A NOVEL SECURE OUTSOURCING METHOD FOR MEDICAL DATA
Main Article Content
Abstract
Medical imaging is essential for diagnosing illnesses, and due to the delicate nature of medical images, stringent security and privacy measures must be in place. Medical images should be secured before being outsourced in a cloud-based medical system for Healthcare Industry 4.0. However, it is difficult and currently impractical to process queries over encrypted data without first performing the decryption step. In the paper, we suggest an effective method for locating the precise nearest neighbour in a set of encrypted medical photos. By obtaining the lower bound of the Euclidean distance, which is correlated with the mean and standard deviation of the data, we can eliminate candidates instead of computing the Euclidean distance. Our method can find the precise nearest neighbour as opposed to an approximation, unlike the majority of other existing approaches. We then assess our suggested strategy to show its usefulness.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
J. Li, L. Huang, Y. Zhou, S. He, Z. Ming, “Computation partitioning for mobile cloud computing in big data
environment,” IEEE Trans. Ind. Informat., vol. 13, no. 4, pp. 2009-2018, Feb. 2017.
K.-K. R. Choo, “Cloud computing: Challenges and future directions,” Trends & Issues in Crime and Criminal
Justice, vol. 400, no. 400, pp. 1– 6, Oct. 2010.
M. Pajic, R. Mangharam, O. Sokolsky, D. Arney, J. M. Goldman, and I. Lee, “Model-driven safety analysis
of closed-loop medical systems,” IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 3–16, Feb. 2014.
B. Xu, L. D. Xu, H. Cai, C. Xie, J. Hu, and F. Bu, “Ubiquitous data accessing method in IoT-based information
system for emergency medical services,” IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1578– 1586, May. 2014.
G. Yang et al., “A health-IoT platform based on the integration of intelligent packaging, unobtrusive biosensor, and intelligent medicine box,” IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2180–2191, Nov. 2014.
H. Huang, T. Gong, N. Ye, R. Wang, and Y. Dou, “Private and Secured Medical Data Transmission and
Analysis for Wireless Sensing Healthcare System,” IEEE Trans. Ind. Informat., vol. 13, no.3 pp. 1227-1237, June.
M. Li, S. Yu, W. Lou, and Y. T. Hou, “Toward privacy-assured cloud data services with flexible search
functionalities,” in Proc. ICDCSW. IEEE, Macau, CHN, 2012, pp. 466–470.
P. Williams, R. Sion, and B. Carbunar, “Building castles out of mud: practical access pattern privacy and
correctness on untrusted storage,” in Proc. CCS. ACM, Alexandria, VA, USA, 2008, pp. 139–148.
M. S. Islam, M. Kuzu, and M. Kantarcioglu, “Access pattern disclosure on searchable encryption:
Ramification, attack and mitigation,” in NDSS, San Diego, CA, USA, 2012.
D. E. Knuth, “Sorting and searching,” in The art of computer programming, vol. 3, Boston, USA: AddisonWesley, 1973.
D. Song, D. Wagner, and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” in Proc. of IEEE
S&P, DC, USA, 2000, pp. 44-55.
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved
definitions and efficient constructions,” J. Comput.Secur., vol. 19, no. 5, pp. 895-934, 2011.
S. Kamara, C. Papamanthou, and T. Roeder, “Dynamic Searchable Symmetric Encryption,” in Proc. of ACM
CCS, Raleigh, NC, USA, 2012, pp. 965–976.
S. Kamara, C. Papamanthou, “Parallel and dynamic searchable symmetric encryption,” Financial
Cryptography and Data Security, Springer Berlin Heidelberg, 2013, pp. 258-274.
G. S. Poh, J.–J. Chin, W.-C. Yau, K.-K. R. Choo, and M. S. Mohamad, “Searchable Symmetric Encryption:
Designs and Challenges,” ACM Comput. Surv. vol. 50, no. 3, pp. 40:1-40:37, 2017.