| Literature DB >> 35746213 |
Yasir Iqbal1, Shahzaib Tahir1, Hasan Tahir2, Fawad Khan1, Saqib Saeed3, Abdullah M Almuhaideb4, Adeel M Syed5.
Abstract
Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the culture of online consultancy. Thus, there is a need to revamp the conventional model of the telemedicine system as per the current challenges and requirements. Security and privacy of data are main aspects to be considered in this era. Data-driven organizations also require compliance with regulatory bodies, such as HIPAA, PHI, and GDPR. These regulatory compliance bodies must ensure user data privacy by implementing necessary security measures. Patients and doctors are now connected to the cloud to access medical records, e.g., voice recordings of clinical sessions. Voice data reside in the cloud and can be compromised. While searching voice data, a patient's critical data can be leaked, exposed to cloud service providers, and spoofed by hackers. Secure, searchable encryption is a requirement for telemedicine systems for secure voice and phoneme searching. This research proposes the secure searching of phonemes from audio recordings using fully homomorphic encryption over the cloud. It utilizes IBM's homomorphic encryption library (HElib) and achieves indistinguishability. Testing and implementation were done on audio datasets of different sizes while varying the security parameters. The analysis includes a thorough security analysis along with leakage profiling. The proposed scheme achieved higher levels of security and privacy, especially when the security parameters increased. However, in use cases where higher levels of security were not desirous, one may rely on a reduction in the security parameters.Entities:
Keywords: cloud; fully homomorphic encryption (FHE); phoneme/audio searching; searchable encryption
Mesh:
Year: 2022 PMID: 35746213 PMCID: PMC9228489 DOI: 10.3390/s22124432
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Overview of telemedicine architecture.
Comparative analysis of different proposed schemes.
| Paper | Technique Used | Confidentiality | HE | Searching | Privacy |
|---|---|---|---|---|---|
| [ | Newton-Raphson | ✓ | ✓ | ✓ | |
| [ | Neural Network | ✓ | ✓ | ✓ | ✓ |
| [ | Index-based | ✓ | ✓ | ✓ | |
| [ | Blockchain | ✓ | |||
| [ | Attribute Encryption | ✓ | ✓ | ||
| [ | Hyper-ledger | ✓ | ✓ | ||
| [ | Proxy Signature | ✓ | ✓ | ||
| [ | Blockchain | ✓ | ✓ | ✓ | |
| [ | Index-based | ✓ | ✓ | ✓ | |
| [ | Index-based | ✓ | ✓ | ✓ | |
| [ | DGHV HE | ✓ | ✓ | ✓ | |
| [ | Index-based | ✓ | ✓ | ||
| [ | Tree-based Index, | ✓ | ✓ | ✓ | |
| [ | Public Encryption with | ✓ | ✓ | ✓ | |
| [ | Dual Word Embeddings, | ✓ | ✓ | ✓ | |
| Proposed | Fully HE | ✓ | ✓ | ✓ | ✓ |
Figure 2Architecture diagram of phonemes search.
Notations and descriptions.
| Notation | Description |
|---|---|
|
| Secret key |
|
| Public key |
|
| Security parameter for FHE |
| hwt | Hamming weight |
| p | Plaintext space modulus |
| m | Cyclotomic polynomial-defines phi(m), |
| r | Hensel lifting (default = 1) |
| bits | Number of bits of the modulus chain |
| c | Number of columns of Key-Switching matrix |
|
| Encrypted audio files |
| nthreads | Size of NTL thread pool (default =1) |
|
| Encrypted phonemes |
|
| Query |
|
| Result after searching phase |
| X | Plain text |
|
| Set of phoneme files |
|
| Numerical vector |
| N | Number of input files |
| Ph | Phonemes |
| C | Ciphertext |
|
| Phonemes (plaintext) query |
|
| Encrypted trapdoor |
m parameter for different security levels.
| Serial Number | 1 | 2 | 3 | 4 |
|---|---|---|---|---|
| ‘m’ value | 53,261 | 28,679 | 14,339 | 12,169 |
| Security Level | 93.77 | 36.8 | 12.63 | 9.22 |
| Plaintext File Size (Bytes) | 54 | 179 | 179 | 179 |
| Number of Phonemes | 10 | 30 | 30 | 30 |
| Enc Time (sec) | 1.19 | 1.63 | 0.8 | 0.77 |
| Ciphertext File Size (MBs) | 297.2 | 445.6 | 255.8 | 229.3 |
| Search Query Time (sec) | 2736 | 1880 | 110.7 | 174.7 |
Figure 3Audio to text conversion performance.
Figure 4Text to phoneme conversion performance.
Computational complexity.
| Basic Paillier (PPHE) |
|
| CRT-PHES [ |
|
| NC-PHES [ |
|
| HElib [ |
|
| DGHV |
|
Time Complexity of HElib.
| Setup |
|
| Encryption |
|
| Trapdoor Generation |
|
| Searching |
|
| Decryption |
|
Specifications.
| Specifications | Contabo Cloud | Client |
|---|---|---|
| OS | Ubuntu 20.04 | Ubuntu 20.04 (64 bits) |
| CPU Cores | 10 vCPU Cores | Intel i7-7700 CPU @ 3.6 GHz × 8 |
| RAM | 60 GB | 16 GB |
| Storage | 1.6 TB | 1 TB SSD |
| Network speed | 1 Gbit/s | 100 MB/s |
Figure 5Results of multiple files, when m = 130 and zero security level.
Figure 6Results of multiple files, when m = 21,845 and 20.2167 security level.
Security goals description.
| Security Goals | Implementation Description |
|---|---|
| Data confidentiality | Is achieved by homomorphically encrypting the telemedicine data. |
| Searching capability | By presenting a fully homomorphic encryption searching scheme. |
| Authorized person searching | Only an authorized person in possession of the correct cryptographic keys can generate a search query and decrypt the files. |
| Privacy-preserving | Probabilistic encryption is introduced, preserving the privacy of the data. |
| Search pattern hiding | The trapdoors are probabilistic, achieving search pattern hiding. |
| Cloud deployable | The proposed scheme is implemented and tested over the Contabo CSP |