Skip to main content
Log in

Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Medical service recommendation is as an essential component of eHealthcare systems, and has received widespread attention in recent years. In medical systems, users can send demands to medical server, which then recommends the suitable doctors based on the demands. In the existing medical service recommendation scheme, although users can send the basic demands to get medical service recommendation, users cannot set the attributes of demands that are more concerned according to their own preferences or personalized demands, so as to get the accurate personalized medical service. In addition, due to the sensitivity of the users’ information, guaranteeing the privacy throughout the recommendation process without sacrificing the accuracy is still challenging. In this paper, we propose a privacy-preserving multi-level attribute based medical service recommendation scheme. This work considers multi-level attributes to fully describe users’ demand information, and users’ concerned attributes are considered to achieve personalized medical service recommendation. We design two algorithms to keep user’s demands secret, and recommend doctors in a privacy-preserving way. Detailed analysis proves that the proposed scheme can achieve the desired security prosperities. Performance evaluations through extensive experiments also demonstrate the efficiency of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Hu H, Lu R, Zhang Z, Shao J (2017) Replace: A reliable trust-based platoon service recommendation scheme in vanet. IEEE Trans Veh Tech 66(2):1786–1797

    Article  Google Scholar 

  2. Marmol F G, Perez G M (2012) Trip, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Net Comp App 35(3):934–941

    Article  Google Scholar 

  3. Li D, Lv Q, Shang L, Gu N (2017) Efficient privacy-preserving content recommendation for online social communities. Neurocomputing 219:440–454

    Article  Google Scholar 

  4. Ma X, Ma J, Li H, Jiang Q, Gao S (2018) ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Fut Gen Comp Syst 79:82–94

    Article  Google Scholar 

  5. Huang C, Lu R, Zhu H, Shao J, Lin X (2016) FSSR: fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: Proceedings of Asia Conf. on Comp. and Comm. Sec., pp 95–106

  6. Li H, Yang Y, Luan T H, Liang X, Zhou L, Shen X S (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Sec Comput 13(3):312–325

    Article  Google Scholar 

  7. Wang X S, Huang Y, Zhao Y, Tang H, Wang X, Bu D (2015) Efficient genome-wide, privacy-preserving similar patient query based on private edit distance. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, pp 492–503

  8. Daemen J, Rijmen V (2002) The design of rijndael: AES - the advanced encryption standard. Information Security and Cryptography. Springer

  9. Kaliski B, Staddon J (1998) PKCS #1: RSA cryptography specifications version 2.0. RFC 2437:1–39

    Google Scholar 

  10. Hu H, Lu R, Zhang Z (2017) Tpsq: Trust-based platoon service query via vehicular communications. Peer-to-Peer Netw Appl:1–16

  11. Hu H, Lu R, Huang C, Zhang Z (2017) PTRS: A privacy-preserving trust-based relay selection scheme in vanets. Peer-to-Peer Netw Appl 10(5):1204–1218

    Article  Google Scholar 

  12. He Z, Yang J-J, Wang Q, Li J (2016) A method of electronic medical record similarity computation. In: Smart Health - International Conference, ICSH 2016, Haikou, Revised Selected Papers, pp 182–191

  13. Polatidis N, Georgiadis C K, Pimenidis E, Mouratidis H (2017) Privacy-preserving collaborative recommendations based on random perturbations. Expert Syst Appl 71:18–25

    Article  Google Scholar 

  14. Li H, Xu G, Tang Q, Lin X, Shen X S (2018) Enabling efficient and fine-grained DNA similarity search with access control over encrypted cloud data. In: Wireless Algorithms, Systems, and Applications - 13th International Conference, WASA 2018, Tianjin, Proceedings, pp 236–248

  15. Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven. Proceedings, pp 190–209

  16. Zhang C, Zhu L, Xu C, Lu R (2018) PPDP: an efficient and privacy-preserving disease prediction scheme in cloud-based e-healthcare system. Fut Gener Comp Syst 79:16–25

    Article  Google Scholar 

  17. Li H, Ren H, Yao H, Chen H, Xu G, Dai Y-S (2015) Diverse multi-keyword ranked search over encrypted cloud data supporting range query. In: 2015 IEEE/CIC International Conference on Communications in China, ICCC 2015, Shenzhen, pp 1–6

  18. Wang B, Song W, Lou W, Hou Y T (2017) Privacy-preserving pattern matching over encrypted genetic data in cloud computing. In: 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, pp 1–9

  19. Yang X, Lu R, Shao J, Tang X, Yang H (2019) An efficient and privacy-preserving disease risk prediction scheme for e-healthcare. IEEE Internet Things J 6(2):3284–3297

    Article  Google Scholar 

  20. Zheng Y, Lu R, Shao J (2019) Achieving efficient and privacy-preserving k-nn query for outsourced ehealthcare data. J Med Syst 43(5):123:1–123:13

    Article  Google Scholar 

  21. Xu S, Li Y, Deng R H, Zhang Y, Luo X, Liu X (2019) Lightweight and expressive fine-grained access control for healthcare internet-of-things. In: IEEE Trans Cloud Comput:1–1

  22. Kang J, Yu R, Huang X, Zhang Y (2018) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst 19(8):2627–2637

    Article  Google Scholar 

  23. Zhang C, Zhu L, Xu C, Liu X, Sharif K (2019) Reliable and privacy-preserving truth discovery for mobile crowdsensing systems. IEEE Trans Dependable Sec Comput. https://doi.org/10.1109/TDSC.2019.2919517

  24. Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12

    Article  Google Scholar 

Download references

Acknowledgements

The authors want to thank the associate editor and reviewers for their constructive and generous feedback. This research is supported by the National Natural Science Foundation of China (Grant Nos. 61972037, 61872041, U1836212).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liehuang Zhu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, C., Wang, J., Zhu, L. et al. Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems. Peer-to-Peer Netw. Appl. 14, 1841–1853 (2021). https://doi.org/10.1007/s12083-021-01075-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01075-9

Keywords

Navigation