Reliable and Privacy-Preserving Top-k Disease Matching Schemes for E-Healthcare Systems

被引:4
|
作者
Xu, Chang [1 ]
Wang, Ningning [2 ]
Zhu, Liehuang [1 ]
Zhang, Chuan [1 ]
Sharif, Kashif [2 ]
Wu, Huishu [3 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[3] China Univ Polit Sci & Law, Dept Int Law Sch, Beijing 100088, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 07期
基金
中国国家自然科学基金;
关键词
Euclidean distances; homomorphic encryption; privacy preserving; secure k-nearest neighbor (kNN); top-k disease matching; PREDICTION SCHEME; EFFICIENT; INTERNET; THINGS;
D O I
10.1109/JIOT.2021.3111739
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of body sensors, cloud computing, and mobile communication technologies has significantly improved the development and availability of e-healthcare systems. In an e-healthcare system, health service providers upload real patients' clinical data and diagnostic treatments to the cloud server. Afterward, the users can submit queries with specific body sensor parameters, to obtaining pertinent k diagnostic files. The results are ranked based on ranking algorithms that match the query parameters to the ones in diagnostic files. However, privacy concerns arise while matching disease, since the clinical data and diagnostic files contain sensitive information. In this work, we propose two reliable and privacy-preserving Top-k disease matching schemes. The first scheme is constructed based on our proposed weighted Euclidean distance comparison algorithm under secure k-nearest neighbor technique to get k diagnostic files. It allows users to set different weights for each body indicator as per their needs. The second scheme is designed by comparing Euclidean distances under the modified Paillier homomorphic encryption algorithm where a superlinear sequence is used to reduce the computational and communication overhead. The user side incurs slightly higher computational costs, but the trusted party does not need to execute encryption operations. Hence, the proposed two schemes can be applied in different application scenarios. Simulations on synthetic and real data prove the efficiency of the schemes, and security analysis establishes the privacy-preservation properties.
引用
收藏
页码:5537 / 5547
页数:11
相关论文
共 50 条
  • [1] Privacy-preserving top-k queries
    Vaidya, J
    Clifton, C
    ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 545 - 546
  • [2] A privacy-preserving cryptosystem for IoT E-healthcare
    Hamza, Rafik
    Yan, Zheng
    Muhammad, Khan
    Bellavista, Paolo
    Titouna, Faiza
    INFORMATION SCIENCES, 2020, 527 (527) : 493 - 510
  • [3] Privacy-Preserving Top-k Query Processing in Distributed Systems
    Mahboubi, Sakina
    Akbarinia, Reza
    Valduriez, Patrick
    EURO-PAR 2018: PARALLEL PROCESSING, 2018, 11014 : 281 - 292
  • [4] SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems
    Masmoudi, Souha
    Kaaniche, Nesrine
    Laurent, Maryline
    IEEE ACCESS, 2022, 10 : 106400 - 106414
  • [5] An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare
    Yang, Xue
    Lu, Rongxing
    Shao, Jun
    Tang, Xiaohu
    Yang, Haomiao
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 3284 - 3297
  • [6] PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems
    Zhou, Jun
    Cao, Zhenfu
    Dong, Xiaolei
    Lin, Xiaodong
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2015, 9 (07) : 1332 - 1344
  • [7] Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare
    Wang, Fengwei
    Zhu, Hui
    Liu, Ximeng
    Lu, Rongxing
    Hua, Jiafeng
    Li, Hui
    Li, Hao
    IEEE ACCESS, 2019, 7 : 166054 - 166065
  • [8] Privacy-Preserving Wireless Sensor Networks for E-Healthcare Applications
    Samha, Amani K.
    Alshammri, Ghalib H.
    Pani, Niroj Kumar
    Misra, Yogesh
    Kolluru, Venkata Ratnam
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2024,
  • [9] Privacy-Preserving Top-k Route Computation in Indoor Environments
    Kim, Dae-Ho
    Jang, Beakcheol
    Kim, Jong Wook
    IEEE ACCESS, 2018, 6 : 56109 - 56121
  • [10] Privacy-Preserving Byzantine-Resilient Swarm Learning for E-Healthcare
    Zhu, Xudong
    Lai, Teng
    Li, Hui
    APPLIED SCIENCES-BASEL, 2024, 14 (12):