A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment br

被引:0
作者
Zhang, Yiran [1 ]
Geng, Huizheng [1 ]
Xu, Yanyan [2 ]
Su, Li [1 ]
Liu, Fei [3 ]
机构
[1] China Mobile Res Inst, Beijing 100053, Peoples R China
[2] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & Re, Wuhan 430079, Peoples R China
[3] China Mobile Tianjin, Tianjin 300000, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2023年 / 17卷 / 02期
关键词
Image retrieval; Privacy-preserving; Secret sharing; Edge computing;
D O I
10.3837/tiis.2023.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency
引用
收藏
页码:450 / 470
页数:21
相关论文
共 30 条
[1]  
[Anonymous], 1999, Content-based Image Retrieval
[2]  
[Anonymous], 2006, NONLINEAR METHODS SP
[3]  
Ashraf S., 2019, J WIREL COMMUN NETW, V8, P1
[4]  
Ashraf S., 2021, Iran J Comput Sci, V4, P171, DOI DOI 10.1007/S42044-020-00075-X
[5]   Bodacious-Instance Coverage Mechanism for Wireless Sensor Network [J].
Ashraf, Shahzad ;
Alfandi, Omar ;
Ahmad, Arshad ;
Khattak, Asad Masood ;
Hayat, Bashir ;
Kim, Kyong Hoon ;
Ullah, Ayaz .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
[6]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[7]  
Daemen J., The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition, Information Security and Cryptography
[8]   Data security concurrent with homogeneous by AES algorithm in SSD controller [J].
Fan, Lingyan ;
Luo, Jianjun ;
Liu, Hailuan ;
Geng, Xuan .
IEICE ELECTRONICS EXPRESS, 2014, 11 (13)
[9]   Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT [J].
Hsu, Chao-Yung ;
Lu, Chun-Shien ;
Pei, Soo-Chang .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (11) :4593-4607
[10]   Efficient Privacy-Preserving Content-Based Image Retrieval in the Cloud [J].
Huang, Kai ;
Xu, Ming ;
Fu, Shaojing ;
Wang, Dongsheng .
WEB-AGE INFORMATION MANAGEMENT, PT II, 2016, 9659 :28-39