Privacy-preserving voice-based search over mHealth data

Abstract Voice-enabled devices have a potential to significantly improve the healthcare systems as smart personal assistants. They usually come with a hands-free feature to add an extra level of usability and convenience to elderly, disabled people and patients. In this paper, we propose a privacy-preserving voice-based search scheme to enhance the privacy of in-home healthcare applications. We consider an application scenario where patients use the devices to communicate with their caregivers by recording and uploading their voices to the servers, where the caregivers can search the interested voices of their patients based on the voice content, mood, tone and background sounds. Our scheme preserves the richness and privacy of voice data and enables accurate and efficient voice-based search, while in current systems that use speech recognition, the richness and privacy of voice data are compromised. Specifically, our scheme achieves the privacy by employing a privacy-preserving voice feature matching technique and a novel category-based encryption; only encrypted voice data is uploaded to the server who is unable to access the original voice data. In addition, our scheme enables the server to selectively and accurately respond to caregivers' queries on the voice data based on voice similarities. We evaluate our scheme through real experiments and show that our scheme even with privacy preservation can successfully match similar voice data at an average accuracy of 80.8%.

[1]  D. Ceer Pervasive medical devices: less invasive, more productive , 2006, IEEE Pervasive Computing.

[2]  Bo Zhang,et al.  An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..

[3]  Gerhard Nussbaum People with Disabilities: Assistive Homes and Environments , 2006, ICCHP.

[4]  Michel Vacher,et al.  On-line human activity recognition from audio and home automation sensors: Comparison of sequential and non-sequential models in realistic Smart Homes , 2016, J. Ambient Intell. Smart Environ..

[5]  Xiaohui Liang,et al.  SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing , 2014, Secur. Commun. Networks.

[6]  Tuomas Virtanen,et al.  Context-dependent sound event detection , 2013, EURASIP Journal on Audio, Speech, and Music Processing.

[7]  Thomas R. Ioerger,et al.  Precision and Disclosure in Text and Voice Interviews on Smartphones , 2015, PloS one.

[8]  Geeta Nijhawan,et al.  ISOLATED SPEECH RECOGNITIONUSING MFCC AND DTW , 2013 .

[9]  D. Keltner,et al.  The voice conveys emotion in ten globalized cultures and one remote village in Bhutan. , 2016, Emotion.

[10]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[11]  Xiaohui Liang,et al.  Proxy re-encryption with keyword search , 2010, Inf. Sci..

[12]  Nidhika Birla,et al.  VOICE COMMAND RECOGNITION SYSTEM BASED ON MFCC AND DTW , 2010 .

[13]  Ruixuan Li,et al.  Efficient multi-keyword ranked query over encrypted data in cloud computing , 2014, Future Gener. Comput. Syst..

[14]  Yi Yang,et al.  Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[15]  Xiaohui Liang,et al.  Fully Anonymous Profile Matching in Mobile Social Networks , 2013, IEEE Journal on Selected Areas in Communications.