Abstract
Up till now, most medical treatments are designed for average patients. However, one size doesn’t fit all, treatments that work well for some patients may not work for others. Precision medicine is an emerging approach for disease treatment and prevention that takes into account individual variability in people’s genes, environments, lifestyles, etc. A critical component for precision medicine is to search existing treatments for a new patient by similarity queries. However, this also raises significant concerns about patient privacy, i.e., how such sensitive medical data would be managed and queried while ensuring patient privacy? In this paper, we (1) briefly introduce the background of the precision medicine initiative, (2) review existing secure kNN queries and introduce a new class of secure skyline queries, (3) summarize the challenges and investigate potential techniques for secure skyline queries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)
Börzsönyi, S., Kossmann, D., Stocker, K.: The skyline operator. In: Proceedings of the 17th International Conference on Data Engineering, 2–6 April 2001, Heidelberg, pp. 421–430 (2001)
Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.M.: Toward privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 363–385. Springer, Heidelberg (2005)
Chen, R., Mohammed, N., Fung, B.C.M., Desai, B.C., Xiong, L.: Publishing set-valued data via differential privacy. PVLDB 4(11), 1087–1098 (2011)
Collins, F.S., Varmus, H.: A new initiative on precision medicine. New Engl. J. Med. 1(1), 793–795 (2015)
Dellis, E., Seeger, B.: Efficient computation of reverse skyline queries. In: Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, 23–27 September 2007, pp. 291–302 (2007)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th International Conference on Data Engineering, ICDE 2014, Chicago, March 31 - April 4 2014, pp. 664–675 (2014)
Fan, L., Bonomi, L., Xiong, L., Sunderam, V.S.: Monitoring web browsing behavior with differential privacy. In: 23rd International World Wide Web Conference, WWW 2014, Seoul, 7–11 April 2014, pp. 177–188 (2014)
Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14 (2010)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, May 31 - June 2, 2009, pp. 169–178 (2009)
Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)
Ghinita, G., Rughinis, R.: An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. In: Fourth ACM Conference on Data and Application Security and Privacy, CODASPY 2014, San Antonio, 03–05 March 2014, pp. 321–332 (2014)
Hashem, T., Kulik, L., Zhang, R.: Privacy preserving group nearest neighbor queries. In: Proceedings EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, 22–26 March 2010, pp. 489–500 (2010)
Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of the 27th International Conference on Data Engineering, ICDE 11–16 April 2011, Hannover, pp. 601–612 (2011)
Janosi, A., Steinbrunn, W., Pfisterer, M., Detrano, R.: Heart disease datase. In: The UCI Archive (1998). https://archive.ics.uci.edu/ml/datasets/Heart+Disease
Kirkpatrick, D.G., Seidel, R.: Output-size sensitive algorithms for finding maximal vectors. In: Proceedings of the First Annual Symposium on Computational Geometry, Baltimore, 5–7 June 1985, pp. 89–96 (1985)
Kung, H.T., Luccio, F., Preparata, F.P.: On finding the maxima of a set of vectors. J. ACM 22(4), 469–476 (1975)
Li, H., Xiong, L., Jiang, X.: Differentially private synthesization of multi-dimensional data using copula functions. In: Proceedings of the 17th International Conference on Extending Database Technology, EDBT 2014, Athens, 24–28 March 2014, pp. 475–486 (2014)
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, 15–20 April 2007, pp. 106–115 (2007)
Liu, J., Luo, J., Huang, J.Z.: Rating: Privacy preservation for multiple attributes with different sensitivity requirements. In: IEEE 11th International Conference on Data Mining Workshops (ICDMW), Vancouver, 11 December 2011, pp. 666–673 (2011)
Liu, J., Xiong, L., Pei, J., Luo, J., Zhang, H.: Finding pareto optimal groups: group-based skyline. PVLDB 8(13), 2086–2097 (2015)
Liu, J., Xiong, L., Xu, X.: Faster output-sensitive skyline computation algorithm. Inf. Process. Lett. 114(12), 710–713 (2014)
Liu, J., Zhang, H., Xiong, L., Li, H., Luo, J.: Finding probabilistic k-skyline sets on uncertain data. In: Proceedings of the 24rd ACM International Conference on Conference on Information and Knowledge Management, CIKM 2015, Melbourne, 19–23 October 2015
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3–8 April 2006, Atlanta, p. 24 (2006)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
Papadias, D., Tao, Y., Fu, G., Seeger, B.: Progressive skyline computation in database systems. ACM Trans. Database Syst. 30(1), 41–82 (2005)
Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. PVLDB 3(1), 619–629 (2010)
Pei, J., Jiang, B., Lin, X., Yuan, Y.: Probabilistic skylines on uncertain data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, 23–27 September 2007, pp. 15–26 (2007)
Pramanik, S., Li, J.: Fast approximate search algorithm for nearest neighbor queries in high dimensions. In: Proceedings of the 15th International Conference on Data Engineering, Sydney, 23–26 March 1999, p. 251 (1999)
Qi, Y., Atallah, M.J.: Efficient privacy-preserving k-nearest neighbor search. In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17–20 June 2008, Beijing, pp. 311–319 (2008)
Shahabi, C., Tang, L.A., Xing, S.: Indexing land surface for efficient kNN query. PVLDB 1(1), 1020–1031 (2008)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)
Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, June 29 - July 2 2009, pp. 139–152 (2009)
Xiao, Y., Xiong, L., Yuan, C.: Differentially private data release through multidimensional partitioning. In: Jonker, W., Petković, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 150–168. Springer, Heidelberg (2010)
Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, 8–12 April 2013, pp. 733–744 (2013)
Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical k nearest neighbor queries with location privacy. In: IEEE 30th International Conference on Data Engineering, ICDE 2014, Chicago, March 31 - April 4 2014, pp. 640–651 (2014)
Acknowledgement
The authors would like to thank the anonymous reviewers for their helpful comments. This research was partially supported by the National Institute of General Medical Sciences of the National Institutes of Health under award number R01GM114612 and the Patient-Centered Outcomes Research Institute (PCORI) under award ME-1310-07058.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, J., Xiong, L. (2016). Secure Similarity Queries: Enabling Precision Medicine with Privacy. In: Wang, F., Luo, G., Weng, C., Khan, A., Mitra, P., Yu, C. (eds) Biomedical Data Management and Graph Online Querying. Big-O(Q) DMAH 2015 2015. Lecture Notes in Computer Science(), vol 9579. Springer, Cham. https://doi.org/10.1007/978-3-319-41576-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-41576-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41575-8
Online ISBN: 978-3-319-41576-5
eBook Packages: Computer ScienceComputer Science (R0)