Research Article

A User-Centered Medical Data Sharing Scheme for Privacy-Preserving Machine Learning

Algorithm 4

Data verification.
Input: Private Key SKT;
Output: Verify the result of the hash value The result of verifying the signature Signature
(1) Call the data contract to download data
(2) Download data ciphertext from cloud storage server
(3) Generate model hash
(4)
(5) Verify signature
(6) Sign off on the validation results
(7) Call the data contract to upload to the blockchain
(8) return