基于堆排序的电子医疗系统Top-K安全查询方案

IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY
Wenjing Yang;Hao Wang;Zhi Li;Ziyu Niu;Ye Su
{"title":"基于堆排序的电子医疗系统Top-K安全查询方案","authors":"Wenjing Yang;Hao Wang;Zhi Li;Ziyu Niu;Ye Su","doi":"10.1109/TNSE.2025.3580800","DOIUrl":null,"url":null,"abstract":"In the e-Healthcare ecosystem, medical institutions increasingly rely on cloud computing platforms to outsource data storage and query processing, aiming to optimize service delivery efficiency. A critical component of such services is the top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query, which identifies the <inline-formula><tex-math>$k$</tex-math></inline-formula> most relevant or highest-ranked records within datasets. However, since medical data contain sensitive patient information and require privacy-preserving outsourcing, traditional top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query schemes are no longer suitable, while existing privacy-preserving solutions suffer from high computational overhead in practice. To address these issues, we introduce a lightweight privacy-preserving secure top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query scheme. Specifically, our proposed scheme utilizes lightweight cryptographic tools, additive secret sharing and Function Secret Sharing (FSS) techniques, as the foundation of the underlying distributed secure computation. These techniques significantly reduce computational overhead while ensuring the privacy of medical data. Furthermore, we propose a Secure Max Heap Sorting (MH) protocol, which helps us to rapidly implement the top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query functionality in our scheme. Additionally, we design a set of fundamental secure protocols based on FSS, including the Secure Minimum Value (MinV) protocol, Secure Maximum Value (MaxV) protocol and Secure Heap Adjustment (HA) protocol. By integrating our cryptographic protocols with a secure squared Euclidean distance protocol, we construct a secure top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query scheme for e-Healthcare scenarios. Finally, we present formal security proofs under the semi-honest adversary model, which theoretically establish the security of the proposed scheme. Thanks to the adoption of secret sharing techniques, our scheme requires the client to only split the data into secret shares, a process that incurs nearly zero computational cost. The superior efficiency of our solution is further demonstrated through theoretical analysis and experimental evaluations.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 6","pages":"5073-5085"},"PeriodicalIF":7.9000,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Heapsort-Based Secure Top-K Query Scheme for E-Healthcare Systems\",\"authors\":\"Wenjing Yang;Hao Wang;Zhi Li;Ziyu Niu;Ye Su\",\"doi\":\"10.1109/TNSE.2025.3580800\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the e-Healthcare ecosystem, medical institutions increasingly rely on cloud computing platforms to outsource data storage and query processing, aiming to optimize service delivery efficiency. A critical component of such services is the top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query, which identifies the <inline-formula><tex-math>$k$</tex-math></inline-formula> most relevant or highest-ranked records within datasets. However, since medical data contain sensitive patient information and require privacy-preserving outsourcing, traditional top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query schemes are no longer suitable, while existing privacy-preserving solutions suffer from high computational overhead in practice. To address these issues, we introduce a lightweight privacy-preserving secure top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query scheme. Specifically, our proposed scheme utilizes lightweight cryptographic tools, additive secret sharing and Function Secret Sharing (FSS) techniques, as the foundation of the underlying distributed secure computation. These techniques significantly reduce computational overhead while ensuring the privacy of medical data. Furthermore, we propose a Secure Max Heap Sorting (MH) protocol, which helps us to rapidly implement the top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query functionality in our scheme. Additionally, we design a set of fundamental secure protocols based on FSS, including the Secure Minimum Value (MinV) protocol, Secure Maximum Value (MaxV) protocol and Secure Heap Adjustment (HA) protocol. By integrating our cryptographic protocols with a secure squared Euclidean distance protocol, we construct a secure top-<inline-formula><tex-math>$k$</tex-math></inline-formula> query scheme for e-Healthcare scenarios. Finally, we present formal security proofs under the semi-honest adversary model, which theoretically establish the security of the proposed scheme. Thanks to the adoption of secret sharing techniques, our scheme requires the client to only split the data into secret shares, a process that incurs nearly zero computational cost. The superior efficiency of our solution is further demonstrated through theoretical analysis and experimental evaluations.\",\"PeriodicalId\":54229,\"journal\":{\"name\":\"IEEE Transactions on Network Science and Engineering\",\"volume\":\"12 6\",\"pages\":\"5073-5085\"},\"PeriodicalIF\":7.9000,\"publicationDate\":\"2025-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Network Science and Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11039665/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11039665/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

摘要

在电子医疗生态系统中,医疗机构越来越依赖云计算平台将数据存储和查询处理外包,以优化服务交付效率。此类服务的一个关键组件是top- k查询,它识别数据集中最相关或排名最高的k条记录。然而,由于医疗数据中包含敏感的患者信息,并且需要将隐私保护外包,传统的top-$k$查询方案已不再适用,而现有的隐私保护方案在实践中存在较高的计算开销。为了解决这些问题,我们引入了一种轻量级的保护隐私的安全top- k查询方案。具体来说,我们提出的方案利用轻量级加密工具、加性秘密共享和功能秘密共享(FSS)技术作为底层分布式安全计算的基础。这些技术在确保医疗数据隐私的同时显著降低了计算开销。此外,我们提出了一个安全的最大堆排序(MH)协议,该协议有助于我们在我们的方案中快速实现top-$k$查询功能。此外,我们还设计了一套基于FSS的基本安全协议,包括安全最小值(MinV)协议、安全最大值(MaxV)协议和安全堆调整(HA)协议。通过将我们的加密协议与安全的平方欧氏距离协议集成,我们构建了一个用于电子医疗场景的安全top-$k$查询方案。最后,我们给出了半诚实对手模型下的形式化安全证明,从理论上证明了所提方案的安全性。由于采用了秘密共享技术,我们的方案只要求客户端将数据拆分为秘密共享,这一过程几乎不会产生任何计算成本。通过理论分析和实验评估,进一步证明了该解决方案的优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Heapsort-Based Secure Top-K Query Scheme for E-Healthcare Systems
In the e-Healthcare ecosystem, medical institutions increasingly rely on cloud computing platforms to outsource data storage and query processing, aiming to optimize service delivery efficiency. A critical component of such services is the top-$k$ query, which identifies the $k$ most relevant or highest-ranked records within datasets. However, since medical data contain sensitive patient information and require privacy-preserving outsourcing, traditional top-$k$ query schemes are no longer suitable, while existing privacy-preserving solutions suffer from high computational overhead in practice. To address these issues, we introduce a lightweight privacy-preserving secure top-$k$ query scheme. Specifically, our proposed scheme utilizes lightweight cryptographic tools, additive secret sharing and Function Secret Sharing (FSS) techniques, as the foundation of the underlying distributed secure computation. These techniques significantly reduce computational overhead while ensuring the privacy of medical data. Furthermore, we propose a Secure Max Heap Sorting (MH) protocol, which helps us to rapidly implement the top-$k$ query functionality in our scheme. Additionally, we design a set of fundamental secure protocols based on FSS, including the Secure Minimum Value (MinV) protocol, Secure Maximum Value (MaxV) protocol and Secure Heap Adjustment (HA) protocol. By integrating our cryptographic protocols with a secure squared Euclidean distance protocol, we construct a secure top-$k$ query scheme for e-Healthcare scenarios. Finally, we present formal security proofs under the semi-honest adversary model, which theoretically establish the security of the proposed scheme. Thanks to the adoption of secret sharing techniques, our scheme requires the client to only split the data into secret shares, a process that incurs nearly zero computational cost. The superior efficiency of our solution is further demonstrated through theoretical analysis and experimental evaluations.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Network Science and Engineering
IEEE Transactions on Network Science and Engineering Engineering-Control and Systems Engineering
CiteScore
12.60
自引率
9.10%
发文量
393
期刊介绍: The proposed journal, called the IEEE Transactions on Network Science and Engineering (TNSE), is committed to timely publishing of peer-reviewed technical articles that deal with the theory and applications of network science and the interconnections among the elements in a system that form a network. In particular, the IEEE Transactions on Network Science and Engineering publishes articles on understanding, prediction, and control of structures and behaviors of networks at the fundamental level. The types of networks covered include physical or engineered networks, information networks, biological networks, semantic networks, economic networks, social networks, and ecological networks. Aimed at discovering common principles that govern network structures, network functionalities and behaviors of networks, the journal seeks articles on understanding, prediction, and control of structures and behaviors of networks. Another trans-disciplinary focus of the IEEE Transactions on Network Science and Engineering is the interactions between and co-evolution of different genres of networks.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信