skip to main content
research-article

EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System

Authors Info & Claims
Published:16 June 2021Publication History
Skip Abstract Section

Abstract

As one of the essential applications of health information technology, the eHealth system plays a significant role in enabling various internet medicine service scenes, most of which primarily rely on service recommendation or an evaluation mechanism. To avoid privacy leakage, some privacy-preserving mechanisms must be adopted to protect raters’ privacy and make evaluation trust reliable. To tackle this challenge, this article proposes an efficient service recommendation and evaluation scheme, called EPRT, which is based on a similarity calculation and trust discovery method. This scheme uses homomorphic encryption technology to encrypt the sensitive data and combines the threshold mechanism and double-trap mechanism to realize the secure computing on the encrypted data, so as to ensure that the plaintexts of the final calculation results (e.g., recommendation value and evaluation truth) are only obtained by the authorized subject. In addition, a detailed security analysis shows that the proposed EPRT scheme can achieve the expected security. In addition, performance comparison results are carried out, demonstrating its effectiveness and accuracy.

References

  1. Emmanuel Bresson, Dario Catalano, and David Pointcheval. 2003. A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. 37–54.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. C.-F. Chan. 2009. Symmetric-key homomorphic encryption for encrypted data processing. In Proceedings of the 2009 IEEE International Conference on Communications. IEEE, Los Alamitos, CA, 1–5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Victor Chang, Yujie Shi, and Yan Zhang. 2019. The contemporary ethical and privacy issues of smart medical fields. International Journal of Strategic Engineering 2, 2 (2019), 35–43.Google ScholarGoogle ScholarCross RefCross Ref
  4. Victor I. C. Chang. 2020. A proposed framework for cloud computing adoption. In Sustainable Business: Concepts, Methodologies, Tools, and Applications. IGI Global, 978–1003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, and YoungHo Park. 2017. Design of secure and lightweight authentication protocol for wearable devices environment. IEEE Journal of Biomedical and Health Informatics 22, 4 (2017), 1310–1322.Google ScholarGoogle ScholarCross RefCross Ref
  6. Yi Dou, Henry C. B. Chan, and Man Ho Au. 2018. A distributed trust evaluation protocol with privacy protection for intercloud. IEEE Transactions on Parallel and Distributed Systems 30, 6 (2018), 1208–1221.Google ScholarGoogle ScholarCross RefCross Ref
  7. Qi Feng, Debiao He, Zhe Liu, Ding Wang, and Kim-Kwang Raymond Choo. 2020. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. IET Information Security 1, 99 (2020), 1–10. Google ScholarGoogle Scholar
  8. Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, and Neeraj Kumar. 2019. A survey on privacy protection in blockchain system. Journal of Network and Computer Applications 126 (2019), 45–58.Google ScholarGoogle ScholarCross RefCross Ref
  9. Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, and Laurence T. Yang. 2017. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Transactions on Smart Grid 8, 5 (2017), 2411–2419.Google ScholarGoogle ScholarCross RefCross Ref
  10. Hao Hu, Rongxing Lu, Cheng Huang, and Zonghua Zhang. 2017. PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications 10, 5 (2017), 1204–1218.Google ScholarGoogle ScholarCross RefCross Ref
  11. Hao Hu, Rongxing Lu, and Zonghua Zhang. 2017. TPSQ: Trust-based platoon service query via vehicular communications. Peer-to-Peer Networking and Applications 10, 1 (2017), 262–277.Google ScholarGoogle ScholarCross RefCross Ref
  12. Hao Hu, Rongxing Lu, Zonghua Zhang, and Jun Shao. 2016. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Transactions on Vehicular Technology 66, 2 (2016), 1786–1797.Google ScholarGoogle ScholarCross RefCross Ref
  13. Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, and Xiaodong Lin. 2016. FSSR: Fine-grained EHRS sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, New York, NY, 95–106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. J. Johnson. 2016. A comprehensive review of an electronic health record system soon to assume market ascendancy: EPIC. Journal of Healthcare Communications 1, 4 (2016), 36.Google ScholarGoogle Scholar
  15. Jiawen Kang, Rong Yu, Xumin Huang, and Yan Zhang. 2017. Privacy-preserved pseudonym scheme for fog computing supported Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems 19, 8 (2017), 2627–2637.Google ScholarGoogle ScholarCross RefCross Ref
  16. Harleen Kaur, M. Afshar Alam, Roshan Jameel, Ashish Kumar Mourya, and Victor Chang. 2018. A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. Journal of Medical Systems 42, 8 (2018), 156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Harmanjeet Kaur, Neeraj Kumar, and Shalini Batra. 2018. An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system. Future Generation Computer Systems 86 (2018), 297–307.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Neeraj Kumar, Naveen Chilamkurti, and Subhas C. Misra. 2015. Bayesian coalition game for the Internet of Things: An ambient intelligence-based evaluation. IEEE Communications Magazine 53, 1 (2015), 48–55.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, and Neeraj Kumar. 2018. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. Journal of Supercomputing 74, 12 (2018), 6428–6453. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, and Vanga Odelu. 2016. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Security and Communication Networks 9, 17 (2016), 4255–4271. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Saru Kumari, Muhammad Khurram Khan, and Xiong Li. 2016. A more secure digital rights management authentication scheme based on smart card. Multimedia Tools and Applications 75, 2 (2016), 1135–1158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Dongsheng Li, Qin Lv, Li Shang, and Ning Gu. 2017. Efficient privacy-preserving content recommendation for online social communities. Neurocomputing 219 (2017), 440–454. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jin Li, Yinghui Zhang, Xiaofeng Chen, and Yang Xiang. 2018. Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security 72 (2018), 1–12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Xian Li, Xin Luna Dong, Kenneth Lyons, Weiyi Meng, and Divesh Srivastava. 2015. Truth finding on the deep web: Is the problem solved? arXiv:1503.00303 Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Xinghua Li, Yunwei Wang, Pandi Vijayakumar, Debiao He, Neeraj Kumar, and Jianfeng Ma. 2019. Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Transactions on Vehicular Technology 68, 11 (2019), 11309–11322.Google ScholarGoogle ScholarCross RefCross Ref
  26. Yaliang Li, Jing Gao, Chuishi Meng, Qi Li, Lu Su, Bo Zhao, Wei Fan, and Jiawei Han. 2016. A survey on truth discovery. ACM SIGKDD Explorations Newsletter 17, 2 (2016), 1–16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey Vinel, and Xinyi Huang. 2018. Security and privacy for the Internet of Drones: Challenges and solutions. IEEE Communications Magazine 56, 1 (2018), 64–69.Google ScholarGoogle ScholarCross RefCross Ref
  28. Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, and Jian Weng. 2016. An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Transactions on Information Forensics and Security 11, 11 (2016), 2401–2414.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, and Sheng Gao. 2018. ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Generation Computer Systems 79 (2018), 82–94.Google ScholarGoogle ScholarCross RefCross Ref
  30. Chenglin Miao, Wenjun Jiang, Lu Su, Yaliang Li, Suxin Guo, Zhan Qin, Houping Xiao, Jing Gao, and Kui Ren. 2015. Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, New York, NY, 183–196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Neeraj Nehra, R. B. Patel, and V. K. Bhat. 2007. A framework for distributed dynamic load balancing in heterogeneous cluster. Journal of Computer Science 3, 1 (2007), 14–24.Google ScholarGoogle ScholarCross RefCross Ref
  32. Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. 223–238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Shu Qin Ren, Benjamin Hong Meng Tan, Sivaraman Sundaram, Taining Wang, Yibin Ng, Victor Chang, and Khin Mi Mi Aung. 2016. Secure searching on cloud storage enhanced by homomorphic indexing. Future Generation Computer Systems 65 (2016), 102–110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Shahrokh Saeednia. 2000. How to make the Hill cipher secure. Cryptologia 24, 4 (2000), 353–360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Amandeep Singh Sohal, Rajinder Sandhu, Sandeep K. Sood, and Victor Chang. 2018. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security 74 (2018), 340–354. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Chang Wang, Yongxin Zhu, Weiwei Shi, Victor Chang, Pandi Vijayakumar, Bin Liu, Yishu Mao, Jiabao Wang, and Yiping Fan. 2018. A dependable time series analytic framework for cyber-physical systems of IoT-based smart grid. ACM Transactions on Cyber-Physical Systems 3, 1 (2018), 1–18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Kun Wang, Yun Shao, Lei Shu, Chunsheng Zhu, and Yan Zhang. 2016. Mobile big data fault-tolerant processing for ehealth networks. IEEE Network 30, 1 (2016), 36–42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mauro Conti, and Athanasios V. Vasilakos. 2017. A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE Journal of Biomedical and Health Informatics 22, 4 (2017), 1299–1309.Google ScholarGoogle ScholarCross RefCross Ref
  39. Zhe Xia, Xiaoyun Yang, Min Xiao, and Debiao He. 2016. Provably secure threshold Paillier encryption based on hyperplane geometry. In Proceedings of the Australasian Conference on Information Security and Privacy. 73–86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Chang Xu, Jiachen Wang, Liehuang Zhu, Chuan Zhang, and Kashif Sharif. 2019. PPMR: A privacy-preserving online medical service recommendation scheme in eHealthcare system. IEEE Internet of Things Journal 6, 3 (2019), 5665–5673.Google ScholarGoogle ScholarCross RefCross Ref
  41. Yang Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, and Victor Chang. 2019. A comprehensive survey on secure outsourced computation and its applications. IEEE Access 7 (2019), 159426–159465.Google ScholarGoogle ScholarCross RefCross Ref
  42. Yang Yang, Xianghan Zheng, Wenzhong Guo, Ximeng Liu, and Victor Chang. 2019. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Information Sciences 479 (2019), 567–592.Google ScholarGoogle ScholarCross RefCross Ref
  43. Yang Yang, Xianghan Zheng, Ximeng Liu, Shangping Zhong, and Victor Chang. 2018. Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. Future Generation Computer Systems 84 (2018), 160–176.Google ScholarGoogle ScholarCross RefCross Ref
  44. Xiaoxin Yin, Jiawei Han, and S. Yu Philip. 2008. Truth discovery with multiple conflicting information providers on the web. IEEE Transactions on Knowledge and Data Engineering 20, 6 (2008), 796–808. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Chuan Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Xiaojiang Du, and Mohsen Guizani. 2019. LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT. Future Generation Computer Systems 90 (2019), 175–184.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 21, Issue 3
        August 2021
        522 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3468071
        • Editor:
        • Ling Liu
        Issue’s Table of Contents

        Copyright © 2021 Association for Computing Machinery.

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 June 2021
        • Online AM: 7 May 2020
        • Revised: 1 April 2020
        • Accepted: 1 April 2020
        • Received: 1 January 2020
        Published in toit Volume 21, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format