Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare

As a consequence of advance in the Internet of Things (IoT) and big data technology, smart eHealthcare has emerged and greatly enabled patients to enjoy high-quality healthcare services in disease prediction, clinical decision making and healthcare surveillance. Meanwhile, in order to support the dramatic increase of healthcare data, healthcare centers often outsource the on-premises data to a powerful cloud and deploy the cloud server to manage the data. However, since the healthcare data usually contain some sensitive information and also the cloud server is not fully trusted, healthcare centers need to encrypt the data before outsourcing them to the cloud. Unfortunately, data encryption inevitably hinders some advanced applications of the data like the similarity range query in cloud. Although many studies on similarity range query over encrypted data have been reported, most of them still have some limitations in security, efficiency and practicality. Aiming at this challenge, in this paper, we propose a new efficient privacy-preserving similarity range query (EPSim) scheme. Specifically, we first present a modified asymmetric scalar-product-preserving encryption (ASPE) scheme and prove it is selectively secure. Then, we introduce a Quadsector tree to represent the data, and employ a filtration condition to design an efficient algorithm for efficient similarity range queries over the Quadsector tree. Finally, we propose our EPSim scheme by integrating the modified ASPE scheme and Quadsector tree. Detailed security analysis indicates that our proposed EPSim scheme is really secure. In addition, extensive performance evaluations are conducted, and the results also demonstrate it is efficient and practical.

[1]  Debdeep Mukhopadhyay,et al.  Efficient Secure k-Nearest Neighbours over Encrypted Data , 2018, EDBT.

[2]  Rongxing Lu,et al.  A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT , 2019, IEEE Internet of Things Journal.

[3]  Petros Boufounos,et al.  Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.

[4]  Tsuyoshi Takagi,et al.  Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..

[5]  Keke Chen,et al.  Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation , 2012, IEEE Transactions on Knowledge and Data Engineering.

[6]  Panos Kalnis,et al.  Outsourced Similarity Search on Metric Data Assets , 2012, IEEE Transactions on Knowledge and Data Engineering.

[7]  Cong Wang,et al.  Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records , 2015, ESORICS.

[8]  Richard C. H. Connor,et al.  Hilbert Exclusion , 2016, ACM Trans. Inf. Syst..

[9]  Rongxing Lu,et al.  Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[10]  Rui Li,et al.  SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud , 2019, 2019 IEEE 35th International Conference on Data Engineering (ICDE).

[11]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[12]  Osmar R. Zaïane,et al.  Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..

[13]  Feifei Li,et al.  Secure nearest neighbor revisited , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).

[14]  Dongxi Liu,et al.  Result Pattern Hiding Searchable Encryption for Conjunctive Queries , 2018, CCS.

[15]  Rong Jin,et al.  Approximate kernel k-means: solution to large scale kernel clustering , 2011, KDD.

[16]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[17]  Wei Jiang,et al.  Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.

[18]  Rongxing Lu,et al.  Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data , 2019, Journal of Medical Systems.

[19]  Hong Rong,et al.  Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database , 2018, IEEE Access.

[20]  Cong Wang,et al.  Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection , 2021, IEEE Transactions on Services Computing.

[21]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[22]  Zeeshan Ahmed,et al.  Artificial intelligence with multi-functional machine learning platform development for better healthcare and precision medicine , 2020, Database J. Biol. Databases Curation.

[23]  Tsuyoshi Takagi,et al.  Secure k-NN computation on encrypted cloud data without sharing key with query users , 2013, Cloud Computing '13.

[24]  Tsuyoshi Takagi,et al.  Secure k-NN query on encrypted cloud database without key-sharing , 2013, Int. J. Electron. Secur. Digit. Forensics.

[25]  Jiantao Zhou,et al.  Privacy-Preserving Image Denoising From External Cloud Databases , 2017, IEEE Transactions on Information Forensics and Security.