A faster outsourced medical image retrieval scheme with privacy preservation

被引:11
作者
Duan, Yating [1 ]
Li, Yanping [1 ,2 ]
Lu, Laifeng [1 ]
Ding, Yong [2 ,3 ]
机构
[1] Shaanxi Normal Univ, Sch Math & Stat, Xian, Shaanxi, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Guangxi, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin, Guangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; Medical image retrieval; Access control; Searchable encryption; ATTRIBUTE-BASED ENCRYPTION; SEARCH; SECURE; EFFICIENT;
D O I
10.1016/j.sysarc.2021.102356
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of computer technology and medical imaging technology, medical images present an explosive growth. To save storage and computation overhead, hospitals often choose to outsource digital medical images to cloud server. Since medical images are a major auxiliary means for doctors' diagnosis or medical researchers' study, the secure retrieval of outsourced medical images is especially important. To address this problem, we propose a Faster outsourced Medical Image Retrieval scheme with privacy preservation (FMIR) in this paper. FMIR first makes a simple classification to outsourced medical images, which narrows the retrieval range and improves the retrieval efficiency compared with the existing unclassified retrieval schemes. Second, FMIR implements a lightweight access control for each class using polynomial-based access control strategy, which provides the fine-grained access control for better privacy protection of medical images. Third, FMIR reduces the interference of random numbers on relevant score to 0, which further improves the accuracy of the retrieval. Finally, the security and performance analysis show that FMIR is secure, accurate and efficient.
引用
收藏
页数:10
相关论文
共 26 条
[1]   A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage [J].
Ameri, Mohammad Hassan ;
Delavar, Mahshid ;
Mohajeri, Javad ;
Salmasizadeh, Mahmoud .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) :660-671
[2]  
[Anonymous], 2020, Ajr Am J Roentgenol, DOI DOI 10.2214/AJR.20.22954
[3]  
Ayyub S, 2019, INT ARAB J INF TECHN, V16, P251
[4]  
Cui Shaoguo, 2020, J CHONGQING U TECHNO, V34, P142
[5]  
Dai Yin, 2013, Journal of Northeastern University. Natural Science, V34, P1096
[6]   A Privacy-Protected Image Retrieval Scheme for Fast and Secure Image Search [J].
Du, Anyu ;
Wang, Liejun ;
Cheng, Shuli ;
Ao, Naixiang .
SYMMETRY-BASEL, 2020, 12 (02)
[7]  
Horn R.A., 2013, Matrix Analysis, Vsecond
[8]  
Jafari O., 2021, CoRR abs/2102.08942
[9]   Publicly Verifiable Boolean Query Over Outsourced Encrypted Data [J].
Jiang, Shunrong ;
Zhu, Xiaoyan ;
Guo, Linke ;
Liu, Jianqing .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) :799-813
[10]   Learning generative visual models from few training examples: An incremental Bayesian approach tested on 101 object categories [J].
Li Fei-Fei ;
Fergus, Rob ;
Perona, Pietro .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2007, 106 (01) :59-70