Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2021

18-03-2021

Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems

Authors: Chang Xu, Jiachen Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Can Zhang

Published in: Peer-to-Peer Networking and Applications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Medical service recommendation is as an essential component of eHealthcare systems, and has received widespread attention in recent years. In medical systems, users can send demands to medical server, which then recommends the suitable doctors based on the demands. In the existing medical service recommendation scheme, although users can send the basic demands to get medical service recommendation, users cannot set the attributes of demands that are more concerned according to their own preferences or personalized demands, so as to get the accurate personalized medical service. In addition, due to the sensitivity of the users’ information, guaranteeing the privacy throughout the recommendation process without sacrificing the accuracy is still challenging. In this paper, we propose a privacy-preserving multi-level attribute based medical service recommendation scheme. This work considers multi-level attributes to fully describe users’ demand information, and users’ concerned attributes are considered to achieve personalized medical service recommendation. We design two algorithms to keep user’s demands secret, and recommend doctors in a privacy-preserving way. Detailed analysis proves that the proposed scheme can achieve the desired security prosperities. Performance evaluations through extensive experiments also demonstrate the efficiency of our scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hu H, Lu R, Zhang Z, Shao J (2017) Replace: A reliable trust-based platoon service recommendation scheme in vanet. IEEE Trans Veh Tech 66(2):1786–1797CrossRef Hu H, Lu R, Zhang Z, Shao J (2017) Replace: A reliable trust-based platoon service recommendation scheme in vanet. IEEE Trans Veh Tech 66(2):1786–1797CrossRef
2.
go back to reference Marmol F G, Perez G M (2012) Trip, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Net Comp App 35(3):934–941CrossRef Marmol F G, Perez G M (2012) Trip, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Net Comp App 35(3):934–941CrossRef
3.
go back to reference Li D, Lv Q, Shang L, Gu N (2017) Efficient privacy-preserving content recommendation for online social communities. Neurocomputing 219:440–454CrossRef Li D, Lv Q, Shang L, Gu N (2017) Efficient privacy-preserving content recommendation for online social communities. Neurocomputing 219:440–454CrossRef
4.
go back to reference Ma X, Ma J, Li H, Jiang Q, Gao S (2018) ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Fut Gen Comp Syst 79:82–94CrossRef Ma X, Ma J, Li H, Jiang Q, Gao S (2018) ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Fut Gen Comp Syst 79:82–94CrossRef
5.
go back to reference Huang C, Lu R, Zhu H, Shao J, Lin X (2016) FSSR: fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: Proceedings of Asia Conf. on Comp. and Comm. Sec., pp 95–106 Huang C, Lu R, Zhu H, Shao J, Lin X (2016) FSSR: fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: Proceedings of Asia Conf. on Comp. and Comm. Sec., pp 95–106
6.
go back to reference Li H, Yang Y, Luan T H, Liang X, Zhou L, Shen X S (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Sec Comput 13(3):312–325CrossRef Li H, Yang Y, Luan T H, Liang X, Zhou L, Shen X S (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Sec Comput 13(3):312–325CrossRef
7.
go back to reference Wang X S, Huang Y, Zhao Y, Tang H, Wang X, Bu D (2015) Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, pp 492–503 Wang X S, Huang Y, Zhao Y, Tang H, Wang X, Bu D (2015) Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, pp 492–503
8.
go back to reference Daemen J, Rijmen V (2002) The design of rijndael: AES - the advanced encryption standard. Information Security and Cryptography. Springer Daemen J, Rijmen V (2002) The design of rijndael: AES - the advanced encryption standard. Information Security and Cryptography. Springer
9.
go back to reference Kaliski B, Staddon J (1998) PKCS #1: RSA cryptography specifications version 2.0. RFC 2437:1–39 Kaliski B, Staddon J (1998) PKCS #1: RSA cryptography specifications version 2.0. RFC 2437:1–39
10.
go back to reference Hu H, Lu R, Zhang Z (2017) Tpsq: Trust-based platoon service query via vehicular communications. Peer-to-Peer Netw Appl:1–16 Hu H, Lu R, Zhang Z (2017) Tpsq: Trust-based platoon service query via vehicular communications. Peer-to-Peer Netw Appl:1–16
11.
go back to reference Hu H, Lu R, Huang C, Zhang Z (2017) PTRS: A privacy-preserving trust-based relay selection scheme in vanets. Peer-to-Peer Netw Appl 10(5):1204–1218CrossRef Hu H, Lu R, Huang C, Zhang Z (2017) PTRS: A privacy-preserving trust-based relay selection scheme in vanets. Peer-to-Peer Netw Appl 10(5):1204–1218CrossRef
12.
go back to reference He Z, Yang J-J, Wang Q, Li J (2016) A method of electronic medical record similarity computation. In: Smart Health - International Conference, ICSH 2016, Haikou, Revised Selected Papers, pp 182–191 He Z, Yang J-J, Wang Q, Li J (2016) A method of electronic medical record similarity computation. In: Smart Health - International Conference, ICSH 2016, Haikou, Revised Selected Papers, pp 182–191
13.
go back to reference Polatidis N, Georgiadis C K, Pimenidis E, Mouratidis H (2017) Privacy-preserving collaborative recommendations based on random perturbations. Expert Syst Appl 71:18–25CrossRef Polatidis N, Georgiadis C K, Pimenidis E, Mouratidis H (2017) Privacy-preserving collaborative recommendations based on random perturbations. Expert Syst Appl 71:18–25CrossRef
14.
go back to reference Li H, Xu G, Tang Q, Lin X, Shen X S (2018) Enabling efficient and fine-grained DNA similarity search with access control over encrypted cloud data. In: Wireless Algorithms, Systems, and Applications - 13th International Conference, WASA 2018, Tianjin, Proceedings, pp 236–248 Li H, Xu G, Tang Q, Lin X, Shen X S (2018) Enabling efficient and fine-grained DNA similarity search with access control over encrypted cloud data. In: Wireless Algorithms, Systems, and Applications - 13th International Conference, WASA 2018, Tianjin, Proceedings, pp 236–248
15.
go back to reference Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven. Proceedings, pp 190–209 Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven. Proceedings, pp 190–209
16.
go back to reference Zhang C, Zhu L, Xu C, Lu R (2018) PPDP: an efficient and privacy-preserving disease prediction scheme in cloud-based e-healthcare system. Fut Gener Comp Syst 79:16–25CrossRef Zhang C, Zhu L, Xu C, Lu R (2018) PPDP: an efficient and privacy-preserving disease prediction scheme in cloud-based e-healthcare system. Fut Gener Comp Syst 79:16–25CrossRef
17.
go back to reference Li H, Ren H, Yao H, Chen H, Xu G, Dai Y-S (2015) Diverse multi-keyword ranked search over encrypted cloud data supporting range query. In: 2015 IEEE/CIC International Conference on Communications in China, ICCC 2015, Shenzhen, pp 1–6 Li H, Ren H, Yao H, Chen H, Xu G, Dai Y-S (2015) Diverse multi-keyword ranked search over encrypted cloud data supporting range query. In: 2015 IEEE/CIC International Conference on Communications in China, ICCC 2015, Shenzhen, pp 1–6
18.
go back to reference Wang B, Song W, Lou W, Hou Y T (2017) Privacy-preserving pattern matching over encrypted genetic data in cloud computing. In: 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, pp 1–9 Wang B, Song W, Lou W, Hou Y T (2017) Privacy-preserving pattern matching over encrypted genetic data in cloud computing. In: 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, pp 1–9
19.
go back to reference Yang X, Lu R, Shao J, Tang X, Yang H (2019) An efficient and privacy-preserving disease risk prediction scheme for e-healthcare. IEEE Internet Things J 6(2):3284–3297CrossRef Yang X, Lu R, Shao J, Tang X, Yang H (2019) An efficient and privacy-preserving disease risk prediction scheme for e-healthcare. IEEE Internet Things J 6(2):3284–3297CrossRef
20.
go back to reference Zheng Y, Lu R, Shao J (2019) Achieving efficient and privacy-preserving k-nn query for outsourced ehealthcare data. J Med Syst 43(5):123:1–123:13CrossRef Zheng Y, Lu R, Shao J (2019) Achieving efficient and privacy-preserving k-nn query for outsourced ehealthcare data. J Med Syst 43(5):123:1–123:13CrossRef
21.
go back to reference Xu S, Li Y, Deng R H, Zhang Y, Luo X, Liu X (2019) Lightweight and expressive fine-grained access control for healthcare internet-of-things. In: IEEE Trans Cloud Comput:1–1 Xu S, Li Y, Deng R H, Zhang Y, Luo X, Liu X (2019) Lightweight and expressive fine-grained access control for healthcare internet-of-things. In: IEEE Trans Cloud Comput:1–1
22.
go back to reference Kang J, Yu R, Huang X, Zhang Y (2018) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst 19(8):2627–2637CrossRef Kang J, Yu R, Huang X, Zhang Y (2018) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst 19(8):2627–2637CrossRef
24.
go back to reference Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12CrossRef Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12CrossRef
Metadata
Title
Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems
Authors
Chang Xu
Jiachen Wang
Liehuang Zhu
Kashif Sharif
Chuan Zhang
Can Zhang
Publication date
18-03-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01075-9

Other articles of this Issue 4/2021

Peer-to-Peer Networking and Applications 4/2021 Go to the issue

Premium Partner