KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare

被引:0
|
作者
Zhang, Zian [1 ]
Bao, Haiyong [1 ]
Lu, Rongxing [2 ]
Huang, Cheng [3 ]
Li, Beibei [4 ]
机构
[1] East China Normal Univ, Inst Software Engn, Shanghai 200062, Peoples R China
[2] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B5A3, Canada
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L3G1, Canada
[4] Sichuan Univ, Coll Cyber Sci & Engn, Chengdu 610065, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 05期
基金
中国国家自然科学基金;
关键词
Encryption; Servers; Physiology; Medical services; Indexes; Cryptography; Cloud computing; BD-PB tree; eHealthcare; FHIPPE; Hilbert exclusion condition; similarity query; SEARCH; ENCRYPTION;
D O I
10.1109/JIOT.2023.3317334
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Extensive research has been conducted on efficient and privacy-preserving similarity queries in eHealthcare, aiming at disease diagnosis based on similar patients while protecting the outsourced sensitive healthcare data. In this article, a new secure similarity query scheme named keyword-oriented multidimensional similarity query (KMSQ) is proposed for eHealthcare. Different from the state-of-the-art similar works, our proposed scheme enables users to query historical similar patients' records based on their multidimensional physiological characteristics and symptom keywords (two data types) at the same time. Although the query can be securely performed sequentially by formerly proposed schemes, we carefully tailor a binary-decision-PB ( BD-PB) tree to index the two data types simultaneously for efficient queries. Furthermore, inspired by the Hilbert exclusion condition and the properties of the polynomial function, an efficient query algorithm based on the BD-PB tree is designed in a filtration-verification manner, which further greatly improves the computational efficiency of queries, especially on the server side. To ensure secure query on untrusted clouds, the BD-PB tree-based KMSQ is protected through multiple encryption techniques. Specifically, function-hiding inner product preserving encryption (FHIPPE) is modified and combined with a lightweight matrix encryption technique to achieve secure data filtration. In addition, a symmetric homomorphic encryption (SHE) scheme is utilized to ensure secure verification that each candidate record in the filtration result satisfies the query requirements. Security analysis demonstrates the modified FHIPPE (MFHIPPE) and our proposed scheme meet the necessary security properties under the honest-but-curious model. Finally, extensive experiments are also conducted to show that KMSQ is computationally efficient.
引用
收藏
页码:7918 / 7934
页数:17
相关论文
共 50 条
  • [41] EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity
    Blundo, Carlo
    De Cristofaro, Emiliano
    Gasti, Paolo
    JOURNAL OF COMPUTER SECURITY, 2014, 22 (03) : 355 - 381
  • [42] Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing
    Song, Fuyuan
    Qin, Zheng
    Xue, Liang
    Zhang, Jixin
    Lin, Xiaodong
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6184 - 6198
  • [43] An efficient privacy-preserving data query and dissemination scheme in vehicular cloud
    Hu, Peng
    Wang, Yongli
    Xiao, Gang
    Zhou, Junlong
    Gong, Bei
    Wang, Yongjian
    PERVASIVE AND MOBILE COMPUTING, 2020, 65
  • [44] EPCS: an efficient and privacy-preserving classification service query framework for SVM
    Zhu, Hui
    Liu, Xiaoxia
    Lu, Rongxing
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1309 - 1320
  • [45] Energy-Efficient and Privacy-Preserving Range Query in Participatory Sensing
    Zeng, Juru
    Wu, Yuncheng
    Wu, Yao
    Chen, Hong
    Li, Cuiping
    Wang, Shan
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 876 - 883
  • [46] An efficient privacy-preserving model based on OMFTSA for query optimization in crowdsourcing
    Renukadevi, M.
    Anita, E. A. Mary
    Geetha, D. Mohana
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (24):
  • [47] SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud
    Zheng, Yandong
    Lu, Rongxing
    Zhu, Hui
    Zhang, Songnian
    Guan, Yunguo
    Shao, Jun
    Wang, Fengwei
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 888 - 903
  • [48] Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs
    Guan, Yunguo
    Lu, Rongxing
    Zhang, Songnian
    Zheng, Yandong
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON BIG DATA, 2024, 10 (02) : 146 - 157
  • [49] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [50] Enabling Efficient and Privacy-Preserving Health Query Over Outsourced Cloud
    Wang, Guoming
    Lu, Rongxing
    Guan, Yong Liang
    IEEE ACCESS, 2018, 6 : 70831 - 70842