Skip to main content

Secure Similarity Queries: Enabling Precision Medicine with Privacy

  • Conference paper
  • First Online:
Biomedical Data Management and Graph Online Querying (Big-O(Q) 2015, DMAH 2015)

Abstract

Up till now, most medical treatments are designed for average patients. However, one size doesn’t fit all, treatments that work well for some patients may not work for others. Precision medicine is an emerging approach for disease treatment and prevention that takes into account individual variability in people’s genes, environments, lifestyles, etc. A critical component for precision medicine is to search existing treatments for a new patient by similarity queries. However, this also raises significant concerns about patient privacy, i.e., how such sensitive medical data would be managed and queried while ensuring patient privacy? In this paper, we (1) briefly introduce the background of the precision medicine initiative, (2) review existing secure kNN queries and introduce a new class of secure skyline queries, (3) summarize the challenges and investigate potential techniques for secure skyline queries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Börzsönyi, S., Kossmann, D., Stocker, K.: The skyline operator. In: Proceedings of the 17th International Conference on Data Engineering, 2–6 April 2001, Heidelberg, pp. 421–430 (2001)

    Google Scholar 

  3. Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.M.: Toward privacy in public databases. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 363–385. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Chen, R., Mohammed, N., Fung, B.C.M., Desai, B.C., Xiong, L.: Publishing set-valued data via differential privacy. PVLDB 4(11), 1087–1098 (2011)

    Google Scholar 

  5. Collins, F.S., Varmus, H.: A new initiative on precision medicine. New Engl. J. Med. 1(1), 793–795 (2015)

    Article  Google Scholar 

  6. Dellis, E., Seeger, B.: Efficient computation of reverse skyline queries. In: Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, 23–27 September 2007, pp. 291–302 (2007)

    Google Scholar 

  7. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th International Conference on Data Engineering, ICDE 2014, Chicago, March 31 - April 4 2014, pp. 664–675 (2014)

    Google Scholar 

  9. Fan, L., Bonomi, L., Xiong, L., Sunderam, V.S.: Monitoring web browsing behavior with differential privacy. In: 23rd International World Wide Web Conference, WWW 2014, Seoul, 7–11 April 2014, pp. 177–188 (2014)

    Google Scholar 

  10. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14 (2010)

    Article  Google Scholar 

  11. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, May 31 - June 2, 2009, pp. 169–178 (2009)

    Google Scholar 

  12. Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)

    Article  MATH  Google Scholar 

  13. Ghinita, G., Rughinis, R.: An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. In: Fourth ACM Conference on Data and Application Security and Privacy, CODASPY 2014, San Antonio, 03–05 March 2014, pp. 321–332 (2014)

    Google Scholar 

  14. Hashem, T., Kulik, L., Zhang, R.: Privacy preserving group nearest neighbor queries. In: Proceedings EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, 22–26 March 2010, pp. 489–500 (2010)

    Google Scholar 

  15. Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of the 27th International Conference on Data Engineering, ICDE 11–16 April 2011, Hannover, pp. 601–612 (2011)

    Google Scholar 

  16. Janosi, A., Steinbrunn, W., Pfisterer, M., Detrano, R.: Heart disease datase. In: The UCI Archive (1998). https://archive.ics.uci.edu/ml/datasets/Heart+Disease

  17. Kirkpatrick, D.G., Seidel, R.: Output-size sensitive algorithms for finding maximal vectors. In: Proceedings of the First Annual Symposium on Computational Geometry, Baltimore, 5–7 June 1985, pp. 89–96 (1985)

    Google Scholar 

  18. Kung, H.T., Luccio, F., Preparata, F.P.: On finding the maxima of a set of vectors. J. ACM 22(4), 469–476 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  19. Li, H., Xiong, L., Jiang, X.: Differentially private synthesization of multi-dimensional data using copula functions. In: Proceedings of the 17th International Conference on Extending Database Technology, EDBT 2014, Athens, 24–28 March 2014, pp. 475–486 (2014)

    Google Scholar 

  20. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, 15–20 April 2007, pp. 106–115 (2007)

    Google Scholar 

  21. Liu, J., Luo, J., Huang, J.Z.: Rating: Privacy preservation for multiple attributes with different sensitivity requirements. In: IEEE 11th International Conference on Data Mining Workshops (ICDMW), Vancouver, 11 December 2011, pp. 666–673 (2011)

    Google Scholar 

  22. Liu, J., Xiong, L., Pei, J., Luo, J., Zhang, H.: Finding pareto optimal groups: group-based skyline. PVLDB 8(13), 2086–2097 (2015)

    Google Scholar 

  23. Liu, J., Xiong, L., Xu, X.: Faster output-sensitive skyline computation algorithm. Inf. Process. Lett. 114(12), 710–713 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  24. Liu, J., Zhang, H., Xiong, L., Li, H., Luo, J.: Finding probabilistic k-skyline sets on uncertain data. In: Proceedings of the 24rd ACM International Conference on Conference on Information and Knowledge Management, CIKM 2015, Melbourne, 19–23 October 2015

    Google Scholar 

  25. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3–8 April 2006, Atlanta, p. 24 (2006)

    Google Scholar 

  26. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)

    Google Scholar 

  27. Papadias, D., Tao, Y., Fu, G., Seeger, B.: Progressive skyline computation in database systems. ACM Trans. Database Syst. 30(1), 41–82 (2005)

    Article  Google Scholar 

  28. Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. PVLDB 3(1), 619–629 (2010)

    Google Scholar 

  29. Pei, J., Jiang, B., Lin, X., Yuan, Y.: Probabilistic skylines on uncertain data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, 23–27 September 2007, pp. 15–26 (2007)

    Google Scholar 

  30. Pramanik, S., Li, J.: Fast approximate search algorithm for nearest neighbor queries in high dimensions. In: Proceedings of the 15th International Conference on Data Engineering, Sydney, 23–26 March 1999, p. 251 (1999)

    Google Scholar 

  31. Qi, Y., Atallah, M.J.: Efficient privacy-preserving k-nearest neighbor search. In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17–20 June 2008, Beijing, pp. 311–319 (2008)

    Google Scholar 

  32. Shahabi, C., Tang, L.A., Xing, S.: Indexing land surface for efficient kNN query. PVLDB 1(1), 1020–1031 (2008)

    Google Scholar 

  33. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  34. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, June 29 - July 2 2009, pp. 139–152 (2009)

    Google Scholar 

  35. Xiao, Y., Xiong, L., Yuan, C.: Differentially private data release through multidimensional partitioning. In: Jonker, W., Petković, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 150–168. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  36. Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, 8–12 April 2013, pp. 733–744 (2013)

    Google Scholar 

  37. Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical k nearest neighbor queries with location privacy. In: IEEE 30th International Conference on Data Engineering, ICDE 2014, Chicago, March 31 - April 4 2014, pp. 640–651 (2014)

    Google Scholar 

Download references

Acknowledgement

The authors would like to thank the anonymous reviewers for their helpful comments. This research was partially supported by the National Institute of General Medical Sciences of the National Institutes of Health under award number R01GM114612 and the Patient-Centered Outcomes Research Institute (PCORI) under award ME-1310-07058.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinfei Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, J., Xiong, L. (2016). Secure Similarity Queries: Enabling Precision Medicine with Privacy. In: Wang, F., Luo, G., Weng, C., Khan, A., Mitra, P., Yu, C. (eds) Biomedical Data Management and Graph Online Querying. Big-O(Q) DMAH 2015 2015. Lecture Notes in Computer Science(), vol 9579. Springer, Cham. https://doi.org/10.1007/978-3-319-41576-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41576-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41575-8

  • Online ISBN: 978-3-319-41576-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics