{"title":"基于堆排序的电子医疗系统Top-K安全查询方案","authors":"Wenjing Yang;Hao Wang;Zhi Li;Ziyu Niu;Ye Su","doi":"10.1109/TNSE.2025.3580800","DOIUrl":null,"url":null,"abstract":"In the e-Healthcare ecosystem, medical institutions increasingly rely on cloud computing platforms to outsource data storage and query processing, aiming to optimize service delivery efficiency. A critical component of such services is the top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query, which identifies the <inline-formula><tex-math>$k$</tex-math></inline-formula> most relevant or highest-ranked records within datasets. However, since medical data contain sensitive patient information and require privacy-preserving outsourcing, traditional top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query schemes are no longer suitable, while existing privacy-preserving solutions suffer from high computational overhead in practice. To address these issues, we introduce a lightweight privacy-preserving secure top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query scheme. Specifically, our proposed scheme utilizes lightweight cryptographic tools, additive secret sharing and Function Secret Sharing (FSS) techniques, as the foundation of the underlying distributed secure computation. These techniques significantly reduce computational overhead while ensuring the privacy of medical data. Furthermore, we propose a Secure Max Heap Sorting (MH) protocol, which helps us to rapidly implement the top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query functionality in our scheme. Additionally, we design a set of fundamental secure protocols based on FSS, including the Secure Minimum Value (MinV) protocol, Secure Maximum Value (MaxV) protocol and Secure Heap Adjustment (HA) protocol. By integrating our cryptographic protocols with a secure squared Euclidean distance protocol, we construct a secure top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query scheme for e-Healthcare scenarios. Finally, we present formal security proofs under the semi-honest adversary model, which theoretically establish the security of the proposed scheme. Thanks to the adoption of secret sharing techniques, our scheme requires the client to only split the data into secret shares, a process that incurs nearly zero computational cost. The superior efficiency of our solution is further demonstrated through theoretical analysis and experimental evaluations.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 6","pages":"5073-5085"},"PeriodicalIF":7.9000,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Heapsort-Based Secure Top-K Query Scheme for E-Healthcare Systems\",\"authors\":\"Wenjing Yang;Hao Wang;Zhi Li;Ziyu Niu;Ye Su\",\"doi\":\"10.1109/TNSE.2025.3580800\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the e-Healthcare ecosystem, medical institutions increasingly rely on cloud computing platforms to outsource data storage and query processing, aiming to optimize service delivery efficiency. A critical component of such services is the top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query, which identifies the <inline-formula><tex-math>$k$</tex-math></inline-formula> most relevant or highest-ranked records within datasets. However, since medical data contain sensitive patient information and require privacy-preserving outsourcing, traditional top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query schemes are no longer suitable, while existing privacy-preserving solutions suffer from high computational overhead in practice. To address these issues, we introduce a lightweight privacy-preserving secure top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query scheme. Specifically, our proposed scheme utilizes lightweight cryptographic tools, additive secret sharing and Function Secret Sharing (FSS) techniques, as the foundation of the underlying distributed secure computation. These techniques significantly reduce computational overhead while ensuring the privacy of medical data. Furthermore, we propose a Secure Max Heap Sorting (MH) protocol, which helps us to rapidly implement the top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query functionality in our scheme. Additionally, we design a set of fundamental secure protocols based on FSS, including the Secure Minimum Value (MinV) protocol, Secure Maximum Value (MaxV) protocol and Secure Heap Adjustment (HA) protocol. By integrating our cryptographic protocols with a secure squared Euclidean distance protocol, we construct a secure top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query scheme for e-Healthcare scenarios. Finally, we present formal security proofs under the semi-honest adversary model, which theoretically establish the security of the proposed scheme. Thanks to the adoption of secret sharing techniques, our scheme requires the client to only split the data into secret shares, a process that incurs nearly zero computational cost. The superior efficiency of our solution is further demonstrated through theoretical analysis and experimental evaluations.\",\"PeriodicalId\":54229,\"journal\":{\"name\":\"IEEE Transactions on Network Science and Engineering\",\"volume\":\"12 6\",\"pages\":\"5073-5085\"},\"PeriodicalIF\":7.9000,\"publicationDate\":\"2025-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Network Science and Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11039665/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11039665/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
Heapsort-Based Secure Top-K Query Scheme for E-Healthcare Systems
In the e-Healthcare ecosystem, medical institutions increasingly rely on cloud computing platforms to outsource data storage and query processing, aiming to optimize service delivery efficiency. A critical component of such services is the top-$k$ query, which identifies the $k$ most relevant or highest-ranked records within datasets. However, since medical data contain sensitive patient information and require privacy-preserving outsourcing, traditional top-$k$ query schemes are no longer suitable, while existing privacy-preserving solutions suffer from high computational overhead in practice. To address these issues, we introduce a lightweight privacy-preserving secure top-$k$ query scheme. Specifically, our proposed scheme utilizes lightweight cryptographic tools, additive secret sharing and Function Secret Sharing (FSS) techniques, as the foundation of the underlying distributed secure computation. These techniques significantly reduce computational overhead while ensuring the privacy of medical data. Furthermore, we propose a Secure Max Heap Sorting (MH) protocol, which helps us to rapidly implement the top-$k$ query functionality in our scheme. Additionally, we design a set of fundamental secure protocols based on FSS, including the Secure Minimum Value (MinV) protocol, Secure Maximum Value (MaxV) protocol and Secure Heap Adjustment (HA) protocol. By integrating our cryptographic protocols with a secure squared Euclidean distance protocol, we construct a secure top-$k$ query scheme for e-Healthcare scenarios. Finally, we present formal security proofs under the semi-honest adversary model, which theoretically establish the security of the proposed scheme. Thanks to the adoption of secret sharing techniques, our scheme requires the client to only split the data into secret shares, a process that incurs nearly zero computational cost. The superior efficiency of our solution is further demonstrated through theoretical analysis and experimental evaluations.
期刊介绍:
The proposed journal, called the IEEE Transactions on Network Science and Engineering (TNSE), is committed to timely publishing of peer-reviewed technical articles that deal with the theory and applications of network science and the interconnections among the elements in a system that form a network. In particular, the IEEE Transactions on Network Science and Engineering publishes articles on understanding, prediction, and control of structures and behaviors of networks at the fundamental level. The types of networks covered include physical or engineered networks, information networks, biological networks, semantic networks, economic networks, social networks, and ecological networks. Aimed at discovering common principles that govern network structures, network functionalities and behaviors of networks, the journal seeks articles on understanding, prediction, and control of structures and behaviors of networks. Another trans-disciplinary focus of the IEEE Transactions on Network Science and Engineering is the interactions between and co-evolution of different genres of networks.