AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval

被引:8
作者
Li, Dong [1 ]
Lu, Qingguo [1 ]
Liao, Xiaofeng [1 ]
Xiang, Tao [1 ]
Wu, Jiahui [2 ]
Le, Junqing [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Key Lab Dependable Serv Comp Cyber Phys & Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Biomedical imaging; Indexes; Image retrieval; Servers; Feature extraction; Encryption; Cloud computing; Adaptive verifiable result; chameleon hash; encryption searchable index tree; index merge; privacy-preserving; CLOUD; SCHEME; SECURE;
D O I
10.1109/TDSC.2024.3355223
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing privacy concerns associated with cloud-assisted image retrieval have captured the attention of researchers. However, a significant number of current research endeavors encounter limitations, including suboptimal accuracy, inefficient retrieval, and a lack of effective result verification mechanisms. To address these limitations, we propose an adaptive verifiable privacy-preserving medical image retrieval (AVPMIR) scheme in the outsourced cloud. Specifically, we utilize the convolutional neural network (CNN) ResNet50 model to extract the feature of each medical image within the dataset of the medical institution, aiming to enhance retrieval accuracy. To enhance retrieval efficiency, we build an encryption searchable index based on a mini-batch k-means clustering algorithm. Furthermore, we present an index merging method in which multi-data owners build a different index tree according to different standards. To check the correctness of the returned results from the cloud server, we construct an adaptive verification framework for the obtained results based on chameleon hash and BLS signature. To provide strong security for the medical image datasets, we design an improved logistic chaotic mapping algorithm. The security analysis demonstrates that AVPMIR can defend various threat models. The experiment analysis further indicates that the AVPMIR can improve retrieval efficiency and demonstrate its practicability.
引用
收藏
页码:4637 / 4651
页数:15
相关论文
共 44 条
[1]   Secure Content-Based Image Retrieval Using Combined Features in Cloud [J].
Anju, J. ;
Shreelekshmi, R. .
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2020), 2020, 11969 :179-197
[2]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[3]  
Cheng M., 2016, Hong Kong J. Nephrol., V18, P1
[4]   Numerical Method for Comparison on Homomorphically Encrypted Numbers [J].
Cheon, Jung Hee ;
Kim, Dongwoo ;
Kim, Duhyeong ;
Lee, Hun Hee ;
Lee, Keewoo .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 :415-445
[5]   Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing [J].
Cui, Helei ;
Yuan, Xingliang ;
Wang, Cong .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (05) :1315-1329
[6]   Towards an efficient LWE-based fully homomorphic encryption scheme [J].
Dowerah, Uddipana ;
Krishnaswamy, Srinivasan .
IET INFORMATION SECURITY, 2022, 16 (04) :235-252
[7]  
Griffin G., 2007, TECH REP
[8]   A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability [J].
Hao, Zhuo ;
Zhong, Sheng ;
Yu, Nenghai .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) :1432-1437
[9]   SensIR: Towards privacy-sensitive image retrieval in the cloud [J].
Hu, Lishuang ;
Xiang, Tao ;
Guo, Shangwei .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 84
[10]   Towards Private and Scalable Cross-Media Retrieval [J].
Hu, Shengshan ;
Zhang, Leo Yu ;
Wang, Qian ;
Qin, Zhan ;
Wang, Cong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1354-1368