FSAIR: Fine-Grained Secure Approximate Image Retrieval for Mobile Cloud Computing

被引:6
作者
Zhang, Shaobo [1 ]
Liu, Qi [1 ]
Wang, Tian [2 ]
Liang, Wei [1 ]
Li, Kuan-Ching [3 ]
Wang, Guojun [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beijing Normal Univ & UIC, Artificial Intelligence & Future Networks, Zhuhai, Guangdong, Peoples R China
[3] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[4] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Indexes; Encryption; Cloud computing; Image retrieval; Cryptography; Feature extraction; Security; Attribute-based encryption (ABE); bloom filter; image retrieval; privacy protection; SEARCH; EFFICIENT; SCHEME; ENCRYPTION; FEATURES; PATTERN;
D O I
10.1109/JIOT.2024.3384458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and the Internet of Things (IoT) provide robust technological support for the development of image retrieval services. Specifically, images are highly sensitive and private data in e-healthcare and security surveillance. Existing retrieval schemes often do not strike a good balance between privacy protection and retrieval performance. It makes data vulnerable to illegal attacks and leads to high retrieval costs, thereby affecting the overall quality and usability of the system. To address these issues, this article introduces a fine-grained secure approximate image retrieval (FSAIR) scheme for mobile cloud computing. Our approach implements a multiverification architecture that provides precise identity control and an untraceable strategy. Furthermore, FSAIR constructs a flexible and secure hierarchical structure to support the efficient retrieval of large-scale high-dimensional data. By introducing Bloom filters to replace index nodes, FSAIR ensures system efficiency and employs bit-pattern encoding descriptors to search approximate data without violating privacy. We show that the proposed scheme protects data under different threat modes through security analysis. We also demonstrate the feasibility and superiority of the proposed solution through experimental evaluation, using the Caltech-256 data set.
引用
收藏
页码:23297 / 23308
页数:12
相关论文
共 49 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[3]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[4]   Dynamic multi-client searchable symmetric encryption with support for boolean queries [J].
Du, Leilei ;
Li, Kenli ;
Liu, Qin ;
Wu, Zhiqiang ;
Zhang, Shaobo .
INFORMATION SCIENCES, 2020, 506 :234-257
[5]   A faster outsourced medical image retrieval scheme with privacy preservation [J].
Duan, Yating ;
Li, Yanping ;
Lu, Laifeng ;
Ding, Yong .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 122
[6]   "So what if ChatGPT wrote it?" Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy [J].
Dwivedi, Yogesh K. ;
Kshetri, Nir ;
Hughes, Laurie ;
Slade, Emma Louise ;
Jeyaraj, Anand ;
Kar, Arpan Kumar ;
Baabdullah, Abdullah M. ;
Koohang, Alex ;
Raghavan, Vishnupriya ;
Ahuja, Manju ;
Albanna, Hanaa ;
Albashrawi, Mousa Ahmad ;
Al-Busaidi, Adil S. ;
Balakrishnan, Janarthanan ;
Barlette, Yves ;
Basu, Sriparna ;
Bose, Indranil ;
Brooks, Laurence ;
Buhalis, Dimitrios ;
Carter, Lemuria ;
Chowdhury, Soumyadeb ;
Crick, Tom ;
Cunningham, Scott W. ;
Davies, Gareth H. ;
Davison, Robert M. ;
De, Rahul ;
Dennehy, Denis ;
Duan, Yanqing ;
Dubey, Rameshwar ;
Dwivedi, Rohita ;
Edwards, John S. ;
Flavian, Carlos ;
Gauld, Robin ;
Grover, Varun ;
Hu, Mei-Chih ;
Janssen, Marijn ;
Jones, Paul ;
Junglas, Iris ;
Khorana, Sangeeta ;
Kraus, Sascha ;
Larsen, Kai R. ;
Latreille, Paul ;
Laumer, Sven ;
Malik, F. Tegwen ;
Mardani, Abbas ;
Mariani, Marcello ;
Mithas, Sunil ;
Mogaji, Emmanuel ;
Nord, Jeretta Horn ;
O'Connor, Siobhan .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2023, 71
[7]   Ask the Experts: What Should Be on an IoT Privacy and Security Label? [J].
Emami-Naeini, Pardis ;
Agarwal, Yuvraj ;
Cranor, Lorrie Faith ;
Hibshi, Hanan .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :447-464
[8]  
Griffin Gregory, 2022, CaltechDATA
[9]   Privacy-preserving image search (PPIS) Secure classification and searching using convolutional neural network over large-scale encrypted medical images [J].
Guo, Cheng ;
Jia, Jing ;
Choo, Kim-Kwang Raymond ;
Jie, Yingmo .
COMPUTERS & SECURITY, 2020, 99 (99)
[10]   A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images [J].
Guo, Cheng ;
Su, Shenghao ;
Choo, Kim-Kwang Raymond ;
Tang, Xinyu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (01) :514-523