Secure Remote Sensing Image Retrieval Scheme Based on Cloud Computing and Blockchain Platforms

被引:0
|
作者
Ouyang, Xue [1 ]
Xu, Yanyan [1 ]
Mao, Yangsu [1 ]
Liu, Yunqi [2 ]
Wang, Zhiheng [1 ]
Yan, Yuejing [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & Re, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Cloud computing; Image retrieval; Remote sensing image; ENCRYPTION;
D O I
10.11999/JEIT220956
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Remote sensing image storage and retrieval outsourcing to a semi-trusted cloud platform may lead to image data leakage and return incomplete retrieval results. Although encryption can protect the security of image data, it can not ensure that the cloud platform provides accurate and complete storage and retrieval services. Blockchain technology guarantees the authenticity and integrity of storage and retrieval services, but the computation and storage capacity of blockchain are limited, which makes it a challenging problem to realize secure storage and retrieval of remote sensing images. This paper proposes a secure remote sensing image retrieval scheme based on blockchain and cloud computing platforms. To secure the validity of cloud-saved images, the image hash and lightweight data are first stored on the blockchain, while the cloud platform stores huge encrypted image data. Moreover, the blockchain performs attribute-based retrieval of remote sensing images, and the cloud platform performs content-based secure retrieval to ensure the integrity of the retrieval results. Finally, the remote sensing image retrieval transaction mechanism is designed using blockchain technology. The experiments show that the proposed scheme can achieve secure, reliable, and fair remote sensing image retrieval, enabling both trading sides to benefit from a high-trust and fair-trading environment.
引用
收藏
页码:856 / 864
页数:9
相关论文
共 21 条
  • [1] [Anonymous], 2008, Decentralized Business Review
  • [2] Brakerski Z, 2013, LECT NOTES COMPUT SC, V7778, P1, DOI 10.1007/978-3-642-36362-7_1
  • [3] Chaudhuri B, 2018, IEEE T GEOSCI REMOTE, V56, P1144, DOI [10.1109/TGRS.2017.2760909, 10.1109/tgrs.2017.2760909]
  • [4] [陈杰 Chen Jie], 2021, [遥感学报, National Remote Sensing Bulletin], V25, P1085
  • [5] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [6] STRUCTURE OF THE PARAMETER SPACE OF THE HENON MAP
    GALLAS, JAC
    [J]. PHYSICAL REVIEW LETTERS, 1993, 70 (18) : 2714 - 2717
  • [7] Deep Residual Learning for Image Recognition
    He, Kaiming
    Zhang, Xiangyu
    Ren, Shaoqing
    Sun, Jian
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778
  • [8] The State of Public Infrastructure-as-a-Service Cloud Security
    Huang, Wei
    Ganjali, Afshar
    Kim, Beom Heyn
    Oh, Sukwon
    Lie, David
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (04)
  • [9] Image retrieval from remote sensing big data: A survey
    Li, Yansheng
    Ma, Jiayi
    Zhang, Yongjun
    [J]. INFORMATION FUSION, 2021, 67 : 94 - 115
  • [10] A Survey for Cloud Data Security
    Lu Jintian
    Xiao Ruizhi
    Jin Shuyuan
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 881 - 891