A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment br

被引:0
|
作者
Zhang, Yiran [1 ]
Geng, Huizheng [1 ]
Xu, Yanyan [2 ]
Su, Li [1 ]
Liu, Fei [3 ]
机构
[1] China Mobile Res Inst, Beijing 100053, Peoples R China
[2] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & Re, Wuhan 430079, Peoples R China
[3] China Mobile Tianjin, Tianjin 300000, Peoples R China
关键词
Image retrieval; Privacy-preserving; Secret sharing; Edge computing;
D O I
10.3837/tiis.2023.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency
引用
收藏
页码:450 / 470
页数:21
相关论文
共 50 条
  • [1] Verifiable privacy-preserving semantic retrieval scheme in the edge computing
    Guo, Jiaqi
    Tian, Cong
    He, Qiang
    Zhao, Liang
    Duan, Zhenhua
    [J]. Journal of Systems Architecture, 2024, 156
  • [2] Privacy-Preserving Multi-Source Image Retrieval in Edge Computing
    Yan, Yuejing
    Xu, Yanyan
    Wang, Zhiheng
    Ouyang, Xue
    Zhang, Bo
    Rao, Zheheng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2892 - 2907
  • [3] Privacy-preserving content-based image retrieval in edge environment
    Yan, Yuejing
    Xu, Yanyan
    Zhang, Yiran
    Wang, Zhiheng
    Rao, Zheheng
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 363 - 381
  • [4] Privacy-preserving content-based image retrieval in edge environment
    Yuejing Yan
    Yanyan Xu
    Yiran Zhang
    Zhiheng Wang
    Zheheng Rao
    [J]. Cluster Computing, 2022, 25 : 363 - 381
  • [5] Privacy-preserving image retrieval in a distributed environment
    Zhou, Fucai
    Qin, Shiyue
    Hou, Ruitao
    Zhang, Zongye
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) : 7478 - 7501
  • [6] EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
    Xia, Zhihua
    Xiong, Neal N.
    Vasilakos, Athanasios V.
    Sun, Xingming
    [J]. INFORMATION SCIENCES, 2017, 387 : 195 - 204
  • [7] A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing
    Zhangdong Wang
    Jiaohua Qin
    Xuyu Xiang
    Yun Tan
    [J]. Multimedia Systems, 2021, 27 : 403 - 415
  • [8] A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing
    Wang, Zhangdong
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    [J]. MULTIMEDIA SYSTEMS, 2021, 27 (03) : 403 - 415
  • [9] A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing
    Xia, Zhihua
    Wang, Lan
    Tang, Jian
    Xiong, Neal N.
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 318 - 330
  • [10] A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment
    Ben Amor, Arij
    Abid, Mohamed
    Meddeb, Aref
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1225 - 1231