Discusses topics concerning the privacy preservation of genomic data in the digital era, including data security, data standards, and privacy laws so that researchers in biomedical informatics, computer privacy and ELSI can assess the latest advances in privacy-preserving techniques for the protection of human genomic data.
Table of ContentsPreface
Acknowledgements
Part 1: Fundamentals
1. Introduction to Genomics and Genetics Mahreen Fatima, Sana Zia, Maheen Murtaza, Asyia Shafique, Afshan Muneer, Junaid Sattar, Muhammad Ashir Nabeel and Amjad Islam Aqib
1.1 Introduction
1.2 Hub of Genomics
1.3 Genome Sequencing Methods
1.4 Variation of Genome Sequencing
1.5 Diseases and Disorders
1.6 Future Prospects
1.7 Conclusion
References
2. An Overview of Genomics and Frontiers in Genetics for Smart EraSaagar Bafna, Akash Shedage, Amber Agarwal, Somya Rakesh Goyal and Istiaque Ahmed
2.1 Introduction
2.1.1 Organization of Chapter
2.2 Application of Genomes—The Frontiers in Genetics
2.2.1 Personalized Medicine
2.2.2 Agriculture
2.2.3 Conservation Biology
2.2.4 Forensics
2.2.5 Evolutionary Studies
2.2.6 Biotechnology
2.2.7 Gene Therapy
2.3 Genomics in Military
2.3.1 Potential Career Impact Due to Genetic Variation
2.3.2 Challenges Remain
2.4 Genomics in Medicine
2.4.1 Cancer Genomics
2.4.2 Counseling in Genetics
2.4.3 Personalized Medicine
2.5 International Projects
2.5.1 Human Genome Project
2.5.2 The All of Us Research Program
2.5.3 The Transformation of Genomics
2.5.4 When All Come Together to Develop Systems Medicine
2.5.5 Interaction Between Genetic and Environmental Factors
2.6 Case Study
2.6.1 Target Therapies for Cancer
2.6.2 Pharmacogenomics and Drug Dosing
2.6.3 Precision Medicine in Cardiology
2.6.4 Personalized Treatment for Cystic Fibrosis
2.6.5 Diabetic Type 2 in Genomes
2.7 Conclusion
References
3. Technical Trends in Public Healthcare and Medical EngineeringAsha Rani Mishra, Amrita Rai, Mohd Dayem Ansari and Ritesh Pratap Singh
3.1 Introduction
3.2 Background Work
3.2.1 Recent Technologies in Healthcare and Medical Engineering
3.2.1.1 The Internet of Medical Things
3.2.1.2 Blockchain
3.2.1.3 Nanotechnology
3.2.1.4 Cloud Computing
3.2.1.5 Big Data and E-Health
3.2.1.6 Virtual Clinical Trials
3.2.1.7 3D Printing for Healthcare and Medical Engineering
3.2.1.8 Telemedicine
3.2.2 Advancement in Healthcare and Medical Engineering
3.3 Current Scenario of Public Healthcare System and Medical Engineering
3.4 Role of AI in Healthcare
3.5 Technological Analysis for Healthcare System and Medical Engineering
3.5.1 Need of Advancement in Public Healthcare System
3.5.2 Advance Technology Role in Healthcare System
3.6 Future Aspects of AI in Healthcare and Medical Engineering
3.7 Conclusion
3.8 Future Aspect
References
4. Role of Genomics in Smart Era and Its Application in COVID-19Sunil Kumar and Biswajit R. Bhowmik
4.1 Introduction
4.2 Basics of Genomics
4.3 Evolution of Genomics
4.4 Characteristics of Genomics and DNA Computing
4.4.1 Genomics
4.4.2 DNA Computing
4.5 Types of Genomics
4.5.1 Structural Genomics
4.5.2 Function Genomics
4.5.3 Metagenomics
4.5.4 Epigenomics
4.6 Application Area of Genomics
4.7 Application of DNA Computing
4.8 Genomics and DNA Computing in COVID-19 Epidemic
4.9 Issues in Genomics and DNA Computing
4.10 Tools and Technology Used in Genomics Systems
4.11 Role of AI Technology Used in Genomics Systems
4.12 Related Works and Challenges
4.13 Future Research Dimension
4.14 Conclusion
References
Part 2: Methods and Applications
5. Novel Cutting-Edge Security Tools for Medical and Genomic Data With Privacy Preservation TechniquesA. Rehash Rushmi Pavitra, I. Daniel Lawrence, J. Sarojini Premalatha, P. Kalaiselvi, D. Jena Catherine Bel, C. Esther, G.B. Zionna Sen and G. Gomathy
5.1 Introduction
5.2 Background of Genomic
5.3 Literature Review
5.4 Highlights of the Proposed Methodologies
5.5 Results and Discussion
5.6 Conclusion
References
6. Genomic Data Analysis With Optimized Convolutional Neural Network (CNN) for Edge ApplicationsSneha Venkateshalu, Santosh Deshpande and Bharathi Pannyagol
6.1 Introduction
6.2 Related Work
6.3 Proposed Methodology
6.4 Conclusion
References
7. Real-World Estimation of Malaria Prevalence From Genome of Vectors and Climate AnalysisAshvath Narayanan C., Pavitra Vasudevan, Maheswari R., Parvathi R. and Pattabiraman V.
7.1 Introduction
7.2 Significance of Estimation of Malaria Prevalence From Genome of Vectors and Climate Analysis
7.2.1 Related Work
7.3 Proposed Methodology
7.3.1 Classification Approach
7.3.2 Nonlinear Regression Approach
7.4 Conclusion
References
8. Revolutionalizing Internet of Medical Things for Blockchain-Based 5G Healthcare Security and Privacy for Genomic DataShyam Mohan J. S., Guddeti Theekshana and Guddeti Likhit Kumar Reddy
8.1 Introduction
8.1.1 Genomics Data
8.2 Internet of Things in Healthcare and Medical Applications (IoMT)
8.2.1 Benefits of IoMT
8.2.2 Adopting Blockchain Technology in Healthcare and Medical Applications—A General Scenario
8.2.3 The Cryptography Behind Blockchain
8.2.4 Hash Functions
8.2.5 Public Key Cryptography
8.3 Limitations of Existing Technologies in Healthcare Applications
8.4 Solving Healthcare Problems Using BCT
8.4.1 Problems in Drug Discovery
8.4.2 Blockchain Application to Solve Problems in Drug Discovery
8.4.3 Patient Data Management
8.4.4 Blockchain Application to Solve Patient Data Management
8.5 Proposed Model for 5G Healthcare
8.5.1 Access Security and Data Privacy
8.5.2 Algorithm
8.6 Experimental Setup and Discussion
8.7 Results
8.8 Conclusion
References
9. Preserve Privacy-HD: A Privacy-Preserving Distributed Framework for Health DataAswathy Ravikumar and Harini Sriraman
9.1 Introduction
9.1.1 Motivation
9.1.2 Medical Data and Interoperatability
9.2 Organization of Chapter
9.3 Related Work
9.4 Proposed Methodology
9.5 Complexity Analysis
9.6 Conclusion
References
Part 3: Future-Based Applications
10. Decision and Recommendation System Services for Patient Using Artificial IntelligenceArjun Tandon, Raghav Dangey, Anand Kumar Mishra, G. Balamurugan and Amit Kumar Tyagi
10.1 Introduction
10.1.1 Effect of Internet of Medical Things Attacks
10.1.2 Basic Structure of Defensive Plan
10.1.3 Security/Defense Mechanism
10.2 Literature Review
10.2.1 Healthcare Safety
10.2.2 Intrusion Detection
10.2.2.1 Types of Techniques in Intrusion Detection Systems
10.2.3 Anomaly Detection
10.2.3.1 Process of Identifying Anomalies
10.2.3.2 Researches on Anomaly Detection
10.2.3.3 Types of Anomalies
10.2.4 Machine Learning
10.3 Proposed Methodology
10.3.1 Pre-Processing
10.3.1.1 Categorization of Protocols
10.3.1.2 Detection Model
10.4 Implementation and Results Analysis
10.5 Results and Discussion
10.6 Conclusion
References
11. MPHDRDNN: Meticulous Presaging of Heart Disease by Regularized DNN Through GUIRitu Aggarwal and Suneet Kumar
11.1 Introduction
11.2 Literature Study
11.3 Proposed Methodology
11.3.1 Proposed Flowchart of Work
11.4 Performance Evaluation Metrics
11.4.1 L1 Regularization
11.4.2 Implementation With L1 and L2 Reg-DNN
11.4.2.1 How to Implement in This Proposed Work L2 and L1 Regularization
11.4.2.2 Lasso Relapse
11.4.2.3 Edge Relapse
11.4.3 Graphical User System Model
11.5 Results and Implementation Process for Building a GUI
11.6 Conclusion and Future Scope
11.6.1 Comparative Performance Reg-DNN With Other Existing Work
Acknowledgment
References
12. Techniques for Removing Hair From Dermoscopic Images: A Survey of Current ApproachesRanjita Rout, Priyadarsan Parida, Sonali Dash and Sandipan Mallik
12.1 Introduction
12.1.1 Organization of Chapter
12.2 Inpainting Techniques Used for Hair Removal From Dermoscopic Images
12.2.1 Diffusion-Based Inpainting
12.2.2 Texture Synthesis-Based Inpainting
12.2.3 Exemplar and Search-Based Inpainting
12.2.4 Wavelet Transform-Based Inpainting
12.2.5 Fast Marching Method Inpainting
12.2.6 Deep Learning Image Inpainting
12.3 Hair Removal Approaches From Dermoscopic Images
12.3.1 Unsupervised Approaches
12.3.1.1 Filtering-Based Hair Removal Approaches
12.3.1.2 Morphological-Based Hair Removal Approaches
12.3.1.3 Edge-Based Hair Removal Approaches
12.3.2 Supervised Approaches
12.4 Results and Discussion
12.5 Conclusion
Acknowledgment
References
13. The Emergence of Blockchain Technology in Industrial Revolution 5.0Meenu Gupta, Chetanya Ved, Saransh Khetarpaul, Anmol Dhingra and Sanjana Deswal
13.1 Introduction
13.2 Literature Survey
13.3 Evolution of Web Technology in Association With Blockchain
13.3.1 Superior Security and Privacy
13.3.2 Gravitation Toward Cryptocurrency
13.3.3 Participant Providence in Industries by Web 3.0
13.3.3.1 Currency Exchange Procedures
13.3.3.2 Social Media and Messaging Platforms
13.3.3.3 Browsers
13.3.3.4 Banking and Finance Industries
13.4 Understanding of Basic Key Terminologies
13.4.1 Distributed Ledger Technology
13.4.2 Mining
13.4.3 Consensus Mechanisms and Protocols
13.4.3.1 Double Spending Problem
13.4.3.2 Byzantine General Problem
13.5 Industrial Components Associated With Blockchain
13.5.1 Cryptocurrency
13.5.2 Decentralized Applications (DApps)
13.5.3 Smart Contracts
13.6 Contribution of Blockchain for Revolutionizing Industrial Aspects
13.6.1 Introducing the Ethereum Network
13.6.1.1 Ethereum Virtual Machine
13.6.1.2 Cloud Computing
13.6.2 Implementation of Blockchain for Enhancing Security and Privacy
13.6.3 Development of Token Economy Based on Cryptocurrency
13.6.4 Developing the Market for Smart Real Estate
13.6.4.1 Platforms and Marketplaces
13.6.4.2 No Intermediaries
13.6.4.3 Illiquid Characteristics of Real Estate
13.6.4.4 Fractional Ownership of Real Estate
13.6.4.5 Decentralization
13.6.4.6 Costs
13.6.5 Development of Supply Chain Management Systems Based on Distributed Ledgers
13.7 Transformation of Industrial Sectors by Blockchain
13.7.1 Healthcare Sector
13.7.1.1 Patient Monitoring
13.7.1.2 Medical Supply Chain Management
13.7.1.3 Medical Record Storage
13.7.1.4 Stakeholders Benefits
13.7.2 Energy Sector
13.7.2.1 Impact Analysis of Blockchain Over Oil Exploration and Refining Industry
13.7.2.2 Use Cases of Blockchain in O&G Upstream Industry
13.7.2.3 Use Cases of Blockchain in O&G Midstream Industry
13.7.2.4 Use Cases of Blockchain in O&G Downstream Industry
13.8 Economical Impact Analysis of Blockchain Over Each Industry
13.8.1 Banking and Financial Institutions
13.8.2 Healthcare Sector
13.8.3 Retail Market
13.8.4 Energy Market
13.9 Conclusion
References
14. Cervical Cancer Detection Using Big Data Analytics and Their Comparative AnalysisV. Lakshmi Narasimhan and W. Tumisang Zaphaniah
14.1 Introduction
14.2 Related Literature
14.3 Machine Learning Algorithms Used
14.3.1 Multi-Layer Perceptron
14.3.2 Backpropagation Neural Network
14.3.3 Recurrent Neural Network
14.4 Description of the Dataset
14.4.1 Bias in the Dataset
14.4.2 Sorting the Dataset
14.4.3 Visualization of the Dataset
14.4.4 Pre-Processing
14.4.5 Standardization and Normalization
14.4.6 Missing Values Management
14.4.7 Splitting of Dataset Into Training and Testing
14.5 Parameter Specification on the ANNs
14.6 Analysis of Results
14.6.1 Backpropagation Neural Network
14.6.2 Multilayer Perceptron
14.6.3 Recurrent Neural Network
14.7 Conclusions
References
15. Smart Walking Stick for Visually Impaired PeopleDhilip Karthik M., Rizwan Mohamed Kareem, Nisha V. M. and Sajidha S. A.
15.1 Introduction
15.2 Related Work
15.3 System Architecture
15.4 Conclusion
References
Part 4: Issues and Challenges
16. Enhanced Security Measures in Genomic Data ManagementAmbika N.
16.1 Introduction
16.2 Literature Survey
16.3 Background
16.4 Proposed Model
16.5 Analysis of the Work
16.6 Future Work
16.7 Conclusion
References
17. Industry 5.0: Potentials, Issues, Opportunities, and Challenges for Society 5.0Amit Kumar Tyagi, R. Lakshmi Priya, Anand Kumar Mishra and G. Balamurugan
17.1 Introduction
17.1.1 Evolution of Industry 5.0
17.2 Literature Review
17.3 Role of Robots in Industry 5.0 and Society 5.0
17.3.1 Role of Big Data and Artificial Intelligence in Industry 5.0
17.3.2 Role of Big Data and Artificial Intelligence in Society 5.0
17.3.3 Role of Robots in Industry 5.0
17.3.4 Role of Robots in Society 5.0
17.4 Potentials of Industry 5.0 and Society 5.0
17.4.1 Potentials of Industry 5.0
17.4.2 Potentials of Industry 5.0 in Society 5.0
17.5 Open Issues Toward Industry 5.0 and Society 5.0
17.6 Opportunities and Challenges Toward Industry 5.0 and Society 5.0
17.6.1 Opportunities of Industry 5.0
17.6.2 Challenges in Industry 5.0
17.6.3 Challenges in Society 5.0
17.6.4 Opportunities Toward Society 5.0
17.7 Conclusion
References
18. Artificial Intelligence—Blockchain Enabled Technology for Internet of Things: Research Statements, Open Issues, and Possible Applications in the Near FutureShabnam Kumari and P. Muthulakshmi
18.1 Introduction: Artificial Intelligence, Machine Learning, Internet of Things, and Blockchain Concepts
18.1.1 Scope of the Work
18.2 Frameworks, Architectures, and Models for the Convergence of Machine Learning, IoTs, and Blockchain Technologies
18.3 Machine Learning Techniques for the Optimization of IoT-Based Services
18.4 Machine Learning Techniques for Exchanging Data in a Blockchain
18.5 Machine Learning-Based Blockchain Transactions
18.6 IoT-Enabled Security Using Artificial Intelligence and Blockchain Technologies
18.7 Security, Privacy, and Trust Related Areas in Artificial Intelligence and Blockchain-Based IoT Applications
18.8 Blockchain-Based Learning Automated Analytics Platforms
18.9 Blockchain- and Machine Learning-Based Solutions for Big Data Challenges
18.10 Machine Learning Techniques for the Analysis of Sensor Records for Healthcare Applications
18.11 Blockchain-Enabled IoT Platforms for Automation in Intelligent Transportation Systems
18.12 Conclusion
References
19. Blockchain-Empowered Decentralized Applications: Current Trends and ChallengesAtharva Deshmukh, Anand Kumar Mishra, G. Balamurugan and Amit Kumar Tyagi
19.1 Introduction
19.2 Literature Survey
19.3 Key Characteristics of Blockchain
19.4 Challenges Faced by Blockchain Technology
19.4.1 Blockchain and Smart Contracts
19.4.2 Smart Contracts
19.4.3 Actions of a Smart Contract
19.5 The Use of Smart Contracts in Decentralized Autonomous Organizations
19.5.1 Decentralized Applications
19.6 Smart Contracts: An Overview
19.7 Smart Contract Platforms
19.8 Applications of Blockchain Technology
19.9 Future Data Storage Issues in Blockchain and Its Solution
19.10 Conclusion
References
20. Privacy of Data, Privacy Laws, and Privacy by DesignElanur Özmen and Aswani Kumar Cherukuri
20.1 Introduction
20.2 Privacy Issues
20.2.1 Privacy Issues in Data
20.2.1.1 Exact Data
20.2.1.2 Bounds
20.2.1.3 Negative Result
20.2.1.4 Existence of Attributes
20.2.1.5 Direct Inference
20.2.1.6 Direct Attack
20.2.1.7 Tracking Devices
20.2.1.8 Storage Security Breach
20.2.2 Privacy Issues in Communication
20.2.2.1 Aggregation
20.2.2.2 Authentication
20.2.2.3 Privacy of Private Conversations
20.2.2.4 Communications Anonymity and Pseudonymity
20.2.3 Privacy Issues in Computations
20.2.3.1 Total
20.2.3.2 Mean
20.2.3.3 Tracker Attacks
20.3 Privacy Laws and Regulatıons
20.3.1 General Data Protection Regulation
20.3.2 California Privacy Rights Act
20.3.3 Virginia Consumer Data Protection Act
20.3.4 Other Privacy Laws
20.4 Techniques for Enforcing Privacy
20.4.1 K-Anonymity
20.4.2 L-Diversity
20.4.3 T-Closeness
20.5 Privacy by Design
20.6 Conclusion
References
Index Back to Top