A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images

被引:26
作者
Guo, Cheng [1 ,2 ]
Su, Shenghao [1 ]
Choo, Kim-Kwang Raymond [3 ]
Tang, Xinyu [1 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116024, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Cloud computing; efficiency; medical images; nearest neighbor search; privacy; ALGORITHM; PRIVATE; CLOUD;
D O I
10.1109/TII.2018.2883680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Medical imaging is crucial for medical diagnosis, and the sensitive nature of medical images necessitates rigorous security and privacy solutions to be in place. In a cloud-based medical system for Healthcare Industry 4.0, medical images should be encrypted prior to being outsourced. However, processing queries over encrypted data without first executing the decryption operation is challenging and impractical at present. In this paper, we propose a secure and efficient scheme to find the exact nearest neighbor over encrypted medical images. Instead of calculating the Euclidean distance, we reject candidates by computing the lower bound of the Euclidean distance that is related to the mean and standard deviation of data. Unlike most existing schemes, our scheme can obtain the exact nearest neighbor rather than an approximate result. We, then, evaluate our proposed approach to demonstrate its utility.
引用
收藏
页码:514 / 523
页数:10
相关论文
共 33 条
[1]  
Andoni A, 2006, ANN IEEE SYMP FOUND, P459
[2]  
[Anonymous], 2016, **DATA OBJECT**, DOI [DOI 10.7937/K9/TCIA.2015.LO9QL9SX, 10.7937/K9/TCIA.2015.LO9QL9SX, DOI 10.7937/K9/TCIA]
[3]   An optimal algorithm for approximate nearest neighbor searching in fixed dimensions [J].
Arya, S ;
Mount, DM ;
Netanyahu, NS ;
Silverman, R ;
Wu, AY .
JOURNAL OF THE ACM, 1998, 45 (06) :891-923
[4]   MULTIDIMENSIONAL BINARY SEARCH TREES USED FOR ASSOCIATIVE SEARCHING [J].
BENTLEY, JL .
COMMUNICATIONS OF THE ACM, 1975, 18 (09) :509-517
[5]  
Berchtold S, 1996, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P28
[6]  
Beygelzimer A., 2006, ICML
[7]  
Bugiel S., 2011, P WORKSH CRYPT SEC C
[8]  
Choo K.K. R., 2010, Trends and Issues in Crime and Criminal justice, P1
[9]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[10]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893