EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud

被引:11
作者
Abduljabbar, Zaid Ameen [1 ]
Ibrahim, Ayad [1 ]
Hussain, Mohammed Abdulridha [1 ]
Hussien, Zaid Alaa [2 ]
Al Sibahee, Mustafa A. [3 ,4 ]
Lu, Songfeng [3 ,4 ]
机构
[1] Univ Basrah, Coll Educ Pure Sci, Basrah, Iraq
[2] Southern Tech Univ, Basrah, Iraq
[3] Shenzhen Huazhong Univ Sci & Technol, Res Inst, Shenzhen 518063, Peoples R China
[4] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2019年 / 13卷 / 11期
关键词
Searchable encryption; secure image retrieval; IoT-Cloud; k-means clustering; SURF local feature; similarity measure; SEARCH; SECURITY;
D O I
10.3837/tiis.2019.11.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the best means to safeguard the confidentiality, security, and privacy of an image within the IoT-Cloud is through encryption. However, looking through encrypted data is a difficult process. Several techniques for searching encrypted data have been devised, but certain security solutions may not be used in IoT-Cloud because such solutions are not lightweight. We propose a lightweight scheme that can perform a content-based search of encrypted images, namely EEIRI. In this scheme, the images are represented using local features. We develop and validate a secure scheme for measuring the Euclidean distance between two descriptor sets. To improve the search efficiency, we employ the k-means clustering technique to construct a searchable tree-based index. Our index construction process ensures the privacy of the stored data and search requests. When compared with more familiar techniques of searching images over plaintexts, EEIRI is considered to be more efficient, demonstrating a higher search cost of 7% and a decrease in search accuracy of 1.7%. Numerous empirical investigations are carried out in relation to real image collections so as to evidence our work.
引用
收藏
页码:5692 / 5716
页数:25
相关论文
共 34 条
[1]   Improvement of the Security of ZigBee by a New Chaotic Algorithm [J].
Bakhache, Bassem ;
Ghazal, Joseph M. ;
El Assad, Safwan .
IEEE SYSTEMS JOURNAL, 2014, 8 (04) :1021-1030
[2]   SURF: Speeded up robust features [J].
Bay, Herbert ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION - ECCV 2006 , PT 1, PROCEEDINGS, 2006, 3951 :404-417
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]   A security gateway application for End-to-End M2M communications [J].
Chen, Hsing-Chung ;
You, Ilsun ;
Weng, Chien-Erh ;
Cheng, Chia-Hsin ;
Huang, Yung-Fa .
COMPUTER STANDARDS & INTERFACES, 2016, 44 :85-93
[5]   Privacy-preserving range set union for rare cases in healthcare data [J].
Chun, J. Y. ;
Lee, D. H. ;
Jeong, I. R. .
IET COMMUNICATIONS, 2012, 6 (18) :3288-3293
[6]  
Curtmola R., 2006, ACM CCS, P79, DOI DOI 10.1145/1180405.1180417
[7]   Local Descriptors without Orientation Normalization to Enhance Landmark Regconition [J].
Dai-Duong Truong ;
Chau-Sang Nguyen Ngoc ;
Vinh-Tiep Nguyen ;
Minh-Triet Tran ;
Anh-Duc Duong .
KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2013), VOL 1, 2014, 244 :401-413
[8]  
Douze M, 2011, PROC CVPR IEEE, P745, DOI 10.1109/CVPR.2011.5995595
[9]  
Du Wenliang., 2001, E COMMERCE SECURITY, DOI 10.1007/978-1-4615-1467-1
[10]   Secure conjunctive keyword search over encrypted data [J].
Golle, P ;
Staddon, J ;
Waters, B .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 :31-45