Abstract
With the wide application of machine learning algorithms in medical diagnosis, we gradually confronted the problem of computing and storing large-scale data. Outsourcing cloud computing has become the most cost-effective option to address these challenges. However, privacy and security issues have always existed in outsourced computing. Therefore, in this article, we propose an efficient index nearest neighbor query scheme based on Secret Sharing (SS) and Secure Multi-Party Computation (MPC) with the dual-cloud model architecture. For secure and efficient queries, we have designed a comprehensive set of secure index generation algorithms and secure index query algorithms. The cloud server creates indexes for the outsourced data and saves them through index generation algorithms in the offline phase, and uses index query algorithms to complete secure and efficient nearest neighbor query tasks in the online phase where users participate. Security analysis proves that our scheme protects the security of outsourced data and the privacy of query data. Simulation results on real datasets also demonstrate that the proposed scheme has higher efficiency and lower communication overhead compared with existing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hossain, M.S., Ghulam, M.: Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring. Comput. Netw. 101, 192–202 (2016)
Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., Willemson, J.: Privacy protection for wireless medical sensor data. IEEE Trans. Dependable Sec. Comput. 13(3), 369–380 (2016)
Zhu, D., et al.: CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-kNN. J. Inf. Sci. 514, 244–262 (2020)
Zhu, D., Zhu, H., Liu, X., Li, H., Wang, F., Li, H.: Achieve efficient and privacy-preserving medical primary diagnosis based on kNN. In: International Conference on Computer Communication and Networks (ICCCN), pp. 1–9 (2018)
Liu, X., Zhu, H., Lu, R., Li, H.: Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification. Peer-to-Peer Netw. Appli. 11(2), 334–347 (2018)
Wang, J., Wu, L., Wang, H., Choo, K.-K.R., He, D.: An efficient and privacy-preserving outsourced support vector machine training for internet of medical things. IEEE Internet of Things J. 8(1), 458–473 (2021)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Cheng, K., Wang, L., Shen, Y., Wang, H., Wang, Y., Jiang, X., Zhong, H.: Secure \(k\)k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 7(4), 689–702 (2021)
Liu, X., Deng, R.H., Choo, K.-K.R., Weng, J.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 13(10), 2668–2669 (2018)
Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp. 160–164 (1982)
Beaver, D.: Efficient multiparty protocols using circuit randomization. In: International Cryptology Conference, pp. 420–432 (1991)
Mohassel, P., Zhang, Y.: SecureML: A system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19–38 (2017)
de Cock, M., et al.: Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE Trans. Depend. Sec. Comput. 16(2), 217–230 (2019)
Zheng, Y., Duan, H., Wang, C., Wang, R., Nepal, S.: Securely and efficiently outsourcing decision tree inference. IEEE Trans. Depend. Sec. Comput. 19(3), 1841–1855 (2022)
Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp. 136–145 (2001)
Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J.: High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 11(6), 403–418 (2012)
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacy-preserving computations. In: European Symposium on Research in Computer Security, pp. 192–206 (2008)
Liu, L., Su, J., Liu, X., Cheng, R., Huang, K., Wang, X.: Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data. IEEE Internet Things J. 6(6), 9841–9852 (2019)
Paillier, P.: Public-key cryptosystems based on composite degree resid-uosity classes. In: European Cryptology Conference, pp. 223–238 (1999)
Acknowledgements
This work was supported by the National Natural Science Foundation of China(62002105, 62072134, U2001205,61902116).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Feng, Q., Liu, B. (2022). Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing. In: Ahene, E., Li, F. (eds) Frontiers in Cyber Security. FCS 2022. Communications in Computer and Information Science, vol 1726. Springer, Singapore. https://doi.org/10.1007/978-981-19-8445-7_24
Download citation
DOI: https://doi.org/10.1007/978-981-19-8445-7_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8444-0
Online ISBN: 978-981-19-8445-7
eBook Packages: Computer ScienceComputer Science (R0)