Secure and Traceable Multikey Image Retrieval in Cloud-Assisted Internet of Things

被引:18
作者
Yang, Tengfei [1 ]
Li, Yuanyuan [1 ]
He, Jiawei [1 ]
Liu, Zhiquan [2 ]
Ren, Fang [1 ]
Wang, Teng [1 ]
Hou, Gaopan [3 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[3] Xidian Univ, Hangzhou Inst Technol, Hangzhou 311231, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Accuracy; Image retrieval; Cloud computing; Vectors; Cryptography; Internet of Things; Indexes; Internet of Things (IoT); Mahalanobis distance; malicious user traceability; multikey settings; privacy-preserving image retrieval; SEARCH;
D O I
10.1109/JIOT.2024.3457017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The privacy-preserving image retrieval technology permits users to retrieve outsourced images in a secure manner in cloud-assisted Internet of Things (IoT) environment. However, most of the existing schemes still have some blemishes, such as low performance, shared key, and untraceable malicious users. To this end, we present a secure and traceable multikey image retrieval, named as secure and traceable multikey image retrieval (STMIR). First, we design a novel privacy-preserving Mahalanobis distance comparison method (PPMDC) based on the learning with errors technology and Mahalanobis distance. And STMIR extracts image features utilizing the convolutional neural network (CNN) model to improve retrieval accuracy. Then, STMIR employs extracted image features, PPMDC and key conversion technology to achieve secure image retrieval that supports the multikey setting. Meanwhile, STMIR uses encrypted image watermarking technology to protect the content of images and track malicious users who redistribute images. Formal security analysis shows that STMIR can resist both ciphertext only attack and known background attack, and extensive experiments in the real-world image data sets demonstrate effectiveness of STMIR in terms of retrieval accuracy, retrieval efficiency, and traceability to malicious query users.
引用
收藏
页码:40875 / 40887
页数:13
相关论文
共 39 条
[1]   Efficient encrypted image retrieval in IoT-cloud with multi-user authentication [J].
Al Sibahee, Mustafa A. ;
Lu, Songfeng ;
Abduljabbar, Zaid Ameen ;
Ibrahim, Ayad ;
Hussien, Zaid Alaa ;
Mutlaq, Keyan Abdul-Aziz ;
Hussain, Mohammed Abdulridha .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (02)
[2]   Secure Content-Based Image Retrieval Using Combined Features in Cloud [J].
Anju, J. ;
Shreelekshmi, R. .
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2020), 2020, 11969 :179-197
[3]  
Brakerski Z, 2013, LECT NOTES COMPUT SC, V7778, P1, DOI 10.1007/978-3-642-36362-7_1
[4]  
Cheng Hang, 2016, Journal of Beijing University of Technology, V42, P722, DOI 10.11936/bjutxb2015080007
[5]   EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing [J].
Feng, Qihua ;
Li, Peiya ;
Lu, Zhixun ;
Li, Chaozhuo ;
Wang, Zefan ;
Liu, Zhiquan ;
Duan, Chunhui ;
Huang, Feiran ;
Weng, Jian ;
Yu, Philip S. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (08) :7467-7483
[6]  
Griffin G., 2007, Caltech-256 object category dataset. Technical Report 7694
[7]   Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality [J].
Li, Jung-Shian ;
Liu, I-Hsien ;
Tsai, Chin-Jui ;
Su, Zhi-Yuan ;
Li, Chu-Fen ;
Liu, Chuan-Gang .
IEEE ACCESS, 2020, 8 :114940-114952
[8]  
Li MH, 2018, IEEE INFOCOM SER, P2222, DOI 10.1109/INFOCOM.2018.8486239
[9]  
Li Xin, 2017, IEEE INFOCOM
[10]   Similarity Search for Encrypted Images in Secure Cloud Computing [J].
Li, Yingying ;
Ma, Jianfeng ;
Miao, Yinbin ;
Wang, Yue ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) :1142-1155