Abstract
As one of the essential applications of health information technology, the eHealth system plays a significant role in enabling various internet medicine service scenes, most of which primarily rely on service recommendation or an evaluation mechanism. To avoid privacy leakage, some privacy-preserving mechanisms must be adopted to protect raters’ privacy and make evaluation trust reliable. To tackle this challenge, this article proposes an efficient service recommendation and evaluation scheme, called EPRT, which is based on a similarity calculation and trust discovery method. This scheme uses homomorphic encryption technology to encrypt the sensitive data and combines the threshold mechanism and double-trap mechanism to realize the secure computing on the encrypted data, so as to ensure that the plaintexts of the final calculation results (e.g., recommendation value and evaluation truth) are only obtained by the authorized subject. In addition, a detailed security analysis shows that the proposed EPRT scheme can achieve the expected security. In addition, performance comparison results are carried out, demonstrating its effectiveness and accuracy.
- Emmanuel Bresson, Dario Catalano, and David Pointcheval. 2003. A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. 37–54.Google ScholarCross Ref
- A. C.-F. Chan. 2009. Symmetric-key homomorphic encryption for encrypted data processing. In Proceedings of the 2009 IEEE International Conference on Communications. IEEE, Los Alamitos, CA, 1–5. Google ScholarDigital Library
- Victor Chang, Yujie Shi, and Yan Zhang. 2019. The contemporary ethical and privacy issues of smart medical fields. International Journal of Strategic Engineering 2, 2 (2019), 35–43.Google ScholarCross Ref
- Victor I. C. Chang. 2020. A proposed framework for cloud computing adoption. In Sustainable Business: Concepts, Methodologies, Tools, and Applications. IGI Global, 978–1003. Google ScholarDigital Library
- Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, and YoungHo Park. 2017. Design of secure and lightweight authentication protocol for wearable devices environment. IEEE Journal of Biomedical and Health Informatics 22, 4 (2017), 1310–1322.Google ScholarCross Ref
- Yi Dou, Henry C. B. Chan, and Man Ho Au. 2018. A distributed trust evaluation protocol with privacy protection for intercloud. IEEE Transactions on Parallel and Distributed Systems 30, 6 (2018), 1208–1221.Google ScholarCross Ref
- Qi Feng, Debiao He, Zhe Liu, Ding Wang, and Kim-Kwang Raymond Choo. 2020. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. IET Information Security 1, 99 (2020), 1–10. Google Scholar
- Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, and Neeraj Kumar. 2019. A survey on privacy protection in blockchain system. Journal of Network and Computer Applications 126 (2019), 45–58.Google ScholarCross Ref
- Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, and Laurence T. Yang. 2017. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Transactions on Smart Grid 8, 5 (2017), 2411–2419.Google ScholarCross Ref
- Hao Hu, Rongxing Lu, Cheng Huang, and Zonghua Zhang. 2017. PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications 10, 5 (2017), 1204–1218.Google ScholarCross Ref
- Hao Hu, Rongxing Lu, and Zonghua Zhang. 2017. TPSQ: Trust-based platoon service query via vehicular communications. Peer-to-Peer Networking and Applications 10, 1 (2017), 262–277.Google ScholarCross Ref
- Hao Hu, Rongxing Lu, Zonghua Zhang, and Jun Shao. 2016. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Transactions on Vehicular Technology 66, 2 (2016), 1786–1797.Google ScholarCross Ref
- Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, and Xiaodong Lin. 2016. FSSR: Fine-grained EHRS sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, New York, NY, 95–106. Google ScholarDigital Library
- R. J. Johnson. 2016. A comprehensive review of an electronic health record system soon to assume market ascendancy: EPIC. Journal of Healthcare Communications 1, 4 (2016), 36.Google Scholar
- Jiawen Kang, Rong Yu, Xumin Huang, and Yan Zhang. 2017. Privacy-preserved pseudonym scheme for fog computing supported Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems 19, 8 (2017), 2627–2637.Google ScholarCross Ref
- Harleen Kaur, M. Afshar Alam, Roshan Jameel, Ashish Kumar Mourya, and Victor Chang. 2018. A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. Journal of Medical Systems 42, 8 (2018), 156. Google ScholarDigital Library
- Harmanjeet Kaur, Neeraj Kumar, and Shalini Batra. 2018. An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Future Generation Computer Systems 86 (2018), 297–307.Google ScholarDigital Library
- Neeraj Kumar, Naveen Chilamkurti, and Subhas C. Misra. 2015. Bayesian coalition game for the Internet of Things: An ambient intelligence-based evaluation. IEEE Communications Magazine 53, 1 (2015), 48–55.Google ScholarDigital Library
- Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, and Neeraj Kumar. 2018. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. Journal of Supercomputing 74, 12 (2018), 6428–6453. Google ScholarDigital Library
- Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, and Vanga Odelu. 2016. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Security and Communication Networks 9, 17 (2016), 4255–4271. Google ScholarDigital Library
- Saru Kumari, Muhammad Khurram Khan, and Xiong Li. 2016. A more secure digital rights management authentication scheme based on smart card. Multimedia Tools and Applications 75, 2 (2016), 1135–1158. Google ScholarDigital Library
- Dongsheng Li, Qin Lv, Li Shang, and Ning Gu. 2017. Efficient privacy-preserving content recommendation for online social communities. Neurocomputing 219 (2017), 440–454. Google ScholarDigital Library
- Jin Li, Yinghui Zhang, Xiaofeng Chen, and Yang Xiang. 2018. Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security 72 (2018), 1–12. Google ScholarDigital Library
- Xian Li, Xin Luna Dong, Kenneth Lyons, Weiyi Meng, and Divesh Srivastava. 2015. Truth finding on the deep web: Is the problem solved? arXiv:1503.00303 Google ScholarDigital Library
- Xinghua Li, Yunwei Wang, Pandi Vijayakumar, Debiao He, Neeraj Kumar, and Jianfeng Ma. 2019. Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Transactions on Vehicular Technology 68, 11 (2019), 11309–11322.Google ScholarCross Ref
- Yaliang Li, Jing Gao, Chuishi Meng, Qi Li, Lu Su, Bo Zhao, Wei Fan, and Jiawei Han. 2016. A survey on truth discovery. ACM SIGKDD Explorations Newsletter 17, 2 (2016), 1–16. Google ScholarDigital Library
- Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey Vinel, and Xinyi Huang. 2018. Security and privacy for the Internet of Drones: Challenges and solutions. IEEE Communications Magazine 56, 1 (2018), 64–69.Google ScholarCross Ref
- Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, and Jian Weng. 2016. An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Transactions on Information Forensics and Security 11, 11 (2016), 2401–2414.Google ScholarDigital Library
- Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, and Sheng Gao. 2018. ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Generation Computer Systems 79 (2018), 82–94.Google ScholarCross Ref
- Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, and Kui Ren. 2015. Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, New York, NY, 183–196. Google ScholarDigital Library
- Neeraj Nehra, R. B. Patel, and V. K. Bhat. 2007. A framework for distributed dynamic load balancing in heterogeneous cluster. Journal of Computer Science 3, 1 (2007), 14–24.Google ScholarCross Ref
- Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. 223–238. Google ScholarDigital Library
- Shu Qin Ren, Benjamin Hong Meng Tan, Sivaraman Sundaram, Taining Wang, Yibin Ng, Victor Chang, and Khin Mi Mi Aung. 2016. Secure searching on cloud storage enhanced by homomorphic indexing. Future Generation Computer Systems 65 (2016), 102–110. Google ScholarDigital Library
- Shahrokh Saeednia. 2000. How to make the Hill cipher secure. Cryptologia 24, 4 (2000), 353–360. Google ScholarDigital Library
- Amandeep Singh Sohal, Rajinder Sandhu, Sandeep K. Sood, and Victor Chang. 2018. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security 74 (2018), 340–354. Google ScholarDigital Library
- Chang Wang, Yongxin Zhu, Weiwei Shi, Victor Chang, Pandi Vijayakumar, Bin Liu, Yishu Mao, Jiabao Wang, and Yiping Fan. 2018. A dependable time series analytic framework for cyber-physical systems of IoT-based smart grid. ACM Transactions on Cyber-Physical Systems 3, 1 (2018), 1–18. Google ScholarDigital Library
- Kun Wang, Yun Shao, Lei Shu, Chunsheng Zhu, and Yan Zhang. 2016. Mobile big data fault-tolerant processing for ehealth networks. IEEE Network 30, 1 (2016), 36–42.Google ScholarDigital Library
- Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, and Athanasios V. Vasilakos. 2017. A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE Journal of Biomedical and Health Informatics 22, 4 (2017), 1299–1309.Google ScholarCross Ref
- Zhe Xia, Xiaoyun Yang, Min Xiao, and Debiao He. 2016. Provably secure threshold Paillier encryption based on hyperplane geometry. In Proceedings of the Australasian Conference on Information Security and Privacy. 73–86. Google ScholarDigital Library
- Chang Xu, Jiachen Wang, Liehuang Zhu, Chuan Zhang, and Kashif Sharif. 2019. PPMR: A privacy-preserving online medical service recommendation scheme in eHealthcare system. IEEE Internet of Things Journal 6, 3 (2019), 5665–5673.Google ScholarCross Ref
- Yang Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, and Victor Chang. 2019. A comprehensive survey on secure outsourced computation and its applications. IEEE Access 7 (2019), 159426–159465.Google ScholarCross Ref
- Yang Yang, Xianghan Zheng, Wenzhong Guo, Ximeng Liu, and Victor Chang. 2019. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Information Sciences 479 (2019), 567–592.Google ScholarCross Ref
- Yang Yang, Xianghan Zheng, Ximeng Liu, Shangping Zhong, and Victor Chang. 2018. Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. Future Generation Computer Systems 84 (2018), 160–176.Google ScholarCross Ref
- Xiaoxin Yin, Jiawei Han, and S. Yu Philip. 2008. Truth discovery with multiple conflicting information providers on the web. IEEE Transactions on Knowledge and Data Engineering 20, 6 (2008), 796–808. Google ScholarDigital Library
- Chuan Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Xiaojiang Du, and Mohsen Guizani. 2019. LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT. Future Generation Computer Systems 90 (2019), 175–184.Google ScholarCross Ref
Index Terms
- EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System
Recommendations
Privacy preserving of trust management credentials based on trusted computing
ISPEC'10: Proceedings of the 6th international conference on Information Security Practice and ExperiencePrivacy disclosure of forward direction credentials and backward direction credentials is an important security defect in existing trust management systems. In this paper, a novel distributed privacy preserving scheme for trust management credentials is ...
Research on Privacy Preserving of Searchable Encryption
HPCCT '18: Proceedings of the 2018 2nd High Performance Computing and Cluster Technologies ConferenceIn the cloud computing applications, the researchers proposed a new cryptographic primitive searchable encryption (SE) in order to ensure data security. Searchable encryption can make full use of cloud server computing capacity to search the ciphertext. ...
K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
Wireless Algorithms, Systems, and ApplicationsAbstractRecent years have witnessed the advent of technologies such as the Internet of Things, cloud computing, and big data. Also, the analysis and research of data have attracted more and more attention from researchers. For example, the analysis of ...
Comments