FSAIR: Fine-Grained Secure Approximate Image Retrieval for Mobile Cloud Computing

被引:0
|
作者
Zhang, Shaobo [1 ]
Liu, Qi [1 ]
Wang, Tian [2 ]
Liang, Wei [1 ]
Li, Kuan-Ching [3 ]
Wang, Guojun [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beijing Normal Univ & UIC, Artificial Intelligence & Future Networks, Zhuhai, Guangdong, Peoples R China
[3] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[4] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 13期
基金
中国国家自然科学基金;
关键词
Indexes; Encryption; Cloud computing; Image retrieval; Cryptography; Feature extraction; Security; Attribute-based encryption (ABE); bloom filter; image retrieval; privacy protection; SEARCH; EFFICIENT; SCHEME; ENCRYPTION; FEATURES; PATTERN;
D O I
10.1109/JIOT.2024.3384458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing and the Internet of Things (IoT) provide robust technological support for the development of image retrieval services. Specifically, images are highly sensitive and private data in e-healthcare and security surveillance. Existing retrieval schemes often do not strike a good balance between privacy protection and retrieval performance. It makes data vulnerable to illegal attacks and leads to high retrieval costs, thereby affecting the overall quality and usability of the system. To address these issues, this article introduces a fine-grained secure approximate image retrieval (FSAIR) scheme for mobile cloud computing. Our approach implements a multiverification architecture that provides precise identity control and an untraceable strategy. Furthermore, FSAIR constructs a flexible and secure hierarchical structure to support the efficient retrieval of large-scale high-dimensional data. By introducing Bloom filters to replace index nodes, FSAIR ensures system efficiency and employs bit-pattern encoding descriptors to search approximate data without violating privacy. We show that the proposed scheme protects data under different threat modes through security analysis. We also demonstrate the feasibility and superiority of the proposed solution through experimental evaluation, using the Caltech-256 data set.
引用
收藏
页码:23297 / 23308
页数:12
相关论文
共 50 条
  • [41] Secure and Fine-Grained Flow Control for Subscription-Based Data Services in Cloud-Edge Computing
    Huang, Qinlong
    Wang, Chao
    Chen, Lixuan
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2165 - 2177
  • [42] Fine-Grained Secure Friend Discovery Scheme in Mobile Social Networks
    Luo E.-T.
    Wang G.-J.
    Liu Q.
    Meng D.-C.
    [J]. Wang, Guo-Jun (csgjwang@gmail.com), 2018, Chinese Academy of Sciences (29): : 3223 - 3238
  • [43] Secure Encrypted Image Search in Mobile Cloud Computing
    Zou, Qin
    Wang, Jianfeng
    Chen, Xiaofeng
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 572 - 575
  • [44] A Participating Fine-Grained Cloud Computing Platform with In-Network Guidance
    Nishii, Kento
    Tanigawa, Yosuke
    Tode, Hideki
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (06) : 1008 - 1017
  • [45] Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review
    Albulayhi, Khalid
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Sheldon, Frederick T.
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 748 - 755
  • [46] Fine-grained Access Control for Personal Health Records in Cloud Computing
    Li, Wei
    Ni, Wei
    Liu, Dongxi
    Liu, Ren Ping
    Wang, Peishun
    Luo, Shoushan
    [J]. 2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [47] Attribute Based Encryption with Fine-grained Access Provision in Cloud Computing
    Tamizharasi, G. S.
    Balamurugan, B.
    Manjula, R.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [48] Video deblocking with fine-grained scalable complexity for embedded mobile computing
    Yu, ZH
    Zhang, J
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 1173 - 1178
  • [49] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Xu, Peng
    Chen, Hongwu
    Zou, Deqing
    Jin, Hai
    [J]. CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4201 - 4209
  • [50] Fine-Grained Retrieval Prompt Tuning
    Wang, Shijie
    Chang, Jianlong
    Wang, Zhihui
    Li, Haojie
    Ouyang, Wanli
    Tian, Qi
    [J]. THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 2, 2023, : 2644 - 2652