Skip to main content
Top
Published in: Journal of Medical Systems 5/2019

01-05-2019 | Mobile & Wireless Health

Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data

Authors: Yandong Zheng, Rongxing Lu, Jun Shao

Published in: Journal of Medical Systems | Issue 5/2019

Login to get access

Abstract

The boom of Internet of Things devices promotes huge volumes of eHealthcare data will be collected and aggregated at eHealthcare provider. With the help of these health data, eHealthcare provider can offer reliable data service (e.g., k-NN query) to doctors for better diagnosis. However, the IT facility in the eHealthcare provider is incompetent with the huge volumes of eHealthcare data, so one popular solution is to deploy a powerful cloud and appoint the cloud to execute the k-NN query service. In this case, since the eHealthcare data are very sensitive yet cloud servers are not fully trusted, directly executing the k-NN query service in the cloud inevitably incurs privacy challenges. Apart from the privacy issues, efficiency issues also need to be taken into consideration because achieving privacy requirement will incur additional computational cost. However, existing focuses on k-NN query do not (fully) consider the data privacy or are inefficient. For instance, the best computational complexity of k-NN query over encrypted eHealthcare data in the cloud is as large as \(O(k\log ^{3} N)\), where N is the total number of data. In this paper, aiming at addressing the privacy and efficiency challenges, we design an efficient and privacy-preserving k-NN query scheme for encrypted outsourced eHealthcare data. Our proposed scheme is characterized by integrating the k d-tree with the homomorphic encryption technique for efficient storing encrypted data in the cloud and processing privacy-preserving k-NN query over encrypted data. Compared with existing works, our proposed scheme is more efficient in terms of privacy-preserving k-NN query. Specifically, our proposed scheme can achieve k-NN computation over encrypted data with \(O(lk\log N)\) computational complexity, where l and N respectively denote the data dimension and the total number of data. In addition, detailed security analysis shows that our proposed scheme is really privacy-preserving under our security model and performance evaluation also indicates that our proposed scheme is indeed efficient in terms of computational cost.
Literature
2.
go back to reference Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563–574, 2004 Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563–574, 2004
3.
go back to reference Beis, J.S., and Lowe, D.G.: Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: 1997 Conference on Computer Vision and Pattern Recognition (CVPR ’97), pp. 1000–1006, 1997 Beis, J.S., and Lowe, D.G.: Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: 1997 Conference on Computer Vision and Pattern Recognition (CVPR ’97), pp. 1000–1006, 1997
4.
go back to reference Elmehdwi, Y., Samanthula, B.K., and Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: International Conference on Data Engineering, pp. 664–675, 2014 Elmehdwi, Y., Samanthula, B.K., and Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: International Conference on Data Engineering, pp. 664–675, 2014
5.
go back to reference Firouzi, F., Rahmani, A.M., Mankodiya, K., Badaroglu, M., Merrett, G.V., Wong, P., and Farahani, B., Internet-of-things and big data for smarter healthcare: From device to architecture, applications and analytics. Futur. Gener. Comput. Syst. 78:583–586, 2018.CrossRef Firouzi, F., Rahmani, A.M., Mankodiya, K., Badaroglu, M., Merrett, G.V., Wong, P., and Farahani, B., Internet-of-things and big data for smarter healthcare: From device to architecture, applications and analytics. Futur. Gener. Comput. Syst. 78:583–586, 2018.CrossRef
6.
go back to reference Friedman, J.H., Baskett, F., and Shustek, L.J., An algorithm for finding nearest neighbors. IEEE Trans. Comput. 24(10):1000–1006, 1975.CrossRef Friedman, J.H., Baskett, F., and Shustek, L.J., An algorithm for finding nearest neighbors. IEEE Trans. Comput. 24(10):1000–1006, 1975.CrossRef
7.
go back to reference Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., and Tan, K.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 121–132, 2008 Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., and Tan, K.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 121–132, 2008
8.
go back to reference Hacigümüs, H., Iyer, B.R., and Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Database Systems for Advances Applications, pp. 125–136, 2004 Hacigümüs, H., Iyer, B.R., and Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Database Systems for Advances Applications, pp. 125–136, 2004
9.
go back to reference Hore, B., Mehrotra, S., Canim, M., and Kantarcioglu, M., Secure multidimensional range queries over outsourced data. VLDB J. 21(3):333–358, 2012.CrossRef Hore, B., Mehrotra, S., Canim, M., and Kantarcioglu, M., Secure multidimensional range queries over outsourced data. VLDB J. 21(3):333–358, 2012.CrossRef
10.
go back to reference Hore, B., Mehrotra, S., and Tsudik, G.: A privacy-preserving index for range queries. In: (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp. 720–731, 2004CrossRef Hore, B., Mehrotra, S., and Tsudik, G.: A privacy-preserving index for range queries. In: (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp. 720–731, 2004CrossRef
11.
go back to reference Hu, H., Xu, J., Ren, C., and Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of the 27th International Conference on Data Engineering, pp. 601–612, 2011 Hu, H., Xu, J., Ren, C., and Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of the 27th International Conference on Data Engineering, pp. 601–612, 2011
12.
go back to reference Huang, C., Lu, R., Zhu, H., Shao, J., and Lin, X.: FSSR: Fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, May 30 - June 3, 2016, pp. 95–106, 2016 Huang, C., Lu, R., Zhu, H., Shao, J., and Lin, X.: FSSR: Fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, May 30 - June 3, 2016, pp. 95–106, 2016
13.
go back to reference Jiang, R., Lu, R., and Choo, K.R., Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Futur. Gener. Comput. Syst. 78:392–401, 2018.CrossRef Jiang, R., Lu, R., and Choo, K.R., Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Futur. Gener. Comput. Syst. 78:392–401, 2018.CrossRef
14.
go back to reference Karuppiah, M., Li, X., Das, A.K., Kumari, S., and Liu, Q., Introduction to the special section on big data and iot in e-healthcare. Comput. Electr. Eng. 65:261–264, 2018.CrossRef Karuppiah, M., Li, X., Das, A.K., Kumari, S., and Liu, Q., Introduction to the special section on big data and iot in e-healthcare. Comput. Electr. Eng. 65:261–264, 2018.CrossRef
15.
go back to reference Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, pp. 223–238, 1999 Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, pp. 223–238, 1999
16.
go back to reference Qi, Y., and Atallah, M.J.: Efficient privacy-preserving k-nearest neighbor search. In: 28th IEEE International Conference on Distributed Computing Systems, pp. 311–319, 2008 Qi, Y., and Atallah, M.J.: Efficient privacy-preserving k-nearest neighbor search. In: 28th IEEE International Conference on Distributed Computing Systems, pp. 311–319, 2008
17.
go back to reference Shaneck, M., Kim, Y., and Kumar, V.: Privacy preserving nearest neighbor search. In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining, pp. 541–545, 2006 Shaneck, M., Kim, Y., and Kumar, V.: Privacy preserving nearest neighbor search. In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining, pp. 541–545, 2006
18.
go back to reference Wong, W.K., Cheung, D.W., Kao, B., and Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 139–152, 2009 Wong, W.K., Cheung, D.W., Kao, B., and Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 139–152, 2009
19.
go back to reference Xu, R., Morozov, K., Yang, Y., Zhou, J., and Takagi, T., Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Comput. Secur. 69:65–83, 2017.CrossRef Xu, R., Morozov, K., Yang, Y., Zhou, J., and Takagi, T., Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Comput. Secur. 69:65–83, 2017.CrossRef
20.
go back to reference Yang, X., Lu, R., Choo, K.K.R., Yin, F., and Tang, X.: Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Transactions on Big Data, 2017 Yang, X., Lu, R., Choo, K.K.R., Yin, F., and Tang, X.: Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Transactions on Big Data, 2017
21.
go back to reference Yao, B., Li, F., and Xiao, X.: Secure nearest neighbor revisited. In: 29th IEEE International Conference on Data Engineering, pp. 733–744, 2013 Yao, B., Li, F., and Xiao, X.: Secure nearest neighbor revisited. In: 29th IEEE International Conference on Data Engineering, pp. 733–744, 2013
22.
go back to reference Yekta, N.I., and Lu, R.: Xrquery: Achieving communication-efficient privacy-preserving query for fog-enhanced iot. In: 2018 IEEE International conference on communications, ICC 2018, Kansas city, May 20-24, 2018, pp. 1–6, 2018 Yekta, N.I., and Lu, R.: Xrquery: Achieving communication-efficient privacy-preserving query for fog-enhanced iot. In: 2018 IEEE International conference on communications, ICC 2018, Kansas city, May 20-24, 2018, pp. 1–6, 2018
23.
go back to reference Zheng, Y., and Lu, R.: An efficient and privacy-preserving k-nn query scheme for ehealthcare data. In: 2018 IEEE Conference on green computing and communications, pp. 358–365, 2018 Zheng, Y., and Lu, R.: An efficient and privacy-preserving k-nn query scheme for ehealthcare data. In: 2018 IEEE Conference on green computing and communications, pp. 358–365, 2018
24.
go back to reference Zhu, Y., Xu, R., and Takagi, T.: Secure k-nn computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing, pp. 55–60, 2013 Zhu, Y., Xu, R., and Takagi, T.: Secure k-nn computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing, pp. 55–60, 2013
Metadata
Title
Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data
Authors
Yandong Zheng
Rongxing Lu
Jun Shao
Publication date
01-05-2019
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2019
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-019-1229-1

Other articles of this Issue 5/2019

Journal of Medical Systems 5/2019 Go to the issue