CAPIA: Cloud Assisted Privacy-preserving Image Annotation

被引:0
作者
Tian, Yifan [1 ]
Hou, Yantian [2 ]
Yuan, Jiawei [1 ]
机构
[1] Embry Riddle Aeronaut Univ, Dept ECSSE, Daytona Beach, FL 32114 USA
[2] Boise State Univ, Dept CS, Boise, ID 83725 USA
来源
2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2017年
关键词
ENCRYPTION; SEARCH;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Using public cloud for image storage has become a prevalent trend with the rapidly increasing number of pictures generated by various devices. For example, today's most smartphones and tablets synchronize photo albums with cloud storage platforms. However, as many images contain sensitive information, such as personal identities and financial data, it is concerning to upload images to cloud storage. To eliminate such privacy concerns in cloud storage while keeping decent data management and search features, a spectrum of keywords-based searchable encryption (SE) schemes have been proposed in the past decade. Unfortunately, there is a fundamental gap remains open for their support of images, i.e., appropriate keywords need to be extracted for images before applying SE schemes to them. On one hand, it is obviously impractical for smartphone users to manually annotate their images. On the other hand, although cloud storage services now offer image annotation services, they rely on access to users' unencrypted images. To fulfill this gap and open the first path from SE schemes to images, this paper proposes a cloud assisted privacy-preserving automatic image annotation scheme, namely CAPIA. CAPIA enables cloud storage users to automatically assign keywords to their images by leveraging the power of cloud computing. Meanwhile, CAPIA prevents the cloud from learning the content of images and their keywords. Thorough analysis is carried out to demonstrate the security of CAPIA. A prototype implementation over the well-known IAPR TC-12 dataset further validates the efficiency and accuracy of CAPIA.
引用
收藏
页码:227 / 235
页数:9
相关论文
共 30 条
[1]  
Amazon Simple Storage Service, PROT DAT US ENCR
[2]  
[Anonymous], 2014, J CHEM, DOI DOI 10.1016/J.PR0CBI0.2014.08.001
[3]  
Bishop C.M., 2006, PATTERN RECOGN, V4, P738, DOI DOI 10.1117/1.2819119
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]  
Boxcryptor, ENCR YOUR FIL YOUR D
[6]  
Bradski G, 2000, DR DOBBS J, V25, P120
[7]  
Brakerski Z, 2013, LECT NOTES COMPUT SC, V7778, P1, DOI 10.1007/978-3-642-36362-7_1
[8]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[9]  
Developers N., 2013, NUMPY NUMPY NUMPY SC
[10]   Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT [J].
Hsu, Chao-Yung ;
Lu, Chun-Shien ;
Pei, Soo-Chang .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (11) :4593-4607