Efficient and Privacy-preserving outsourced Image Retrieval in Public Clouds

被引:4
|
作者
Song, Fuyuan [1 ]
Qin, Zheng [1 ]
Zhang, Jixin [2 ]
Liu, Dongxiao [3 ]
Liang, Jinwen [1 ]
Shen, Xuemin [3 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha, Peoples R China
[2] Hubei Univ Technol, Sch Comp Sci, Wuhan, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Privacy-preserving; cloud computing; image retrieval; searchable encryption; SECURE;
D O I
10.1109/GLOBECOM42002.2020.9322134
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the proliferation of cloud services, cloud-based image retrieval services enable large-scale image outsourcing and ubiquitous image searching. While enjoying the benefits of the cloud-based image retrieval services, critical privacy concerns may arise in such services since they may contain sensitive personal information. In this paper, we propose an efficient and Privacy-Preserving Image Retrieval scheme with Key Switching Technique (PPIRS). PPIRS utilizes the inner product encryption for measuring Euclidean distances between image feature vectors and query vectors in a privacy-preserving manner. Due to the high dimension of the image feature vectors and the large scale of the image databases, traditional secure Euclidean distance comparison methods provide insufficient search efficiency. To prune the search space of image retrieval, PPIRS tailors key switching technique (KST) for reducing the dimension of the encrypted image feature vectors and further achieves low communication overhead. Meanwhile, by introducing locality sensitive hashing (LSH), PPIRS builds efficient searchable indexes for image retrieval by organizing similar images into a bucket. Security analysis shows that the privacy of both outsourced images and queries are guaranteed. Extensive experiments on a real-world dataset demonstrate that PPIRS achieves efficient image retrieval in terms of computational cost.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Privacy-Preserving Outsourced Media Search
    Weng, Li
    Amsaleg, Laurent
    Furon, Teddy
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (10) : 2738 - 2751
  • [22] Privacy-Preserving Outsourced Similarity Search
    Kozak, Stepan
    Novak, David
    Zezula, Pavel
    [J]. JOURNAL OF DATABASE MANAGEMENT, 2014, 25 (03) : 48 - 71
  • [23] An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud
    Li, Dong
    Wu, Jiahui
    Le, Junqing
    Lu, Qingguo
    Liao, Xiaofeng
    Xiang, Tao
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (02) : 406 - 419
  • [24] Towards Privacy-Preserving Image Template Matching in the Clouds
    Nourian, Arasth
    Maheswaran, Muthucumaru
    [J]. 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [25] STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds
    Li, Jingwei
    Lin, Dan
    Squicciarini, Anna
    Jia, Chunfu
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 36 - 44
  • [26] TDHPPIR: An Efficient Deep Hashing Based Privacy-Preserving Image Retrieval Method
    Zhang, Chengyuan
    Zhu, Lei
    Zhang, Shichao
    Yu, Weiren
    [J]. NEUROCOMPUTING, 2020, 406 : 386 - 398
  • [27] Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain
    Zhou, Jun
    Cao, Zhenfu
    Dong, Xiaolei
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 366 - 382
  • [28] An Efficient Privacy-Preserving Outsourced Geofencing Service Using Bloom Filter
    Bosch, Christoph
    [J]. 2018 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2018,
  • [29] Enabling Efficient and Privacy-Preserving Health Query Over Outsourced Cloud
    Wang, Guoming
    Lu, Rongxing
    Guan, Yong Liang
    [J]. IEEE ACCESS, 2018, 6 : 70831 - 70842
  • [30] Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys"
    Li, Chen
    Ma, Wenping
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2668 - 2669