FSAIR: Fine-Grained Secure Approximate Image Retrieval for Mobile Cloud Computing

被引:0
|
作者
Zhang, Shaobo [1 ]
Liu, Qi [1 ]
Wang, Tian [2 ]
Liang, Wei [1 ]
Li, Kuan-Ching [3 ]
Wang, Guojun [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beijing Normal Univ & UIC, Artificial Intelligence & Future Networks, Zhuhai, Guangdong, Peoples R China
[3] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[4] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 13期
基金
中国国家自然科学基金;
关键词
Indexes; Encryption; Cloud computing; Image retrieval; Cryptography; Feature extraction; Security; Attribute-based encryption (ABE); bloom filter; image retrieval; privacy protection; SEARCH; EFFICIENT; SCHEME; ENCRYPTION; FEATURES; PATTERN;
D O I
10.1109/JIOT.2024.3384458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and the Internet of Things (IoT) provide robust technological support for the development of image retrieval services. Specifically, images are highly sensitive and private data in e-healthcare and security surveillance. Existing retrieval schemes often do not strike a good balance between privacy protection and retrieval performance. It makes data vulnerable to illegal attacks and leads to high retrieval costs, thereby affecting the overall quality and usability of the system. To address these issues, this article introduces a fine-grained secure approximate image retrieval (FSAIR) scheme for mobile cloud computing. Our approach implements a multiverification architecture that provides precise identity control and an untraceable strategy. Furthermore, FSAIR constructs a flexible and secure hierarchical structure to support the efficient retrieval of large-scale high-dimensional data. By introducing Bloom filters to replace index nodes, FSAIR ensures system efficiency and employs bit-pattern encoding descriptors to search approximate data without violating privacy. We show that the proposed scheme protects data under different threat modes through security analysis. We also demonstrate the feasibility and superiority of the proposed solution through experimental evaluation, using the Caltech-256 data set.
引用
收藏
页码:23297 / 23308
页数:12
相关论文
共 50 条
  • [21] Fine-grained correlation analysis for medical image retrieval
    Wang, Xiaoqin
    Lan, Rushi
    Wang, Huadeng
    Liu, Zhenbing
    Luo, Xiaonan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 90
  • [22] Towards Secure Cloud Database with Fine-Grained Access Control
    Solomon, Michael G.
    Sunderam, Vaidy
    Xiong, Li
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 324 - 338
  • [23] Forward Secure and Fine-grained Data Sharing for Mobile Crowdsensing
    Xue, Liang
    Ni, Jianbing
    Huang, Cheng
    Lin, Xiaodong
    Shen, Xuemin
    [J]. 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 202 - 210
  • [24] Fine-Grained Secure Computation
    Campanelli, Matteo
    Gennaro, Rosario
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 66 - 97
  • [25] Achieving secure and fine-grained data authentication in cloud computing using attribute based proxy signature
    Hong, Hanshu
    Sun, Zhixin
    Xia, Yunhao
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 130 - 134
  • [26] Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
    Xu, Shengmin
    Ning, Jianting
    Li, Yingjiu
    Zhang, Yinghui
    Xu, Guowen
    Huang, Xinyi
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1064 - 1077
  • [27] A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Deng, Hua
    Li, Fangmin
    Li, Keqin
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 56 - 69
  • [28] Exploring Fine-Grained Resource Rental Planning in Cloud Computing
    Zhao, Han
    Pan, Miao
    Liu, Xinxin
    Li, Xiaolin
    Fang, Yuguang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (03) : 304 - 317
  • [29] Cloud Computing Security: Fine-grained analysis and Security approaches
    Alfath, Abdeladim
    Baina, Karim
    Baina, Salah
    [J]. 2013 NATIONAL SECURITY DAYS (JNS3), 2013,
  • [30] A fine-grained data access control algorithm in cloud computing
    Han, Dezhi
    Wu, Shuai
    Bi, Kun
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 245 - 248