Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing

被引:35
|
作者
Li, Yingying [1 ,2 ,3 ]
Ma, Jianfeng [1 ,2 ,3 ]
Miao, Yinbin [1 ,2 ,3 ]
Liu, Liming [1 ,2 ,3 ]
Liu, Ximeng [4 ,5 ]
Choo, Kim-Kwang Raymond [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Peoples R China
[4] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[5] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Servers; Feature extraction; Encryption; Edge computing; Convolutional neural network (CNN); encrypted image search; learning with errors (LWE)-based secure k-nearest neighbor (kNN); multikey settings; results verification; EFFICIENT; RETRIEVAL;
D O I
10.1109/TII.2020.3032147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of outsourcing services, users with limited resources tend to store encrypted images on remote servers and search them anytime and anywhere. However, existing encrypted image search schemes are proposed for cloud computing scenarios, and have some defects, such as excessive bandwidth resource consumption or network delay, which are not suitable for Internet of Things (IoT) devices in edge computing environment. Therefore, we propose a secure and verifiable multikey image search (SVMIS) scheme in cloud-assisted edge computing. First, the pretrained convolutional neural network model is employed to extract image feature vectors to improve search accuracy. Then, a key distribution protocol is designed to convert the encrypted indexes of different owners, and a transformation key list is constructed to support the multikey setting in edge computing. Next, the learning with errors based secure k-nearest neighbor algorithm is used to encrypt feature vectors to improve security. Finally, the Merkle hash tree is utilized to check the correctness of search results returned by edge servers. Theoretical analysis and extensive experiments using a real-world dataset evaluate the security and effectiveness of SVMIS.
引用
收藏
页码:5348 / 5359
页数:12
相关论文
共 50 条
  • [1] Secure and Traceable Multikey Image Retrieval in Cloud-Assisted Internet of Things
    Yang, Tengfei
    Li, Yuanyuan
    He, Jiawei
    Liu, Zhiquan
    Ren, Fang
    Wang, Teng
    Hou, Gaopan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40875 - 40887
  • [2] Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing
    Li, Jiayi
    Ma, Jianfeng
    Miao, Yinbin
    Chen, Lei
    Wang, Yunbo
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3591 - 3605
  • [3] MMDS: A secure and verifiable multimedia data search scheme for cloud-assisted
    Zhang, Shiwen
    He, Jiayi
    Liang, Wei
    Li, Keqin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 151 : 32 - 44
  • [4] Verifiable dynamic search over encrypted data in cloud-assisted intelligent systems
    Wang, Yunling
    Wei, Pei
    Miao, Meixia
    Zhang, Xuefeng
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 11830 - 11852
  • [5] Blockchain-Based Secure and Verifiable Deduplication Scheme for Cloud-Assisted Internet of Things
    Zhang, Guipeng
    Chen, Pinghua
    Liao, Yongwei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13995 - 14006
  • [6] Dynamic Task Scheduling in Cloud-Assisted Mobile Edge Computing
    Ma, Xiao
    Zhou, Ao
    Zhang, Shan
    Li, Qing
    Liu, Alex X.
    Wang, Shangguang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (04) : 2116 - 2130
  • [7] Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things
    Mollah, Muhammad Baqer
    Azad, Md. Abul Kalam
    Vasilakos, Athanasios
    IEEE CLOUD COMPUTING, 2017, 4 (01): : 34 - 42
  • [8] VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things
    Tong, Qiuyun
    Miao, Yinbin
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    Li, Hongwei
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2964 - 2976
  • [9] Fairness-oriented computation offloading for cloud-assisted edge computing
    Guo, Kai
    Zhang, Ruiling
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 132 - 141
  • [10] Cloud-Assisted Dynamic and Cooperative Content Caching in Mobile Edge Computing
    Deka, Vishal
    Islam, Akhirul
    Ghose, Manojit
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,