Skip to main content

2018 | OriginalPaper | Buchkapitel

Cloud Based Image Retrieval Scheme Using Feature Vector

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of cloud computing, outsourcing storage-more and more people of all ages. Powerful cloud Server provides customers with a great deal of storage space. In order to protect privacy of outsourcing information, customer information must be encrypted, and redaction. However, it is difficult to search for information in the encrypted file. In this paper, we study the encrypted image retrieval technique of outsourcing. An image retrieval based on content encryption scheme is proposed. In this scenario, using blind method based on discrete logarithm problem of eigenvectors to maintain confidentiality and a clever retrieval method is used. This is a dynamic programme, support a fuzzy search. Clients can control the search. During the search, the original image does not leak.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)CrossRefMATHMathSciNet Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)CrossRefMATHMathSciNet
2.
Zurück zum Zitat Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Kuala Lumpur, Malaysia, 22–23 June, 2010, pp. 380–383 (2010) Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Kuala Lumpur, Malaysia, 22–23 June, 2010, pp. 380–383 (2010)
3.
Zurück zum Zitat Ateniese, G., Dagdelen, Ö., Damgård, I., Venturi, D.: Entangled cloud storage. Future Gen. Comput. Syst. 62, 104–118 (2016)CrossRef Ateniese, G., Dagdelen, Ö., Damgård, I., Venturi, D.: Entangled cloud storage. Future Gen. Comput. Syst. 62, 104–118 (2016)CrossRef
4.
Zurück zum Zitat Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May, pp. 44–55, Springer-Verlag (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May, pp. 44–55, Springer-Verlag (2000)
5.
Zurück zum Zitat Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 442–455, Springer (2005) Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 442–455, Springer (2005)
6.
Zurück zum Zitat Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 Oct–3 Nov 2006, pp. 79–88 (2006) Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 Oct–3 Nov 2006, pp. 79–88 (2006)
7.
Zurück zum Zitat Yee, K., Swearingen, K., Li, K., Hearst, M.A.: Faceted metadata for image search and browsing. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, CHI 2003, Ft. Lauderdale, Florida, USA, 5–10 Apr 2003, pp. 401–408 (2003) Yee, K., Swearingen, K., Li, K., Hearst, M.A.: Faceted metadata for image search and browsing. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, CHI 2003, Ft. Lauderdale, Florida, USA, 5–10 Apr 2003, pp. 401–408 (2003)
8.
Zurück zum Zitat Jing, Y., Baluja, S.: Visualrank: applying pagerank to large-scale image search. IEEE Trans. Pattern Anal. Mach. Intell. 30(11), 1877–1890 (2008)CrossRef Jing, Y., Baluja, S.: Visualrank: applying pagerank to large-scale image search. IEEE Trans. Pattern Anal. Mach. Intell. 30(11), 1877–1890 (2008)CrossRef
9.
Zurück zum Zitat Esposito, C., Castiglione, A., Martini, B., Choo, K.K.R.: Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput. 3(4), 16–22 (2016)CrossRef Esposito, C., Castiglione, A., Martini, B., Choo, K.K.R.: Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput. 3(4), 16–22 (2016)CrossRef
10.
Zurück zum Zitat Azfar, A., Choo, K.-K.R., Liu, L.: Android mobile VoIP apps: a survey and examination of their security and privacy. Electron. Commer. Res. 16(1), 73–111 (2016)CrossRef Azfar, A., Choo, K.-K.R., Liu, L.: Android mobile VoIP apps: a survey and examination of their security and privacy. Electron. Commer. Res. 16(1), 73–111 (2016)CrossRef
11.
Zurück zum Zitat Choo, K.-K.R., Rokach, L., Bettini, C.: Mobile security and privacy: advances, challenges and future research directions. Pervasive Mob. Comput. 32, 1–2 (2016)CrossRef Choo, K.-K.R., Rokach, L., Bettini, C.: Mobile security and privacy: advances, challenges and future research directions. Pervasive Mob. Comput. 32, 1–2 (2016)CrossRef
12.
Zurück zum Zitat Li, L., Lu, R., Choo, K.-K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)CrossRef Li, L., Lu, R., Choo, K.-K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)CrossRef
13.
Zurück zum Zitat Choo, K.-K.R., Sarre, R.: Balancing privacy with legitimate surveillance and lawful data access. IEEE Cloud Comput. 2(4), 8–13 (2015)CrossRef Choo, K.-K.R., Sarre, R.: Balancing privacy with legitimate surveillance and lawful data access. IEEE Cloud Comput. 2(4), 8–13 (2015)CrossRef
Metadaten
Titel
Cloud Based Image Retrieval Scheme Using Feature Vector
verfasst von
Pan Gao
Jun Ye
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-67071-3_3