Efficient encrypted image retrieval in IoT-cloud with multi-user authentication

被引:18
作者
Al Sibahee, Mustafa A. [1 ]
Lu, Songfeng [1 ]
Abduljabbar, Zaid Ameen [2 ]
Ibrahim, Ayad [2 ]
Hussien, Zaid Alaa [3 ]
Mutlaq, Keyan Abdul-Aziz [2 ]
Hussain, Mohammed Abdulridha [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[2] Univ Basrah, Basra, Iraq
[3] Southern Tech Univ, Basra, Iraq
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2018年 / 14卷 / 02期
关键词
Searchable encryption; secure image retrieval; IoT-cloud; locality-sensitive hashing; local feature; smart devices; multi-user authentication; SEARCH;
D O I
10.1177/1550147718761814
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. A number of techniques for searching encrypted data have been devised. However, certain security solutions may not be used in smart devices in IoT-cloud because such solutions are not lightweight. In this article, we present a lightweight scheme that can enable a content-based search through encrypted images. In particular, images are represented using local features. We develop and validate a secure scheme for measuring the Euclidean distance between two feature vectors. In addition, we use a hashing method, namely, locality-sensitive hashing, to devise the searchable index. The use of an locality-sensitive hashing index increases the proficiency and effectiveness of a system, thereby allowing the retrieval of only relevant images with a minimum number of distance evaluations. Refining vector techniques are used to refine relevant results efficiently and securely. Our index construction process ensures that stored data and trapdoors are kept private. Our system also efficiently supports multi-user authentication by avoiding the expensive traditional method, which enables data owners to define who can search for a specific image. Compared with other similarity-based encryption methods predicated upon searchability, the option presented in this study offers superior search speed and storage efficiency.
引用
收藏
页数:19
相关论文
共 33 条
  • [31] Wang C, 2010, INT CON DISTR COMP S, DOI 10.1109/ICDCS.2010.34
  • [32] Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing
    Xia, Zhihua
    Zhu, Yi
    Sun, Xingming
    Qin, Zhan
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (01) : 276 - 286
  • [33] Inverted files for text search engines
    Zobel, Justin
    Moffat, Alistair
    [J]. ACM COMPUTING SURVEYS, 2006, 38 (02)