Non-Interactive and secure outsourcing of PCA-Based face recognition

被引:12
作者
Ren, Yanli [1 ]
Xu, Xiao [1 ]
Feng, Guorui [1 ]
Zhang, Xinpeng [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Cloud computing; Face recognition; PCA; Non-interactive;
D O I
10.1016/j.cose.2021.102416
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there have been more and more researches focus on the field of face recognition with the development of artificial intelligence (AI). Principal Component Analysis (PCA) is an important face recognition algorithm which has high accuracy without a large amount of data. Currently, the outsourcing of PCA-based face recognition protocol required three interactions between the clients and the cloud to execute matrix multiplications and eigenvalue decomposition, respectively, which needs very high communicational costs. In this paper, we propose a non-interactive PCA-based face recognition outsourcing protocol, which only needs one encryption and decryption without interactions between the clients and the cloud. That is to say, the client can obtain the final result of face recognition by encrypting the original images and decrypting the outsourcing results only once. The privacy of input and output is protected well by the proposed protocol, and the computational complexity is greatly reduced. In addition, the client can effectively detect the bad behaviors of the cloud and refuse the wrong outsourcing results by a verification algorithm. We prove the feasibility of our protocol from both theoretical and experimental analysis. The theoretical analysis shows that our proposed protocol reduces the computational overheads on the client's side from O (n(3)) to O (n(2)) . We simulate the proposed protocol and the experimental results show that when the matrix dimension exceeds 2500 x 3000 , the client can gain more than 16.9825 overhead savings which indicates the efficiency of the proposed protocol. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 28 条
[1]   An approach to and validation of maize-seed-assembly modelling based on the discrete element method [J].
Chen, Zeren ;
Yu, Jianqun ;
Xue, Duomei ;
Wang, Yang ;
Zhang, Qiang ;
Ren, Luquan .
POWDER TECHNOLOGY, 2018, 328 :167-183
[2]   Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery [J].
Fan, Chun-, I ;
Huang, Jheng-Jia ;
Tseng, Shang-Wei ;
Chen, I-Te .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) :546-561
[3]  
Khorani V., 2011, 2011 IEEE SSCI Workshop on Hybrid Intelligent Models and Applications (HIMA 2011), P61, DOI 10.1109/HIMA.2011.5953956
[4]  
Kim HI, 2015, IEEE IMAGE PROC, P4027, DOI 10.1109/ICIP.2015.7351562
[5]  
Kiran Tulabandu Aadithya, 2020, 2020 International Conference on Smart Electronics and Communication (ICOSEC), P248, DOI 10.1109/ICOSEC49089.2020.9215326
[6]  
Kountcheva Roumiana, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P174, DOI 10.1109/ICITECH.2017.8079996
[7]  
Liu CX, 2014, 2014 INTERNATIONAL CONFERENCE ON MECHATRONICS AND CONTROL (ICMC), P1540, DOI 10.1109/ICMC.2014.7231817
[8]  
Liu CY, 2016, CHIN CONTR CONF, P4122, DOI 10.1109/ChiCC.2016.7553997
[9]  
Mohammed NN, 2018, INT CONF INTEL INFOR, P267, DOI 10.1109/ICIIBMS.2018.8549971
[10]   A Model Driven Framework for Secure Outsourcing of Computation to the Cloud [J].
Nassar, Mohamed ;
Erradi, Abdelkarim ;
Sabry, Farida ;
Malluhi, Qutaihah M. .
2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, :968-969