Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing

被引:35
|
作者
Li, Yingying [1 ,2 ,3 ]
Ma, Jianfeng [1 ,2 ,3 ]
Miao, Yinbin [1 ,2 ,3 ]
Liu, Liming [1 ,2 ,3 ]
Liu, Ximeng [4 ,5 ]
Choo, Kim-Kwang Raymond [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Guangxi, Peoples R China
[3] Xidian Univ, Shaanxi Key Lab Network & Syst Secur, Xian 710071, Peoples R China
[4] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[5] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Servers; Feature extraction; Encryption; Edge computing; Convolutional neural network (CNN); encrypted image search; learning with errors (LWE)-based secure k-nearest neighbor (kNN); multikey settings; results verification; EFFICIENT; RETRIEVAL;
D O I
10.1109/TII.2020.3032147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of outsourcing services, users with limited resources tend to store encrypted images on remote servers and search them anytime and anywhere. However, existing encrypted image search schemes are proposed for cloud computing scenarios, and have some defects, such as excessive bandwidth resource consumption or network delay, which are not suitable for Internet of Things (IoT) devices in edge computing environment. Therefore, we propose a secure and verifiable multikey image search (SVMIS) scheme in cloud-assisted edge computing. First, the pretrained convolutional neural network model is employed to extract image feature vectors to improve search accuracy. Then, a key distribution protocol is designed to convert the encrypted indexes of different owners, and a transformation key list is constructed to support the multikey setting in edge computing. Next, the learning with errors based secure k-nearest neighbor algorithm is used to encrypt feature vectors to improve security. Finally, the Merkle hash tree is utilized to check the correctness of search results returned by edge servers. Theoretical analysis and extensive experiments using a real-world dataset evaluate the security and effectiveness of SVMIS.
引用
收藏
页码:5348 / 5359
页数:12
相关论文
共 50 条
  • [21] Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing
    Li, Jinguo
    Lin, Yaping
    Wen, Mi
    Gu, Chunhua
    Yin, Bo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 325 - 334
  • [22] Efficient and secure encrypted image search in mobile cloud computing
    Zou, Qin
    Wang, Jianfeng
    Ye, Jun
    Shen, Jian
    Chen, Xiaofeng
    SOFT COMPUTING, 2017, 21 (11) : 2959 - 2969
  • [23] A secure data transmission protocol for cloud-assisted edge-Internet of Things environment
    Kumar, Manoj
    Verma, Harsh Kumar
    Sikka, Geeta
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (06)
  • [24] Efficient and secure encrypted image search in mobile cloud computing
    Qin Zou
    Jianfeng Wang
    Jun Ye
    Jian Shen
    Xiaofeng Chen
    Soft Computing, 2017, 21 : 2959 - 2969
  • [25] A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems
    Premnath, Sriram N.
    Haas, Zygmunt J.
    9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 474 - 483
  • [26] Cloud-Assisted Mobile Computing and Pervasive Services
    Leung, Victor C. M.
    Chen, Min
    Guizani, Mohsen
    Vucetic, Branka
    IEEE NETWORK, 2013, 27 (05): : 4 - 5
  • [27] Verifiable Privacy-preserving Monitoring for Cloud-assisted mHealth Systems
    Guo, Linke
    Fang, Yuguang
    Li, Ming
    Li, Pan
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [28] Efficient and Secure Content-Based Image Retrieval in Cloud-Assisted Internet of Things
    Chen, Lin
    Yang, Yiwei
    Yang, Li
    Xu, Chao
    Miao, Yinbin
    Liu, Zhiquan
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Liang, Zhihong
    Hong, Chao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 6001 - 6013
  • [29] Blockchain-Assisted Verifiable and Secure Remote Sensing Image Retrieval in Cloud Environment
    Ouyang, Xue
    Xu, Yanyan
    Mao, Yangsu
    Liu, Yunqi
    Wang, Zhiheng
    Yan, Yuejing
    IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2023, 16 : 1378 - 1389
  • [30] Verifiable Search for Dynamic Outsourced Database in Cloud Computing
    Wang, Jianfeng
    Chen, Xiaofeng
    Li, Jin
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 568 - 571