Privacy-preserving image retrieval based on additive secret sharing in cloud environment

被引:0
|
作者
Zhang, Bo [1 ]
Xu, Yanyan [1 ]
Yan, Yuejing [1 ]
Wang, Zhiheng [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & Re, Wuhan 430079, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving image retrieval; Additive secret sharing; Convolutional neural network; Secure indexing; HOMOMORPHIC ENCRYPTION; EFFICIENT; FRAMEWORK; FEATURES; SEARCH;
D O I
10.1007/s10586-023-04213-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, more and more resource constrained data owners tend to store their images in the cloud and rely on image retrieval services to get back images they want. However, this process raises huge privacy leakage risks. Privacy-preserving image retrieval (PPIR) can prevent privacy leakage during the retrieval process. Using convolutional neural networks for image feature extraction can significantly improve retrieval accuracy and has become a common trend in PPIR, but it also brings a new problem of network model parameter leakage, which is often ignored by most PPIR schemes. Besides, existing PPIR schemes often adopt centralized image retrieval service, which typically require frequent interactions between the cloud server and users during the retrieval process, resulting in excessive computational overhead for resource-limited users. Aiming to solve these problems, a distributed privacy-preserving image retrieval scheme is proposed in this paper. Three collaborative cloud servers utilize three neural network models split and outsourced by the data owner to extract features of the query image and perform subsequent retrieval tasks. A new secure Euclidean distance calculation protocol is designed for cloud servers to measure feature similarity, and secure sort pair protocol, secure sorting protocol, secure search protocol are utilized to achieve secure image retrieval. Additionally, a hierarchical index tree is employed to narrow down the search scope and improve search efficiency. This approach avoids the problem of network model parameter leakage caused by using neural networks to extract image features at the users' side, reduces the computational burden on users, and improves the accuracy and the efficiency of the retrieval process while ensuring retrieval security. Security analysis and experimental results demonstrate the security and retrieval performance of the proposed scheme.
引用
收藏
页码:5021 / 5045
页数:25
相关论文
共 50 条
  • [21] Privacy-Preserving distributed deep learning based on secret sharing
    Duan, Jia
    Zhou, Jiantao
    Li, Yuanman
    INFORMATION SCIENCES, 2020, 527 : 108 - 127
  • [22] Privacy-Preserving Distributed Machine Learning Based on Secret Sharing
    Dong, Ye
    Chen, Xiaojun
    Shen, Liyan
    Wang, Dakui
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 684 - 702
  • [23] Efficient and Privacy-Preserving Collaborative Intrusion Detection Using Additive Secret Sharing and Differential Privacy
    Mokry, Laylon
    Slife, Paul
    Bishop, Patrick
    Quiroz, Jose
    Guzzi, Cooper
    Chen, Zhiyuan
    Crainiceanu, Adina
    Needham, Don
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3324 - 3333
  • [24] Privacy-preserving transfer learning-based secure quantum image retrieval in encrypted domain for cloud environment
    Janani, Thiyagarajan
    Brindha, Murugan
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (02)
  • [25] Privacy-preserving image retrieval for mobile devices with deep features on the cloud
    Rahim, Nasir
    Ahmad, Jamil
    Muhammad, Khan
    Sangaiah, Arun Kumar
    Baik, Sung Wook
    COMPUTER COMMUNICATIONS, 2018, 127 : 75 - 85
  • [26] Privacy-preserving Image Processing in the Cloud
    Qin, Zhan
    Weng, Jian
    Cui, Yong
    Ren, Kui
    IEEE CLOUD COMPUTING, 2018, 5 (02): : 48 - 57
  • [27] Privacy-preserving and verifiable deep learning inference based on secret sharing
    Duan, Jia
    Zhou, Jiantao
    Li, Yuanman
    Huang, Caishi
    NEUROCOMPUTING, 2022, 483 : 221 - 234
  • [28] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    Journal of Computer Science & Technology, 2010, 25 (03) : 401 - 414
  • [29] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [30] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414