Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data

被引:40
|
作者
Zheng, Yandong [1 ]
Lu, Rongxing [1 ]
Shao, Jun [2 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[2] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
基金
加拿大自然科学与工程研究理事会;
关键词
k-NN query; kd-tree; eHealthcare data; Privacy preservation; BIG DATA;
D O I
10.1007/s10916-019-1229-1
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The boom of Internet of Things devices promotes huge volumes of eHealthcare data will be collected and aggregated at eHealthcare provider. With the help of these health data, eHealthcare provider can offer reliable data service (e.g., k-NN query) to doctors for better diagnosis. However, the IT facility in the eHealthcare provider is incompetent with the huge volumes of eHealthcare data, so one popular solution is to deploy a powerful cloud and appoint the cloud to execute the k-NN query service. In this case, since the eHealthcare data are very sensitive yet cloud servers are not fully trusted, directly executing the k-NN query service in the cloud inevitably incurs privacy challenges. Apart from the privacy issues, efficiency issues also need to be taken into consideration because achieving privacy requirement will incur additional computational cost. However, existing focuses on k-NN query do not (fully) consider the data privacy or are inefficient. For instance, the best computational complexity of k-NN query over encrypted eHealthcare data in the cloud is as large as O(k log(3) N), where N is the total number of data. In this paper, aiming at addressing the privacy and efficiency challenges, we design an efficient and privacy-preserving k-NN query scheme for encrypted outsourced eHealthcare data. Our proposed scheme is characterized by integrating the kd-tree with the homomorphic encryption technique for efficient storing encrypted data in the cloud and processing privacy-preserving k-NN query over encrypted data. Compared with existing works, our proposed scheme is more efficient in terms of privacy-preserving k-NN query. Specifically, our proposed scheme can achieve k-NN computation over encrypted data with O(lk log N) computational complexity, where l and N respectively denote the data dimension and the total number of data. In addition, detailed security analysis shows that our proposed scheme is really privacy-preserving under our security model and performance evaluation also indicates that our proposed scheme is indeed efficient in terms of computational cost.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
    Lian, Huijuan
    Qiu, Weidong
    Yan, Di
    Huang, Zheng
    Guo, Jie
    [J]. COMPLEXITY, 2017,
  • [22] Achieving Efficient and Privacy-Preserving Top-k Query over Vertically Distributed Data Sources
    Zheng, Yandong
    Lu, Rongxing
    Yang, Xue
    Shao, Jun
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [23] Privacy-preserving k-NN interpolation over two encrypted databases
    Osmanoglu, Murat
    Demir, Salih
    Tugrul, Bulent
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8
  • [24] EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
    Li, Lichun
    Lu, Rongxing
    Huang, Cheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02): : 206 - 218
  • [25] KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare
    Zhang, Zian
    Bao, Haiyong
    Lu, Rongxing
    Huang, Cheng
    Li, Beibei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 7918 - 7934
  • [26] Privacy-preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor Networks
    Zeng, Juru
    Chen, Hong
    Lai, Weiling
    Liu, Ying
    Li, Cuiping
    Wang, Shan
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 480 - 486
  • [27] kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data
    Guan, Yunguo
    Lu, Rongxing
    Zhang, Songnian
    Zheng, Yandong
    Shao, Jun
    Wei, Guiyi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2750 - 2765
  • [28] PRIVACY-PRESERVING K-NN COMPUTATION OVER ENCRYPTED CLOUD DATA WITHOUT KEY SHARING
    Wang, ShaoHui
    Liu, Tian
    Xiao, Fu
    Wang, Ruchuan
    [J]. PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 398 - 403
  • [29] A privacy-preserving aggregate query scheme on outsourced databases
    Jiang, Ya-Jun
    Yang, Bo
    Zhang, Ming-Wu
    Chen, Xu-Ri
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (03): : 721 - 725
  • [30] Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data
    Guan, Yunguo
    Lu, Rongxing
    Zheng, Yandong
    Shao, Jun
    Wei, Guiyi
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,