Abstract
Recent years have witnessed the advent of technologies such as the Internet of Things, cloud computing, and big data. Also, the analysis and research of data have attracted more and more attention from researchers. For example, the analysis of medical data can help government agencies do right decisions in public health services, or assist medical research institutes in conducting medical research. But it is followed by the privacy preserving of patient medical data in a cloud environment. Our paper proposes a problem-solving scheme that is a k-anonymous privacy preserving scheme based on bilinear pairings (KPSBP) which combines k-anonymity and secure searchable encryption to ensure the patient data privacy is not compromised and the medical data is well shared.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Blake, C., Merz, C.: UCI repository of machine learning databases (1998)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel and Distrib. Syst. 25(1), 222–233 (2013)
Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917–922. IEEE (2012)
Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.: Toward privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 363–385. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_20
Chen, F., et al.: An infrastructure framework for privacy protection of community medical Internet of Things. World Wide Web 21(1), 33–57 (2017). https://doi.org/10.1007/s11280-017-0455-z
Cui, J., Zhou, H., Zhong, H., Xu, Y.: AKSER: attribute-based keyword search with efficient revocation in cloud computing. Inf. Sci. 423, 343–352 (2018)
Friedman, J.H., Bentley, J.L., Finkel, R.A.: An algorithm for finding best matches in logarithmic time. ACM Trans. Math. Softw. 3, 209–226 (1976). (SLAC-PUB-1549-REV. 2)
LeFevre, K., DeWitt, D.J., Ramakrishnan, R., et al.: Mondrian multidimensional k-anonymity. In: ICDE, vol. 6, p. 25 (2006)
Mahdavi-Hezavehi, S., Alimardani, Y., Rahmani, R.: An efficient framework for a third party auditor in cloud computing environments. Comput. J. (2019)
Rong, H., Wang, H.M., Liu, J., Xian, M.: Privacy-preserving k-nearest neighbor computation in multiple cloud environments. IEEE Access 4, 9589–9603 (2016)
Ronglei, H., Yanqiong, H., Ping, Z., Xiaohong, F.: Design and implementation of medical privacy protection scheme in big data environment. Netinfo Secur. (2018)
Seidl, R., Goetze, N., Bauer-Hermann, M.: Certificate authority, US Patent 9,979,716, 22 May 2018
Shi, E., Bethencourt, J., Chan, T.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 350–364. IEEE (2007)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44–55. IEEE (2000)
Steinberg, M.J., Rubin, E.R.: The HIPAA privacy rule: Lacks patient benefit, impedes research growth. Association of Academic Health Centers (2009)
Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., Wang, G.: Security and privacy in the medical internet of things: a review. Secur. Commun. Netw.2018 (2018)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(05), 571–588 (2002)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Sys. 10(05), 557–570 (2002)
Tang, J., Liu, A., Zhao, M., Wang, T.: An aggregate signature based trust routing for data gathering in sensor networks. Secur. Commun. Netw. 2018 (2018)
Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566–1577 (2015)
Zhu, X.L., Chen, T.G.: Research on privacy preserving based on k-anonymity. In: He, X., Hua, E., Lin, Y., Liu, X. (eds.) Computer, Informatics, Cybernetics and Applications, pp. 915–923. Springer, Netherlands (2012). https://doi.org/10.1007/978-94-007-1839-5_99
Acknowledgements
This work is supported by National Key Research and Development Program of China (No. 2018YFB0204301).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Meng, L., Hong, X., Chen, Y., Ding, Y., Zhang, C. (2020). K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-59016-1_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59015-4
Online ISBN: 978-3-030-59016-1
eBook Packages: Computer ScienceComputer Science (R0)