Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing

被引:1
作者
Li, Yao [1 ]
Wei, Xiaochao [1 ]
Cai, Guopeng [1 ]
Wang, Hao [1 ,2 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
[2] Shandong Prov Key Lab Novel Distributed Comp Softw, Jinan, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Content-based image retrieval; Locality-sensitive hashing; Cloud computing; Multiple sources; Privacy preserving; IoT; SECURE; SCHEME; EFFICIENT; SCALE;
D O I
10.1007/s12243-023-00946-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As Internet of Things (IoT) devices develop, an increasing number of images appear in our everyday lives. The emergence of massive amounts of image data has increased the burden on local IoT devices. As IoT owners try to outsource to the cloud server, privacy disclosure may occur during the outsourcing process. In this study, we designed a secure image-retrieval scheme that supports multiple sources. In our solution, we first encrypt the image features by improving a secure multiparty sum protocol, which can effectively support the similarity calculation of encrypted features gathered from multiple sources. Then, IoT owners store the feature vectors locally to avoid disclosing similarity information to the cloud. Finally, we created an index to improve search efficiency by locality-sensitive hashing. Security is analyzed to demonstrate that the privacy of images and matching results have been well protected against the cloud server. In addition, the performance analysis and experimental results show that the proposed scheme achieves highly competitive results on real datasets.
引用
收藏
页码:553 / 565
页数:13
相关论文
共 42 条
[1]  
Anju J, 2021, EXPERT SYST APPL
[2]   Secure Index Construction for Privacy-Preserving Large-scale Image Retrieval [J].
Cheng, Bo ;
Zhuo, Li ;
Bai, Yu ;
Peng, Yuanfan ;
Zhang, Jing .
2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), 2014, :116-120
[3]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934
[4]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[5]   Image retrieval: Ideas, influences, and trends of the new age [J].
Datta, Ritendra ;
Joshi, Dhiraj ;
Li, Jia ;
Wang, James Z. .
ACM COMPUTING SURVEYS, 2008, 40 (02)
[6]   Efficient Privacy Preserving Edge Intelligent Computing Framework for Image Classification in IoT [J].
Fagbohungbe, Omobayode ;
Reza, Sheikh Rufsan ;
Dong, Xishuang ;
Qian, Lijun .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (04) :941-956
[7]   Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories [J].
Ferreira, Bernardo ;
Rodrigues, Joao ;
Leitao, Joao ;
Domingos, Henrique .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) :784-798
[8]  
Goh E.-J., 2003, IACR Cryptol. ePrint Arch., V2003, P216
[9]   CONTENT-BASED IMAGE RETRIEVAL-SYSTEMS [J].
GUDIVADA, VN ;
RAGHAVAN, VV .
COMPUTER, 1995, 28 (09) :18-22
[10]   A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images [J].
Guo, Cheng ;
Su, Shenghao ;
Choo, Kim-Kwang Raymond ;
Tang, Xinyu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (01) :514-523