Privacy-preserving query over the encrypted image in cloud computing

被引:6
|
作者
Zhu, Xudong [1 ]
Li, Hui [2 ]
Guo, Zhen [2 ]
机构
[1] School of Information and Control Engineering, Xi'an Univ. of Architecture and Technology
[2] School of Telecommunication Engineering, Xidian Univ.
来源
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University | 2014年 / 41卷 / 02期
关键词
Cloud computing; Content based image retrieval; Privacy-preserving; Searchable search encryption;
D O I
10.3969/j.issn.1001-2400.2014.02.025
中图分类号
学科分类号
摘要
In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. For the consideration of users' privacy, sensitive images have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. In this paper, firstly, we define the problem of privacy-preserving query over encrypted images in cloud computing. And to solve the problem, we design a computable encryption scheme based on vector and matrix calculations. The scheme pre-builds a feature-based index to provide feature-related information about each encrypted image, and then chooses the efficient image similarity measure as the pruning tool to carry out the retrieval procedure. Security analysis and performance evaluation show that the scheme is IND-CCA.
引用
收藏
页码:151 / 158
页数:7
相关论文
共 17 条
  • [1] Huang R.W., Gui X.L., Yu S., Et al., Study of privacy-preserving framework for cloud storage, computer Science and Information Systems, 8, 3, pp. 801-819, (2011)
  • [2] Jain A.K., Vailaya A., Image retrieval using color and shape, Pattern Recognition, 29, 8, pp. 1233-1244, (1997)
  • [3] Ma W.Y., Zhang H.J., Benchmarking of image features for content-based retrieval, The 32 Asilomar Conference on Signals, Systems & Computers, pp. 253-257, (1998)
  • [4] Loncaric S., A survey of shape analysis techniques, Pattern Recognition, 31, 8, pp. 983-1001, (1998)
  • [5] Mokhtarian F., Silhouette-based isolated object recognition through curvature scale space, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17, 5, pp. 539-544, (1995)
  • [6] Meng F., Guo B., Image retrieval by using local distribution features of interest points and multiple-instance learning, Journal of Xidian University, 38, 2, pp. 47-53, (2011)
  • [7] Cui L., Chen Y., Han Y., Visual similarity index for image quality assessment, Journal of Xidian University, 39, 4, pp. 155-160, (2012)
  • [8] Curtmola R., Garay J.A., Kamara S., Et al., Searchable symmetric encryption: Improved definitions and efficient constructions, Proceedings of ACM CCS, pp. 79-88, (2006)
  • [9] Boneh D., Crescenzo G.D., Ostrovsky R., Et al., Public key encryption with keyword search, Proceedings of EUROCRYPT, pp. 506-522, (2004)
  • [10] Wang C., Cao N., Li J., Et al., Secure ranked keyword search over encrypted cloud data, Proceedings of ICDCS, pp. 506-522, (2010)