4.3 Article

A Secure and Synthesis Tele-Ophthalmology System

Journal

TELEMEDICINE JOURNAL AND E-HEALTH
Volume 14, Issue 8, Pages 833-845

Publisher

MARY ANN LIEBERT, INC
DOI: 10.1089/tmj.2008.0086

Keywords

telemedicine; SSL; videoconference; white-board; real-time

Funding

  1. The Enterprise Challenges (TEC) Singapore

Ask authors/readers for more resources

This paper describes a secure and synthesis ophthalmology telemedicine system, referred to as TeleOph. Under a Secure Socket Layer (SSL) channel, patient prerecorded data can be safely transferred via the Internet. With encrypted videoconference and white-board, the system not only supports hospital-to-clinic consultation, but also supplies hospital-to-hospital joint discussion. Based on Directshow technology (Microsoft Corporation, Redmond, WA), video cameras connected to the computer by firewire can be captured and controlled to sample video data. By using TWAIN technology, the system automatically identifies networked still cameras (on fundus and slitlamp devices) and retrieves images. All the images are stored in a selected format (such as JPEG, DICOM, BMP). Besides offline-transferring prerecorded data, the system also supplies online sampling of patient data (real-time capturing from remote places). The system was deployed at Tan Tock Seng Hospital, Singapore and Ang Mo Kio, Singapore, where 100 patients were enrolled in the system for examination. TeleOph can be successfully used for patient consultation, and hospital joint discussion. Meanwhile, TeleOph can supply both offline and online sampling of patient data.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges

Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng

Summary: Voiceprint Authentication as a Service (VAaS) is a cloud service that provides user authentication based on voiceprints, and it uses methods such as the Log Magnitude Approximate (LMA) vocal tract model to protect the original voiceprints of users, solving the problem of voiceprint leakage, and demonstrating high accuracy and reliability.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services

Yanbing Ren, Xinghua Li, Yinbin Miao, Robert H. Deng, Jian Weng, Siqi Ma, Jianfeng Ma

Summary: Location-Based Services (LBSs) are widely used mobile applications, but the privacy of location information is a concern. Geo-Ind is a privacy protection model that provides security guarantees but disrupts statistical location distribution. To address this, we propose DistPreserv definition and a privacy-preserving LBS scheme that includes location perturbation and retrieval area determination methods. The proposed mechanism achieves DistPreserv and incentive compatibility, improving availability of location distributions by over 90% in experiments.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

Privacy-Preserving Ranked Spatial Keyword Query in Mobile Cloud-Assisted Fog Computing

Qiuyun Tong, Yinbin Miao, Hongwei Li, Ximeng Liu, Robert H. Deng

Summary: With the increasing popularity of GPS-equipped mobile devices in cloud-assisted fog computing scenarios, there is a need for privacy-preserving ranked spatial keyword query. The proposed PRSQ-F scheme addresses this issue by combining spatial and textual conditions, using conversion protocol and attribute-based encryption, and constructing an R-tree-based index. The security analysis and empirical experiments demonstrate the efficiency and feasibility of PRSQ-F.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Hardware & Architecture

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control

Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng

Summary: To reduce costs and improve collaboration in healthcare research and commercial activities, electronic medical records (EMRs) are proposed to shift to shareable electronic records. However, the trustworthiness of cloud service providers poses a challenge. In this paper, a secure and efficient EMR sharing system is proposed, featuring a novel cryptosystem and blockchain technology, which allows fine-grained sharing and detection of unauthorized manipulation.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Theory & Methods

Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds

Jianfei Sun, Guowen Xu, Tianwei Zhang, Xuehuan Yang, Mamoun Alazab, Robert H. Deng

Summary: The cloud-based data sharing technology with cryptographic primitives allows data owners to outsource data and share information privately with arbitrary recipients regardless of geographical barriers. However, existing efforts in outsourced data sharing are inefficient, inflexible, or insecure due to issues such as dynamic target ciphertext designation, identity hiding of recipients, and verification of outsourced ciphertext transformation. Motivated by this, we design VF-PPBA, the first Verifiable, Fair and Privacy-preserving Broadcast Authorization framework for flexible data sharing in clouds. Using a new primitive called privacy-preserving multi-recipient broadcast proxy re-encryption (PPMR-BPRE), we ensure efficient ciphertext transformation, identity protection, and verify the correctness of outsourced conversion tasks.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Accountable and Fine-Grained Controllable Rewriting in Blockchains

Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert H. Deng

Summary: Most blockchains are immutable, which poses challenges for blockchain development due to storage abuse and legal obligations. To address this, Derler et al. proposed a redactable blockchain with fine-grained controllable rewriting using policy-based chameleon hash (PCH). However, their solution lacked accountability, allowing trapdoor holders to potentially abuse their privileges. In this paper, a design for a PCH with blackbox accountability (PCHA) is introduced, offering linkability and traceability to identify responsible trapdoor holders. The PCHA construction is proven to have rigorous security and is implemented with minimal overhead compared to existing solutions.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data

Lanxiang Chen, Yujie Xue, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng

Summary: In this article, a novel context-aware semantically extensible searchable symmetric encryption (CASE-SSE) based on Word2vec model is proposed to address the problem of incomplete or deviating search results in traditional SSE schemes. The proposed scheme utilizes outsourced datasets as corpora to train the Word2vec model and generates an ontology knowledge base for semantic extension of query keywords. The k-means clustering algorithm is used for multi-keyword search, and AVL-tree and inverted index are constructed for efficient context-aware semantic extension. Security analysis and experimental results demonstrate the effectiveness and superiority of the proposed scheme in terms of efficiency and accuracy.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

Threshold Attribute-Based Credentials With Redactable Signature

Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng

Summary: This study proposes a novel efficient threshold attribute-based anonymous credential scheme that supports threshold tracing and revocation of user credentials, significantly reduces the complexity of credential verification, and enjoys strong security features.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries

Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng

Summary: Symmetric Searchable Encryption (SSE) can ensure data privacy while supporting retrieval over encrypted data, but existing multi-user SSE schemes have weaknesses. To address these issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC) scheme, which improves security and efficiency through dual-cloud architecture and additive secret sharing.

ACM TRANSACTIONS ON STORAGE (2023)

Article Computer Science, Theory & Methods

CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics

Bowen Zhao, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Yingjiu Li, Robert H. Deng

Summary: This paper presents CROWD FA, a novel paradigm for privacy-preserving mobile crowdsensing (MCS) through federated analytics (FA), which achieves a well-rounded solution encompassing data aggregation, incentive design, and privacy protection. CROWD FA enables participants to perform aggregation operations on their local data, while preserving privacy through efficient cryptographic techniques. Experimental evaluations demonstrate that CROWD FA outperforms state-of-the-art approaches by achieving up to 22 times faster computation time.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits

Xueqiao Liu, Guomin Yang, Willy Susilo, Kai He, Robert H. Deng, Jian Weng

Summary: This paper proposes a computation framework for protecting sensitive data privacy, which can be applied to computation tasks with multiple input sources and/or multiple output recipients. The framework ensures privacy for the entire computation process and supports basic operations in Boolean circuits. In addition, it presents a privacy-preserving Bloom Filter and a multi-keyword searchable encryption scheme based on the proposed framework.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption

Jianfei Sun, Guowen Xu, Tianwei Zhang, Xuehuan Yang, Mamoun Alazab, Robert H. H. Deng

Summary: In this paper, we propose PS-ME, the first Privacy-aware and Security-enhanced efficient Matchmaking Encryption (ME) for flexible data sharing. We introduce an identity-based broadcast matchmaking encryption (IB-BME) for one-to-many data sharing and use it as the basis for developing PS-ME, which offers efficient decryption, identity anonymity, and CCA-security.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Authenticable Data Analytics Over Encrypted Data in the Cloud

Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng

Summary: In this paper, a novel approach is proposed to achieve privacy-preserving statistical analysis on an encrypted database. A privacy-preserving calculator is constructed to calculate attributes' count values for later statistical analysis, and an authenticable additive homomorphic encryption scheme is adopted to authenticate these encrypted count values. Furthermore, a cryptosystem based on binary vectors is proposed to achieve complex logic expressions for statistical analysis on encrypted data. Several protocols for statistical analysis, including conjunctive, disjunctive, and complex logic expressions, are designed with the aid of the proposed cryptographic calculator to achieve more complicated statistical functionalities. Experimental results show the feasibility and practicality of the proposed scheme.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Efficient and Secure Spatial Range Query over Large-scale Encrypted Data

Yinbin Miao, Chao Xu, Yifeng Zheng, Ximeng Liu, Xiangdong Meng, Robert H. Deng

Summary: Spatial range query is widely used in various applications due to the advancement of geo-positioning technology. To address the efficiency and security challenges in large-scale encrypted spatial data, a novel efficient Privacy-preserving Spatial Range Query (ePSRQ) scheme in dual-cloud architecture is proposed. The scheme utilizes a novel index structure, Geohash algorithm, Circular Shift and Coalesce Zero-Sum Garbled Bloom Filter (CSC-ZGBF), and Symmetric Homomorphic Encryption (SHE) to achieve computational complexity independent of dataset size. Formal security analysis demonstrates its robustness against chosen-plaintext attack, and extensive experiments confirm its feasibility in real-world applications.

2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS (2023)

Article Automation & Control Systems

Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing

Yifan Zhang, Yinbin Miao, Xinghua Li, Linfeng Wei, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng

Summary: Researchers propose a secure and communication-efficient federated learning scheme using improved compressed sensing and CKKS homomorphic encryption to solve the issue of data silos and privacy leakage in distributed machine learning.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

No Data Available