FSAIR: Fine-Grained Secure Approximate Image Retrieval for Mobile Cloud Computing

被引:6
作者
Zhang, Shaobo [1 ]
Liu, Qi [1 ]
Wang, Tian [2 ]
Liang, Wei [1 ]
Li, Kuan-Ching [3 ]
Wang, Guojun [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beijing Normal Univ & UIC, Artificial Intelligence & Future Networks, Zhuhai, Guangdong, Peoples R China
[3] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[4] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Indexes; Encryption; Cloud computing; Image retrieval; Cryptography; Feature extraction; Security; Attribute-based encryption (ABE); bloom filter; image retrieval; privacy protection; SEARCH; EFFICIENT; SCHEME; ENCRYPTION; FEATURES; PATTERN;
D O I
10.1109/JIOT.2024.3384458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and the Internet of Things (IoT) provide robust technological support for the development of image retrieval services. Specifically, images are highly sensitive and private data in e-healthcare and security surveillance. Existing retrieval schemes often do not strike a good balance between privacy protection and retrieval performance. It makes data vulnerable to illegal attacks and leads to high retrieval costs, thereby affecting the overall quality and usability of the system. To address these issues, this article introduces a fine-grained secure approximate image retrieval (FSAIR) scheme for mobile cloud computing. Our approach implements a multiverification architecture that provides precise identity control and an untraceable strategy. Furthermore, FSAIR constructs a flexible and secure hierarchical structure to support the efficient retrieval of large-scale high-dimensional data. By introducing Bloom filters to replace index nodes, FSAIR ensures system efficiency and employs bit-pattern encoding descriptors to search approximate data without violating privacy. We show that the proposed scheme protects data under different threat modes through security analysis. We also demonstrate the feasibility and superiority of the proposed solution through experimental evaluation, using the Caltech-256 data set.
引用
收藏
页码:23297 / 23308
页数:12
相关论文
共 49 条
[11]   SEcure Similar Image Matching (SESIM): An Improved Privacy Preserving Image Retrieval Protocol over Encrypted Cloud Database [J].
Janani, T. ;
Brindha, M. .
IEEE TRANSACTIONS ON MULTIMEDIA, 2022, 24 :3794-3806
[12]   Attribute-Based Keyword Search and Data Access Control in Cloud [J].
Li, Jiazhi ;
Zhang, Lei .
2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, :382-386
[13]   Full Verifiability for Outsourced Decryption in Attribute Based Encryption [J].
Li, Jiguo ;
Wang, Yao ;
Zhang, Yichen ;
Han, Jinguang .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) :478-487
[14]   DVPPIR: privacy-preserving image retrieval based on DCNN and VHE [J].
Li, Su ;
Wu, Lei ;
Meng, Weizhi ;
Xu, Zihui ;
Qin, Chengyi ;
Wang, Hao .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (17) :14355-14371
[15]   Similarity Search for Encrypted Images in Secure Cloud Computing [J].
Li, Yingying ;
Ma, Jianfeng ;
Miao, Yinbin ;
Wang, Yue ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) :1142-1155
[16]   Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings [J].
Li, Yingying ;
Ma, Jianfeng ;
Miao, Yinbin ;
Wang, Yue ;
Yang, Tengfei ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) :2936-2948
[17]   Multi-user image retrieval with suppression of search pattern leakage [J].
Liu, Hong ;
Zhang, Yushu ;
Xiang, Yong ;
Liu, Bo ;
Guo, ErChuan .
INFORMATION SCIENCES, 2022, 607 :1041-1060
[18]   MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments [J].
Liu, Qin ;
Peng, Yu ;
Xu, Qian ;
Jiang, Hongbo ;
Wu, Jie ;
Wang, Tian ;
Peng, Tao ;
Wang, Guojun ;
Zhang, Shaobo .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) :1994-2011
[19]   SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems [J].
Liu, Qin ;
Hao, Zhengzheng ;
Peng, Yu ;
Jiang, Hongbo ;
Wu, Jie ;
Peng, Tao ;
Wang, Guojun ;
Zhang, Shaobo .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 120
[20]   Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature [J].
Majhi, Mukul ;
Mallick, Ajay Kumar .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) :6829-6846