scispace - formally typeset
Journal ArticleDOI

A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images

TLDR
A secure and efficient scheme to find the exact nearest neighbor over encrypted medical images by computing the lower bound of the Euclidean distance that is related to the mean and standard deviation of data.
Abstract
Medical imaging is crucial for medical diagnosis, and the sensitive nature of medical images necessitates rigorous security and privacy solutions to be in place. In a cloud-based medical system for Healthcare Industry 4.0, medical images should be encrypted prior to being outsourced. However, processing queries over encrypted data without first executing the decryption operation is challenging and impractical at present. In this paper, we propose a secure and efficient scheme to find the exact nearest neighbor over encrypted medical images. Instead of calculating the Euclidean distance, we reject candidates by computing the lower bound of the Euclidean distance that is related to the mean and standard deviation of data. Unlike most existing schemes, our scheme can obtain the exact nearest neighbor rather than an approximate result. We, then, evaluate our proposed approach to demonstrate its utility.

read more

Citations
More filters
Book ChapterDOI

The knowledge complexity of interactive proof-systems

TL;DR: Permission to copy without fee all or part of this material is granted provided that the copies arc not made or distributed for direct commercial advantage.
Journal ArticleDOI

Smartphone-based analytical biosensors

TL;DR: This paper reviews the recent development of four types of smartphone based analytical biosensory systems at the POC, i.e., smartphone-based microscopic imaging, colorimetric, electrochemical, and electrochemiluminescence biosensor.
Journal ArticleDOI

Lightweight Attention Convolutional Neural Network for Retinal Vessel Image Segmentation

TL;DR: A convolutional neural network integrated with the attention mechanism is proposed that outperforms other existing mainstream approaches, and most of the performance indicators are in the leading positions.
Journal ArticleDOI

Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage

TL;DR: A fuzzy identity-based dynamic auditing of big data is proposed, which combines the structure of the Merkle hash tree (MHT) with the Index logic table (ILT) and efficiently executes dynamic operations of the ILT on theructure of the MHT.
Journal ArticleDOI

Study on semi-active suspension applied on carbody underneath suspended system of high-speed railway vehicle:

TL;DR: Considering the coupling vibration of a flexible carbody and the underneath suspended equipment, a vertical coupled vibration model of a high-speed train was constructed in this article, where a roller test rig was used.
References
More filters
Proceedings ArticleDOI

R-trees: a dynamic index structure for spatial searching

TL;DR: A dynamic index structure called an R-tree is described which meets this need, and algorithms for searching and updating it are given and it is concluded that it is useful for current database systems in spatial applications.
Journal ArticleDOI

Multidimensional binary search trees used for associative searching

TL;DR: The multidimensional binary search tree (or k-d tree) as a data structure for storage of information to be retrieved by associative searches is developed and it is shown to be quite efficient in its storage requirements.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

Approximate nearest neighbors: towards removing the curse of dimensionality

TL;DR: In this paper, the authors present two algorithms for the approximate nearest neighbor problem in high-dimensional spaces, for data sets of size n living in R d, which require space that is only polynomial in n and d.
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Related Papers (5)