浏览全部资源
扫码关注微信
1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
2. 陕西省网络与系统安全重点实验室,陕西 西安 710071
[ "李颖莹(1995- ),女,陕西汉中人,西安电子科技大学博士生,主要研究方向为数据隐私保护、云计算安全" ]
[ "马建峰(1963- ),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为计算机系统安全、移动与无线安全、系统可生存性和可信计算" ]
[ "苗银宾(1988- ),男,河南驻马店人,博士,西安电子科技大学讲师,主要研究方向为应用密码学、无线网络安全" ]
网络出版日期:2020-04,
纸质出版日期:2020-04-25
移动端阅览
李颖莹, 马建峰, 苗银宾. 基于边缘计算的支持多密钥的加密图像检索[J]. 通信学报, 2020,41(4):14-26.
Yingying LI, Jianfeng MA, Yinbin MIAO. Encrypted image retrieval in multi-key settings based on edge computing[J]. Journal on communications, 2020, 41(4): 14-26.
李颖莹, 马建峰, 苗银宾. 基于边缘计算的支持多密钥的加密图像检索[J]. 通信学报, 2020,41(4):14-26. DOI: 10.11959/j.issn.1000-436x.2020086.
Yingying LI, Jianfeng MA, Yinbin MIAO. Encrypted image retrieval in multi-key settings based on edge computing[J]. Journal on communications, 2020, 41(4): 14-26. DOI: 10.11959/j.issn.1000-436x.2020086.
针对现有加密图像检索方案未考虑不同密钥加密图像集的情况,基于局部敏感哈希、安全近邻及代理重加密技术提出了基于边缘计算的支持多密钥的加密图像检索系统(包含基础方案和改进方案)。所提方案不但提高了图像查询效率、精度,而且降低了查询用户的额外计算开销。安全性分析表明,所提基础方案仅可抵抗已知密文攻击,而所提改进方案可抵抗已知背景攻击。基于实际数据集的实验性能测试表明,所提方案在实际应用场景中是可行的。
Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images
a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing
secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack
while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.
LU W J , VARNA A L , SWAMINATHAN A , et al . Secure image retrieval through feature protection [C ] // Proceedings of 34th Internet Conference on Acoustics,Speech and Signal Processing . Piscataway:IEEE Press , 2009 : 1533 - 1536 .
LU W J , VARNA A L , WU M . Confidentiality-preserving image search:a comparative study between homomorphic encryption and distance-preserving randomization [J ] . IEEE Access , 2014 ( 2 ): 125 - 141 .
ZHANG L , JUNG T , LIU K B , et al . PIC:enable large-scale privacy preserving content-based image search on cloud [J ] . IEEE Transactions on Parallel and Distributed Systems , 2017 , 28 ( 11 ): 3258 - 3271 .
XIA Z H , ZHU Y , SUN X M , et al . Towards privacy-preserving content-based image retrieval in cloud computing [J ] . IEEE Transactions on Cloud Computing , 2018 , 6 ( 1 ): 276 - 286 .
ZHENG P J , HUANG J W . An efficient image homomorphic encryption scheme with small ciphertext expansion [C ] // Proceedings of 21st ACM Internet Conference on Multimedia . New York:ACM Press , 2013 : 803 - 812 .
QIN Z , YAN J B , REN K , et al . Privacy-preserving outsourcing of image global feature detection [C ] // Proceedings of Global Communications Conference . Piscataway:IEEE Press , 2014 : 710 - 715 .
QIN Z , YAN J B , REN K , et al . Towards efficient privacy-preserving image feature extraction in cloud computing [C ] // Proceedings of Internet Conference on Computational Geometry . Piscataway:IEEE Press , 2014 : 497 - 506 .
LU W J , SWAMINATHAN A , VARNA A L , et al . Enabling search over encrypted multimedia databases [C ] // Proceedings of IS&T/SPIE Electronic Imaging,International Society for Optics and Photonics . Bellingham:SPIE , 2009 :725418.
ZHANG Y , ZHOU L , PENG Y F , et al . A secure image retrieval method based on homomorphic encryption for cloud computing [C ] // Proceedings of 19th Internet Conference on Digital Signal Processing . NewYork:ACM Press , 2014 : 269 - 274 .
XIA Z H , XIONG N N , VASILAKOS A V , et al . EPCBIR:an efficient and privacy-preserving content-based image retrieval scheme in cloud computing [J ] . Information Sciences , 2017 , 387 : 195 - 204 .
YUAN J W , YU S C , GUO L K . SEISA:secure and efficient encrypted image search with access control [C ] // Proceedings of 34th Internet Conference on Computer Communications . Piscataway:IEEE Press , 2015 : 2083 - 2091 .
LIANG H H , ZHANG X P , WEI Q H , et al . Secure image retrieval with multiple keys [J ] . Journal of Electronic Imaging , 2018 , 27 ( 2 ):023032.
SHEN M , CHENG G , ZHU L , et al . Content-based multi-source encrypted image retrieval in clouds with privacy preservation [J ] . Future Generation Computer Systems ,,(2018-05-09)[2020-01-06 ] .doi.org/10.1016/j.future.2018.04.089.
YIN H , QIN Z , ZHANG J X , et al . Secure conjunctive multi-keyword search for multiple data owners in cloud computing [C ] // Proceedings of 22nd Internet Conference on Parallel and Distributed Systems . New York:ACM Press , 2016 : 761 - 768 .
SUN W H , YU S C , LOU W J , et al . Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud [J ] . IEEE Transactions on Parallel and Distributed Systems , 2016 , 27 ( 4 ): 1187 - 1198 .
MIAO Y B , MA J F , LIU X M , et al . VKSE-MO:verifiable keyword search over encrypted data in multi-owner settings [J ] . Science China Information Sciences , 2017 , 60 ( 12 ): 1 - 15 .
MIAO Y B , MA J F , LIU X M , et al . VCKSM:verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings [J ] . Pervasive and Mobile Computing , 2017 , 40 : 205 - 219 .
王祥宇 , 马建峰 , 苗银宾 . 高效隐私保护的多用户图像外包检索方案 [J ] . 通信学报 , 2019 , 40 ( 2 ): 31 - 39 .
WANG X Y , MA J F , MIAO Y B . Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user [J ] . Journal on Communications , 2019 , 40 ( 2 ): 31 - 39 .
SUN S F , LIU J K , SAKZAD A , et al . An efficient non-interactive multi-client searchable encryption with support for boolean queries [C ] // European Symposium On Research in Computer Security . Berlin:Springer , 2016 : 154 - 172 .
HAMLIN A , SHELAT A , WEISS M , et al . Multi-key searchable encryption,revisited [C ] // IACR International Workshop on Public Key Cryptography . Berlin:Springer , 2018 : 95 - 124 .
SHANKAR K , LAKSHMANAPRABU S K , GUPTA D , et al . Adaptive optimal multi key based encryption for digital image security [J ] . Concurrency and Computation:Practice and Experience , 2018 :e5122.
GALBRAITH S D , PATERSON K G , SMART N P . Pairings for cryptographers [J ] . Discrete Applied Mathematics , 2008 , 156 ( 16 ): 3113 - 3121 .
ATENIESE G , FU K , GREEN M , et al . Improved proxy re-encryption schemes with applications to secure distributed storage [J ] . ACM Transactions on Information and System Security , 2006 , 9 ( 1 ): 1 - 30 .
ANDONI A , INDYK P . Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions [C ] // Proceedings of 47th Symposium on Foundations of Computer Science . New York:ACM Press , 2006 : 459 - 468 .
DATAR M , IMMORLICA N , INDYK P , et al . Locality-sensitive hashing scheme based on p-stable distributions [C ] // Proceedings of 20th Symposium on Computational Geometry . New York:ACM Press , 2004 : 253 - 262 .
DELFS H , KNEBL H , KNEBL H . Introduction to cryptography:principles and applications [M ] . Berlin : SpringerPress , 2002 .
LIU K , GIANNELLA C , KARGUPTA H . An attacker’s view of distance preserving maps for privacy preserving data mining [C ] // Proceedings of European Conference Principles of Data Mining and Knowledge Discovery . Berlin:Springer , 2006 : 297 - 308 .
WONG W K , CHEUNG D W , KAO B , et al . Secure kNN computation on encrypted databases [C ] // Proceedings of 28th Internet Conference on Management of Data . New York:ACM Press , 2009 : 139 - 152 .
CAO N , WANG C , LI M , et al . Privacy-preserving multi-keyword ranked search over encrypted cloud data [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 222 - 233 .
CHOR B , GOLDREICH O , KUSHILEVITZ E , et al . Private Information Retrieval [C ] // Proceedings of 36th Symposium on Foundations of Computer Science . Piscataway:IEEE Press , 1995 : 41 - 50 .
WANG J Z , LI J , WIEDERHOLD G . SIMPLlcity:semantics-sensitive integrated matching for picture libraries [J ] . IEEE Transactions on Pattern Analysis and Machine Intelligence , 2001 , 23 ( 9 ): 947 - 963 .
MANJUNATH B S , OHM J R , VASUDEVAN V V , et al . Color and texture descriptors [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2001 , 11 ( 6 ): 703 - 715 .
0
浏览量
1044
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构