology: is this the solution to EMR interoperability and security issues in developing countries?[C]// Proceedings of the 2018 IST-Africa Week Conference,Gaborone, May 9-11, 2018. Piscataway: IEEE, 2018: 1-8. |
[17] | HUSSEIN A F, ARUNKUMAR N, RAMIREZ-GONZALEZ G, et al. A medical records managing and securing blockchain based system supported by a genetic algorithm and discrete wavelet transform[J]. Cognitive Systems Research, 2018, 52: 1-11. |
[18] | OMAR A A, RAHMAN M S, BASU A, et al. Medibchain: a blockchain based privacy preserving platform for healthcare data[C]// LNCS 10658: Proceedings of the 2017 International Conference on Security, Privacy and Anonymity in Computa-tion, Communication and Storage, Guangzhou, Dec 12-15, 2017. Cham: Springer, 2017: 534-543. |
[19] | AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// LNCS 2894: Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, Taipei, China, Nov 30-Dec 4, 2003. Berlin, Heidelberg: Springer, 2003: 452-473. |
[20] | TAN J H, FUJITA H, SIVAPRASAD S, et al. Automated segmentation of exudates, haemorrhages, microaneurysms using single convolutional neural network[J]. Information Sciences, 2017, 420: 66-76. |
[21] | GALLETTA A, CARNEVALE L, BRAMANTI A, et al. An innovative methodology for big data visualization for tele-medicine[J]. IEEE Transactions on Industrial Informatics, 2018, 15(1): 490-497. |
[22] | ZHANG Y, DENG R H, ZHENG D, et al. Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2019, 15(9): 5099-5108. |
[23] | YAO X, HAN X, DU X. A light-weight certificate-less public key cryptography scheme based on ECC[C]// Proceedings of the 23rd International Conference on Computer Commu-nication and Networks, Shanghai, Aug 4-7, 2014. Piscataway: IEEE, 2014: 1-8. |
[24] | YAO X, KONG H, LIU H, et al. An attribute credential based public key scheme for fog computing in digital manu-facturing[J]. IEEE Transactions on Industrial Informatics, 2019, 15(4): 2297-2307. |
[25] | WANG Y F, ZHANG R Z. Strongly secure certificateless signature scheme without pairings[J]. Journal on Commu-nications, 2013, 34(2): 94. |
[26] | NAZERIAN F, MOTAMENI H, NEMATZADEH H. Emer-gency role-based access control (E-RBAC) and analysis of model specifications with alloy[J]. Journal of Information Security and Applications, 2019, 45: 131-142. |
[27] | LUO J, WANG H J, GONG X, et al. A novel role-based access control model in cloud environments[J]. International Journal of Computational Intelligence Systems, 2016, 9(1): 1-9. |
[28] | LEE Y R, LEE H S. An authenticated certificateless public key encryption scheme[J]. IACR Cryptology ePrint Archive, 2004: 150. |
[29] | ADITIA M K, ALTAF F, SINGH M R, et al. Optimized CL-PKE with lightweight encryption for resource constrained devices[C]// Proceedings of the 20th International Conference on Distributed Computing and Networking, Bangalore, Jan 14-17, 2019. New York: ACM, 2019: 427-432. |
[30] | HE D, CHEN J, ZHANG R. An efficient and provably secure certificateless signature scheme without bilinear pairings[J]. International Journal of Communication Systems, 2012, 25(11): 1432-1442. |
[31] | KARATI A, ISLAM S K H, BISWAS G P. A pairing-free and provably secure certificateless signature scheme[J]. Infor-mation Sciences, 2018, 450: 378-391. |
[32] | KAUPPI T, KALESNYKIENE V, KAMARAINEN J K, et al. DIARETDB0: evaluation database and methodology for diabetic retinopathy algorithms[R]. Finland. Lappeenranta University of Technology. Machine Vision and Pattern Reco-gnition Research Group, 2006: 1-17. |
[33] | KAUPPI T, KALESNYKIENE V, KAMARAINEN J K, et al. The diaretdb1 diabetic retinopathy database and evaluation protocol[C]// Proceedings of the British Machine Vision Conference 2007, University of Warwick, Sep 10-13, 2007. Durham: BMVA Press, 2007: 1-10. |
[34] | BUNCH P C, HAMILTON J F, SANDERSON G K, et al. A free response approach to the measurement and characteriza-tion of radiographic observer performance[C]// Proceedings of the SPIE 0127, Application of Optical Instrumentation in Medicine VI, Boston, Dec 27, 1977. Boston:SPIE Digital Library, 1977: 124-135. |
[35] | LIU Q, ZOU B, CHEN J, et al. A location-to-segmentation strategy for automatic exudate segmentation in color retinal fundus images[J]. Computerized Medical Imaging and Gra-phics, 2017, 55: 78-86. |
[36] | ASHA P R, KARPAGAVALLI S. Diabetic retinal exudates detection using machine learning techniques[C]// Proceedings of the 2015 International Conference on Advanced Com-puting and Communication Systems, Coimbatore, Jan 5-7, 2015. Piscataway: IEEE, 2015: 1-5. |
[37] | MUMTAZ R, HUSSAIN M, SARWAR S, et al. Automatic detection of retinal hemorrhages by exploiting image pro-cessing techniques for screening retinal diseases in diabetic patients[J]. International Journal of Diabetes in Developing Countries, 2018, 38(1): 80-87. |
[1] | AN Fengping, LI Xiaowei, CAO Xiang. Medical Image Classification Algorithm Based on Weight Initialization-Sliding Window CNN [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(8): 1885-1897. |
[2] | WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, WANG Zhenli, LIANG Guangjun. Survey on Blockchain Consensus Algorithms and Application [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(6): 1214-1242. |
[3] | XIONG Xiao, LI Leixiao, GAO Jing, GAO Haoyu, DU Jinze, ZHENG Yue, NIU Tieming. Research Progress of Blockchain in Internet of Vehicles Data Sharing [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(5): 1008-1024. |
[4] | GUAN Zheng, HU Yang, YANG Zhijun, HE Min. Weighted Scheduling Algorithm Based on In-Band Full-Duplex Link for Distributed WLAN [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(2): 372-383. |
[5] | HAN Gang, LYU Yingze, LUO Wei, WANG Jiaqian. Privacy Data Protection Scheme for Patients with Major Outbreaks [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(2): 359-371. |
[6] | FAN Xing, NIU Baoning. BBF: Bloom Filter Variant for Blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(10): 1921-1929. |
[7] | QIAN Baoxin, XIAO Zhiyong, SONG Wei. Application of Improved Convolutional Neural Network in Lung Image Segmentation [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(8): 1358-1367. |
[8] | ZHOU Jian, SUN Liyan, FU Ming. Research on Wallet Protection Against Currency Failure in Blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(12): 2039-2049. |
[9] | ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang. Multi-authority Access Control Scheme in Cloud Environment [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878. |
[10] | WANG Qun, LI Fujuan, WANG Zhenli, LIANG Guangjun, XU Jie. Principle and Core Technology of Blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1621-1643. |
[11] | WANG Yonggui, XU Shanshan, XIAO Chenglong. Research on Wireless City Community Detection: Using Improved Association Rules to Achieve Community Detection Algorithm on Spark [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1582-1592. |
[12] | LIU Chen, XIAO Zhiyong, DU Nianmao. Application of Improved Convolutional Neural Network in Medical Image Seg- mentation [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1593-1603. |
[13] | XU Meng, BAO Anping, LV Zhanshan. Research on Access Control for Cloud Storage by Improved ABE [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 437-445. |
[14] | GUI Peng, SHAO Dangguo, ZHU Xiaohong, XIANG Yan, WANG Shuo, MA Lei. Medical Image Registration via Modified Differential Search Algorithm [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 446-456. |
[15] | TAO Lingling, HUANG Zhiqiu, CAO Yan, ZHANG Mengjiao. Privacy Preserving Method for Supporting Access Purpose and Reputation Labeling [J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 719-729. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
/D:/magtech/JO/Jwk3_kxyts/WEB-INF/classes/