4.8 Article

Reliable and Privacy-Preserving Top-k Disease Matching Schemes for E-Healthcare Systems

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 7, 页码 5537-5547

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3111739

关键词

Euclidean distances; homomorphic encryption; privacy preserving; secure k-nearest neighbor (kNN); top-k disease matching

资金

  1. National Natural Science Foundation of China [61972037, 61402037, U1804263]

向作者/读者索取更多资源

The integration of body sensors, cloud computing, and mobile communication technologies has greatly enhanced the development and accessibility of e-healthcare systems. The authors propose two reliable and privacy-preserving schemes for top-k disease matching, and simulations and security analyses demonstrate the effectiveness and privacy-preservation properties of these schemes.
The integration of body sensors, cloud computing, and mobile communication technologies has significantly improved the development and availability of e-healthcare systems. In an e-healthcare system, health service providers upload real patients' clinical data and diagnostic treatments to the cloud server. Afterward, the users can submit queries with specific body sensor parameters, to obtaining pertinent k diagnostic files. The results are ranked based on ranking algorithms that match the query parameters to the ones in diagnostic files. However, privacy concerns arise while matching disease, since the clinical data and diagnostic files contain sensitive information. In this work, we propose two reliable and privacy-preserving Top-k disease matching schemes. The first scheme is constructed based on our proposed weighted Euclidean distance comparison algorithm under secure k-nearest neighbor technique to get k diagnostic files. It allows users to set different weights for each body indicator as per their needs. The second scheme is designed by comparing Euclidean distances under the modified Paillier homomorphic encryption algorithm where a superlinear sequence is used to reduce the computational and communication overhead. The user side incurs slightly higher computational costs, but the trusted party does not need to execute encryption operations. Hence, the proposed two schemes can be applied in different application scenarios. Simulations on synthetic and real data prove the efficiency of the schemes, and security analysis establishes the privacy-preservation properties.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据