Achieving Efficient and Privacy-Preserving k -NN Query for Outsourced eHealthcare Data

作者: Yandong Zheng , Rongxing Lu , Jun Shao , None

DOI: 10.1007/S10916-019-1229-1

关键词: Data as a serviceEncryptionComputer security modelComputer scienceInformation privacyHomomorphic encryptionSecurity analysisComputational complexity theoryCloud computingComputer network

摘要: The boom of Internet Things devices promotes huge volumes eHealthcare data will be collected and aggregated at provider. With the help these health data, provider can offer reliable service (e.g., k-NN query) to doctors for better diagnosis. However, IT facility in is incompetent with so one popular solution deploy a powerful cloud appoint execute query service. In this case, since are very sensitive yet servers not fully trusted, directly executing inevitably incurs privacy challenges. Apart from issues, efficiency issues also need taken into consideration because achieving requirement incur additional computational cost. existing focuses on do (fully) consider or inefficient. For instance, best complexity over encrypted as large $O(k\log ^{3} N)$ , where N total number data. paper, aiming addressing challenges, we design an efficient privacy-preserving scheme outsourced Our proposed characterized by integrating k d-tree homomorphic encryption technique storing processing Compared works, our more terms query. Specifically, achieve computation $O(lk\log complexity, l respectively denote dimension addition, detailed security analysis shows that really under model performance evaluation indicates indeed

参考文章(23)
Hakan Hacıgümüş, Bala Iyer, Sharad Mehrotra, Efficient Execution of Aggregation Queries over Encrypted Relational Databases database systems for advanced applications. pp. 125- 136 ,(2004) , 10.1007/978-3-540-24571-1_10
J.H. Friedman, F. Baskett, L.J. Shustek, An Algorithm for Finding Nearest Neighbors IEEE Transactions on Computers. ,vol. 24, pp. 1000- 1006 ,(1975) , 10.1109/T-C.1975.224110
Bijit Hore, Sharad Mehrotra, Mustafa Canim, Murat Kantarcioglu, Secure multidimensional range queries over outsourced data very large data bases. ,vol. 21, pp. 333- 358 ,(2012) , 10.1007/S00778-011-0245-7
Wai Kit Wong, David Wai-lok Cheung, Ben Kao, Nikos Mamoulis, Secure kNN computation on encrypted databases Proceedings of the 35th SIGMOD international conference on Management of data - SIGMOD '09. pp. 139- 152 ,(2009) , 10.1145/1559845.1559862
Youwen Zhu, Rui Xu, Tsuyoshi Takagi, Secure k-NN computation on encrypted cloud data without sharing key with query users international workshop on security. pp. 55- 60 ,(2013) , 10.1145/2484402.2484415
Bin Yao, Feifei Li, Xiaokui Xiao, Secure nearest neighbor revisited international conference on data engineering. pp. 733- 744 ,(2013) , 10.1109/ICDE.2013.6544870
J.S. Beis, D.G. Lowe, Shape indexing using approximate nearest-neighbour search in high-dimensional spaces computer vision and pattern recognition. pp. 1000- 1006 ,(1997) , 10.1109/CVPR.1997.609451
Bijit Hore, Sharad Mehrotra, Gene Tsudik, A privacy-preserving index for range queries very large data bases. pp. 720- 731 ,(2004) , 10.1016/B978-012088469-8.50064-4
Haibo Hu, Jianliang Xu, Chushi Ren, Byron Choi, Processing private queries over untrusted data cloud through privacy homomorphism 2011 IEEE 27th International Conference on Data Engineering. pp. 601- 612 ,(2011) , 10.1109/ICDE.2011.5767862
Mark Shaneck, Yongdae Kim, Vipin Kumar, Privacy Preserving Nearest Neighbor Search international conference on data mining. pp. 541- 545 ,(2006) , 10.1109/ICDMW.2006.133