Advertisement

Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data

  • Yandong Zheng
  • Rongxing LuEmail author
  • Jun Shao
Mobile & Wireless Health
  • 131 Downloads
Part of the following topical collections:
  1. Security and Privacy in Smart Connected Health Systems

Abstract

The boom of Internet of Things devices promotes huge volumes of eHealthcare data will be collected and aggregated at eHealthcare provider. With the help of these health data, eHealthcare provider can offer reliable data service (e.g., k-NN query) to doctors for better diagnosis. However, the IT facility in the eHealthcare provider is incompetent with the huge volumes of eHealthcare data, so one popular solution is to deploy a powerful cloud and appoint the cloud to execute the k-NN query service. In this case, since the eHealthcare data are very sensitive yet cloud servers are not fully trusted, directly executing the k-NN query service in the cloud inevitably incurs privacy challenges. Apart from the privacy issues, efficiency issues also need to be taken into consideration because achieving privacy requirement will incur additional computational cost. However, existing focuses on k-NN query do not (fully) consider the data privacy or are inefficient. For instance, the best computational complexity of k-NN query over encrypted eHealthcare data in the cloud is as large as \(O(k\log ^{3} N)\), where N is the total number of data. In this paper, aiming at addressing the privacy and efficiency challenges, we design an efficient and privacy-preserving k-NN query scheme for encrypted outsourced eHealthcare data. Our proposed scheme is characterized by integrating the k d-tree with the homomorphic encryption technique for efficient storing encrypted data in the cloud and processing privacy-preserving k-NN query over encrypted data. Compared with existing works, our proposed scheme is more efficient in terms of privacy-preserving k-NN query. Specifically, our proposed scheme can achieve k-NN computation over encrypted data with \(O(lk\log N)\) computational complexity, where l and N respectively denote the data dimension and the total number of data. In addition, detailed security analysis shows that our proposed scheme is really privacy-preserving under our security model and performance evaluation also indicates that our proposed scheme is indeed efficient in terms of computational cost.

Keywords

k-NN query k d-tree eHealthcare data Privacy preservation 

Notes

Funding Information

This research was supported in part by NSERC Discovery Grants (04009), NBIf Start-Up Grant (Rif 2017-012), HMF2017 YS-04, LMCRF-S-2018-03, ZJNSF under Grant LZ18F020003 and NSFC under Grants 61472364.

Compliance with Ethical Standards

Conflict of interests

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. 1.
  2. 2.
    Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563–574, 2004Google Scholar
  3. 3.
    Beis, J.S., and Lowe, D.G.: Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In: 1997 Conference on Computer Vision and Pattern Recognition (CVPR ’97), pp. 1000–1006, 1997Google Scholar
  4. 4.
    Elmehdwi, Y., Samanthula, B.K., and Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: International Conference on Data Engineering, pp. 664–675, 2014Google Scholar
  5. 5.
    Firouzi, F., Rahmani, A.M., Mankodiya, K., Badaroglu, M., Merrett, G.V., Wong, P., and Farahani, B., Internet-of-things and big data for smarter healthcare: From device to architecture, applications and analytics. Futur. Gener. Comput. Syst. 78:583–586, 2018.CrossRefGoogle Scholar
  6. 6.
    Friedman, J.H., Baskett, F., and Shustek, L.J., An algorithm for finding nearest neighbors. IEEE Trans. Comput. 24(10):1000–1006, 1975.CrossRefGoogle Scholar
  7. 7.
    Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., and Tan, K.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 121–132, 2008Google Scholar
  8. 8.
    Hacigümüs, H., Iyer, B.R., and Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Database Systems for Advances Applications, pp. 125–136, 2004Google Scholar
  9. 9.
    Hore, B., Mehrotra, S., Canim, M., and Kantarcioglu, M., Secure multidimensional range queries over outsourced data. VLDB J. 21(3):333–358, 2012.CrossRefGoogle Scholar
  10. 10.
    Hore, B., Mehrotra, S., and Tsudik, G.: A privacy-preserving index for range queries. In: (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp. 720–731, 2004CrossRefGoogle Scholar
  11. 11.
    Hu, H., Xu, J., Ren, C., and Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of the 27th International Conference on Data Engineering, pp. 601–612, 2011Google Scholar
  12. 12.
    Huang, C., Lu, R., Zhu, H., Shao, J., and Lin, X.: FSSR: Fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, May 30 - June 3, 2016, pp. 95–106, 2016Google Scholar
  13. 13.
    Jiang, R., Lu, R., and Choo, K.R., Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Futur. Gener. Comput. Syst. 78:392–401, 2018.CrossRefGoogle Scholar
  14. 14.
    Karuppiah, M., Li, X., Das, A.K., Kumari, S., and Liu, Q., Introduction to the special section on big data and iot in e-healthcare. Comput. Electr. Eng. 65:261–264, 2018.CrossRefGoogle Scholar
  15. 15.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, pp. 223–238, 1999Google Scholar
  16. 16.
    Qi, Y., and Atallah, M.J.: Efficient privacy-preserving k-nearest neighbor search. In: 28th IEEE International Conference on Distributed Computing Systems, pp. 311–319, 2008Google Scholar
  17. 17.
    Shaneck, M., Kim, Y., and Kumar, V.: Privacy preserving nearest neighbor search. In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining, pp. 541–545, 2006Google Scholar
  18. 18.
    Wong, W.K., Cheung, D.W., Kao, B., and Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 139–152, 2009Google Scholar
  19. 19.
    Xu, R., Morozov, K., Yang, Y., Zhou, J., and Takagi, T., Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Comput. Secur. 69:65–83, 2017.CrossRefGoogle Scholar
  20. 20.
    Yang, X., Lu, R., Choo, K.K.R., Yin, F., and Tang, X.: Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Transactions on Big Data, 2017Google Scholar
  21. 21.
    Yao, B., Li, F., and Xiao, X.: Secure nearest neighbor revisited. In: 29th IEEE International Conference on Data Engineering, pp. 733–744, 2013Google Scholar
  22. 22.
    Yekta, N.I., and Lu, R.: Xrquery: Achieving communication-efficient privacy-preserving query for fog-enhanced iot. In: 2018 IEEE International conference on communications, ICC 2018, Kansas city, May 20-24, 2018, pp. 1–6, 2018Google Scholar
  23. 23.
    Zheng, Y., and Lu, R.: An efficient and privacy-preserving k-nn query scheme for ehealthcare data. In: 2018 IEEE Conference on green computing and communications, pp. 358–365, 2018Google Scholar
  24. 24.
    Zhu, Y., Xu, R., and Takagi, T.: Secure k-nn computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing, pp. 55–60, 2013Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Faculty of Computer ScienceUniversity of New BrunswickFrederictonCanada
  2. 2.School of Computer and Information EngineeringZhejiang Gongshang UniversityHangzhouChina

Personalised recommendations