4.8 Article

PPMR: A Privacy-Preserving Online Medical Service Recommendation Scheme in eHealthcare System

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 6, 期 3, 页码 5665-5673

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2019.2904728

关键词

eHealthcare systems; medical service recommendation; privacy-preserving

资金

  1. National Natural Science Foundation of China [61402037, 61272512]

向作者/读者索取更多资源

With the continuous development of eHealthcare systems, medical service recommendation has received great attention. However, although it can recommend doctors to users, there are still challenges in ensuring the accuracy and privacy of recommendation. In this paper, to ensure the accuracy of the recommendation, we consider doctors' reputation scores and similarities between users' demands and doctors' information as the basis of the medical service recommendation. The doctors' reputation scores are measured by multiple feedbacks from users. We propose two concrete algorithms to compute the similarity and the reputation scores in a privacy-preserving way based on the modified Paillier cryptosystem, truth discovery technology, and the Dirichlet distribution. Detailed security analysis is given to show its security prosperities. In addition, extensive experiments demonstrate the efficiency in terms of computational time for truth discovery and recommendation process.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

EBDL: Effective blockchain-based covert storage channel with dynamic labels

Can Zhang, Liehuang Zhu, Chang Xu, Zijian Zhang, Rongxing Lu

Summary: Blockchain-based covert communication has opened up a new research direction, providing reliable and undetectable storage methods. However, existing solutions using pre-negotiated and fixed addresses as static labels increase the risk of channel exposure and lack support for large covert message transmission. This paper presents an effective solution with dynamic labels and a message segmentation mechanism, achieving efficient extraction of covert messages and secure transmission of large covert messages.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Computer Science, Information Systems

Privacy-preserving and fault-tolerant aggregation of time-series data without TA

Chang Xu, Run Yin, Liehuang Zhu, Can Zhang, Kashif Sharif

Summary: The increase in popularity and usage of the Internet of Things (IoT) applications, along with big data, has highlighted the importance of time-series data aggregation. However, existing privacy-preserving solutions face challenges in fault tolerance and establishment of trusted authorities. This paper proposes a privacy-preserving time-series data aggregation scheme without trusted authorities, showcasing its reliability and scalability.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2023)

Article Mathematics

Privacy Preservation Authentication: Group Secret Handshake with Multiple Groups

Dong Han, Zhen Li, Mengyu Wang, Chang Xu, Kashif Sharif

Summary: This paper presents a concrete GSH protocol with Multiple Groups, which provides affiliation-hiding and detectability while achieving Perfect Forward Secrecy. Only legitimate members can prove their affiliations without revealing specific group identities.

MATHEMATICS (2023)

Article Engineering, Electrical & Electronic

Traffic Flow Optimization for UAVs in Multi-Layer Information-Centric Software-Defined FANET

Liehuang Zhu, Md Monjurul Karim, Kashif Sharif, Chang Xu, Fan Li

Summary: This article proposes a UAV-assisted multi-layer IC-SDN solution to address content distribution challenges in UAV-assisted networks. It introduces distributed controllers placed hierarchically in the edge and cloud tiers and formulates the traffic optimization problem using a queueing allocation model. The proposed solution maximizes throughput and minimizes computational latency, delay, and packet loss, as shown through simulation and numerical evaluation.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

Blockchain-Based Anonymous Data Sharing With Accountability for Internet of Things

Tong Wu, Weijie Wang, Chuan Zhang, Weiting Zhang, Liehuang Zhu, Keke Gai, Haotian Wang

Summary: This article proposes a blockchain-based anonymous data-sharing scheme (BA-DS) that adopts a novel public key encryption derived from a ring signature. BA-DS removes the trusted party and ensures anonymity by using an unconditional linkable ring signature and Signature of Knowledge (SoK). It applies blockchain infrastructure for revocation and generates tags for data stored on the cloud, providing accountability. The formal security analysis shows that BA-DS is selectively indistinguishable secure in the random oracle model. It also proves that BA-DS achieves anonymity, data privacy, accountability, and authenticity. Extensive experiments demonstrate reasonable efficiency of BA-DS in terms of computational complexity, communication overhead, and blockchain consumption.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data

Chang Xu, Ruijuan Wang, Liehuang Zhu, Chuan Zhang, Rongxing Lu, Kashif Sharif

Summary: Searchable symmetric encryption (SSE) allows keyword search on encrypted data. Dynamic searchable symmetric encryption (DSSE) enables data updating. Existing DSSE schemes suffer from keyword pair result pattern (KPRP) leakage. We propose the first DSSE scheme that achieves strong privacy-preserving conjunctive keyword search.

IEEE TRANSACTIONS ON BIG DATA (2023)

Article Computer Science, Theory & Methods

Enabling efficient and secure health data sharing for Healthcare IoT systems

Liehuang Zhu, Yumeng Xie, Yuao Zhou, Qing Fan, Chuan Zhang, Ximeng Liu

Summary: The Healthcare Internet of Things system allows for remote monitoring of patient health and timely feedback on medical treatments. This paper proposes an efficient and secure health data sharing scheme called ESDS for Healthcare IoT systems. ESDS utilizes signcryption to protect patient privacy and ensure data authenticity, aggregates multiple signatures into a short signature, and applies local verifiability to improve system verification efficiency.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Theory & Methods

EGIA: An External Gradient Inversion Attack in Federated Learning

Haotian Liang, Youqi Li, Chuan Zhang, Ximeng Liu, Liehuang Zhu

Summary: Despite the state-of-the-art performance of federated learning in distributed learning tasks with privacy requirements, it is vulnerable to adversarial attacks. This paper proposes a novel method, External Gradient Inversion Attack (EGIA), which considers the transmission of public-shared gradients through intermediary nodes in the grey-box settings. The experiments demonstrate that an external adversary can reconstruct the private input using gradients even when both the clients and the server are honest and fully trusted.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud

Chenfei Hu, Chuan Zhang, Dian Lei, Tong Wu, Ximeng Liu, Liehuang Zhu

Summary: In this paper, the first privacy-preserving and verifiable support vector machine training scheme is proposed by employing a two-cloud platform. A verification mechanism is designed based on the homomorphic verification tag to enable verifiable machine learning training. Meanwhile, an efficient multiplication operation in the encryption domain is designed by combining homomorphic encryption and data perturbation to improve the efficiency of model training. Rigorous theoretical analysis demonstrates the security and reliability of the scheme. Experimental results show that the scheme can reduce computational and communication overheads by at least 43.94% and 99.58%, respectively, compared to state-of-the-art SVM training methods.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Hardware & Architecture

Towards Efficient and Privacy-Preserving Versatile Task Allocation for Internet of Vehicles

Zihan Li, Mingyang Zhao, Guanyu Chen, Chuan Zhang, Tong Wu, Liehuang Zhu

Summary: This paper proposes an efficient and privacy-preserving versatile task allocation scheme for the Internet of Vehicles, utilizing randomizable matrix multiplication and polynomial fitting techniques.

IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY (2022)

Article Computer Science, Theory & Methods

Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing

Chuan Zhang, Mingyang Zhao, Liehuang Zhu, Tong Wu, Ximeng Liu

Summary: In this paper, we propose an efficient and strong privacy-preserving truth discovery scheme, named EPTD, to protect users' task privacy and data privacy simultaneously in the truth discovery procedure.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Hardware & Architecture

Dynamic Data Transaction in Crowdsensing Based on Multi-Armed Bandits and Shapley Value

Chang Xu, Yayun Si, Liehuang Zhu, Chuan Zhang, Kashif Sharif, Huishu Wu

Summary: This paper investigates the problem of dynamic data transaction in crowdsensing. The contribution of new data to the collector is modeled using the Shapley value, and a contextual bandit model is used to determine the transaction price. Simulation experiments demonstrate the effectiveness of the proposed scheme.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2022)

Proceedings Paper Computer Science, Software Engineering

V-EPTD: A Verifiable and Efficient Scheme for Privacy-Preserving Truth Discovery

Chang Xu, Hongzhou Rao, Liehuang Zhu, Chuan Zhang, Kashif Sharif

Summary: This paper proposes a novel scheme named V-EPTD that not only protects privacy information but also verifies the computing in truth discovery. The experimentation and analysis show that V-EPTD has good performances for users, verifiers, and the server, both in communication overhead and computation overhead.

ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III (2022)

Proceedings Paper Computer Science, Information Systems

Analysis of Address Linkability in Tornado Cash on Ethereum

Yujia Tang, Chang Xu, Can Zhang, Yan Wu, Liehuang Zhu

Summary: Tornado Cash, a popular non-custodial coin mixer on Ethereum, is used to protect the privacy of addresses. However, it has privacy leakage risks due to inappropriate transaction behaviors. This paper analyzes the privacy issues of Tornado Cash and proposes clustering rules to reduce the size of users' anonymity set.

CYBER SECURITY, CNCERT 2021 (2022)

暂无数据