Skip to main content
Erschienen in: Soft Computing 6/2019

20.11.2017 | Methodologies and Application

Towards efficient privacy-preserving encrypted image search in cloud computing

verfasst von: Yuan Wang, Meixia Miao, Jian Shen, Jianfeng Wang

Erschienen in: Soft Computing | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid development of cloud computing and big data, it is an ever-increasing trend to outsource the huge amount of multimedia data to the cloud. Although data outsourcing can alleviate data maintenance cost of user side, it inevitably brings some new security challenges, of which privacy of image content is the most significant one. Thus, privacy-preserving image search becomes a new research interest in academic community. In this paper, we propose a novel efficient search scheme for encrypted image by incorporating K-means and secure modular hashing, which can simultaneously achieve privacy-preserving of image search and comparable search accuracy to plaintext image. Furthermore, we provide comprehensively security analysis on the proposed solution and detailed efficiency evaluation over some real-world datasets. The results show that our solution can achieve desired security goals while providing a comparable search efficiency and accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Agrawal, R, Kiernan, J, Srikant, R, Xu, Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 563–574. ACM Agrawal, R, Kiernan, J, Srikant, R, Xu, Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 563–574. ACM
Zurück zum Zitat Andoni, A, Indyk, P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: IEEE 2006 47th Annual IEEE Symposium on Foundations of Computer Science. FOCS’06., pp. 459–468 Andoni, A, Indyk, P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: IEEE 2006 47th Annual IEEE Symposium on Foundations of Computer Science. FOCS’06., pp. 459–468
Zurück zum Zitat Boneh, D, Di Crescenzo, G, Ostrovsky, R, Persiano, G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, pp. 506–522. Springer Boneh, D, Di Crescenzo, G, Ostrovsky, R, Persiano, G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, pp. 506–522. Springer
Zurück zum Zitat Broder, A.Z, Charikar, M, Frieze, A.M, Mitzenmacher (1998) M Min-wise independent permutations. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, pp. 327–336. ACM Broder, A.Z, Charikar, M, Frieze, A.M, Mitzenmacher (1998) M Min-wise independent permutations. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, pp. 327–336. ACM
Zurück zum Zitat Chen P, Ye J, Chen X (2016) Efficient request-based comparable encryption scheme based on sliding window method. Soft Comput 20(11):4589–4596CrossRefMATH Chen P, Ye J, Chen X (2016) Efficient request-based comparable encryption scheme based on sliding window method. Soft Comput 20(11):4589–4596CrossRefMATH
Zurück zum Zitat Cheng, B, Zhuo, L, Bai, Y, Peng, Y, Zhang, J (2014) Secure index construction for privacy-preserving large-scale image retrieval. In: 2014 IEEE fourth international conference on big data and cloud computing (BdCloud), pp. 116–120. IEEE Cheng, B, Zhuo, L, Bai, Y, Peng, Y, Zhang, J (2014) Secure index construction for privacy-preserving large-scale image retrieval. In: 2014 IEEE fourth international conference on big data and cloud computing (BdCloud), pp. 116–120. IEEE
Zurück zum Zitat Datar, M, Immorlica, N, Indyk, P, Mirrokni, V.S (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the twentieth annual symposium on computational geometry, pp. 253–262. ACM Datar, M, Immorlica, N, Indyk, P, Mirrokni, V.S (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the twentieth annual symposium on computational geometry, pp. 253–262. ACM
Zurück zum Zitat Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics and Secur 12(8):1874–1884CrossRef Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics and Secur 12(8):1874–1884CrossRef
Zurück zum Zitat Fu ZJ, Shu JG, Wang J, Liu YL, Lee SY (2015) Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. WHWgW 16(3):453–460 Fu ZJ, Shu JG, Wang J, Liu YL, Lee SY (2015) Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. WHWgW 16(3):453–460
Zurück zum Zitat He, K, Wen, F, Sun, J (2013) K-means hashing: An affinity-preserving quantization method for learning binary compact codes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2938–2945 He, K, Wen, F, Sun, J (2013) K-means hashing: An affinity-preserving quantization method for learning binary compact codes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2938–2945
Zurück zum Zitat Hirata, K, Kato, T (1992) Query by visual example. In: international conference on extending database technology, pp. 56–71. Springer Hirata, K, Kato, T (1992) Query by visual example. In: international conference on extending database technology, pp. 56–71. Springer
Zurück zum Zitat Hsu CY, Lu CS, Pei SC (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593–4607MathSciNetCrossRefMATH Hsu CY, Lu CS, Pei SC (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593–4607MathSciNetCrossRefMATH
Zurück zum Zitat Huang, K, Xu, M, Fu, S, Wang, D (2016) Efficient privacy-preserving content-based image retrieval in the cloud. In: International conference on web-age information management, pp. 28–39. Springer Huang, K, Xu, M, Fu, S, Wang, D (2016) Efficient privacy-preserving content-based image retrieval in the cloud. In: International conference on web-age information management, pp. 28–39. Springer
Zurück zum Zitat Jégou, H, Douze, M, Schmid, C (2008) Hamming embedding and weak geometry consistency for large scale image search-extended version Jégou, H, Douze, M, Schmid, C (2008) Hamming embedding and weak geometry consistency for large scale image search-extended version
Zurück zum Zitat Jiménez, A, Raj, B, Portelo, J, Trancoso, I (2015) Secure modular hashing. In: 2015 IEEE international workshop on information forensics and security (WIFS), pp. 1–6. IEEE Jiménez, A, Raj, B, Portelo, J, Trancoso, I (2015) Secure modular hashing. In: 2015 IEEE international workshop on information forensics and security (WIFS), pp. 1–6. IEEE
Zurück zum Zitat Li, J, Li, J, Chen, X, Jia, C, Liu, Z (2012) Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: International conference on network and system security, pp. 490–502. Springer Li, J, Li, J, Chen, X, Jia, C, Liu, Z (2012) Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: International conference on network and system security, pp. 490–502. Springer
Zurück zum Zitat Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics and Secur 10(3):507–518CrossRef Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics and Secur 10(3):507–518CrossRef
Zurück zum Zitat Li P, Li T, Yao ZA, Tang CM, Li J (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):1–11MATH Li P, Li T, Yao ZA, Tang CM, Li J (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):1–11MATH
Zurück zum Zitat Lu, W, Swaminathan, A, Varna, A.L, Wu, M (2009) Enabling search over encrypted multimedia databases. In: Proceedings international society for optics and photonics IS&T/SPIE electronic imaging, pp. 725,418–725,418 Lu, W, Swaminathan, A, Varna, A.L, Wu, M (2009) Enabling search over encrypted multimedia databases. In: Proceedings international society for optics and photonics IS&T/SPIE electronic imaging, pp. 725,418–725,418
Zurück zum Zitat Lu, W, Varna, A.L, Swaminathan, A, Wu, M (2009) Secure image retrieval through feature protection. In: IEEE international conference on acoustics, speech and signal processing, 2009. ICASSP 2009, pp. 1533–1536. IEEE Lu, W, Varna, A.L, Swaminathan, A, Wu, M (2009) Secure image retrieval through feature protection. In: IEEE international conference on acoustics, speech and signal processing, 2009. ICASSP 2009, pp. 1533–1536. IEEE
Zurück zum Zitat Lu W, Varna AL, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2:125–141CrossRef Lu W, Varna AL, Wu M (2014) Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2:125–141CrossRef
Zurück zum Zitat Shashank, J, Kowshik, P, Srinathan, K, Jawahar, C (2008) Private content based image retrieval. In: IEEE conference on computer vision and pattern recognition, 2008. CVPR 2008, pp. 1–8. IEEE Shashank, J, Kowshik, P, Srinathan, K, Jawahar, C (2008) Private content based image retrieval. In: IEEE conference on computer vision and pattern recognition, 2008. CVPR 2008, pp. 1–8. IEEE
Zurück zum Zitat Shen, J, Shen, J, Chen, X, Huang, X, Susilo, W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics and Secur Shen, J, Shen, J, Chen, X, Huang, X, Susilo, W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics and Secur
Zurück zum Zitat Wang J, Miao M, Gao Y, Chen X (2016) Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput 20(11):4487–4495CrossRef Wang J, Miao M, Gao Y, Chen X (2016) Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput 20(11):4487–4495CrossRef
Zurück zum Zitat Wong, W.K, Cheung, D.W.l, Kao, B, Mamoulis, N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp. 139–152. ACM Wong, W.K, Cheung, D.W.l, Kao, B, Mamoulis, N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp. 139–152. ACM
Zurück zum Zitat Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel and Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel and Distrib Syst 27(2):340–352CrossRef
Zurück zum Zitat Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics and Secur 11(11):2594–2608CrossRef Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics and Secur 11(11):2594–2608CrossRef
Zurück zum Zitat Xia, Z, Zhu, Y, Sun, X, Qin, Z, Ren, K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput Xia, Z, Zhu, Y, Sun, X, Qin, Z, Ren, K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput
Zurück zum Zitat Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. WHWgW 18(2):435–442 Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. WHWgW 18(2):435–442
Zurück zum Zitat Yuan, J, Yu, S, Guo, L (2015) Seisa: Secure and efficient encrypted image search with access control. In: 2015 IEEE conference on computer communications (INFOCOM), pp. 2083–2091. IEEE Yuan, J, Yu, S, Guo, L (2015) Seisa: Secure and efficient encrypted image search with access control. In: 2015 IEEE conference on computer communications (INFOCOM), pp. 2083–2091. IEEE
Zurück zum Zitat Zhang, L, Jung, T, Feng, P, Li, X.Y, Liu, Y (2014) Cloud-based privacy preserving image storage, sharing and search. arXiv preprint arXiv:1410.6593 Zhang, L, Jung, T, Feng, P, Li, X.Y, Liu, Y (2014) Cloud-based privacy preserving image storage, sharing and search. arXiv preprint arXiv:​1410.​6593
Zurück zum Zitat Zhang, L, Jung, T, Liu, C, Ding, X, Li, X.Y, Liu, Y (2015) Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices. In: 2015 IEEE 35th international conference on distributed computing systems (ICDCS), pp. 308–317. IEEE Zhang, L, Jung, T, Liu, C, Ding, X, Li, X.Y, Liu, Y (2015) Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices. In: 2015 IEEE 35th international conference on distributed computing systems (ICDCS), pp. 308–317. IEEE
Zurück zum Zitat Zhang, Y, Zhuo, L, Peng, Y, Zhang, J (2014) A secure image retrieval method based on homomorphic encryption for cloud computing. In: 2014 19th international conference on digital signal processing (DSP), pp. 269–274. IEEE Zhang, Y, Zhuo, L, Peng, Y, Zhang, J (2014) A secure image retrieval method based on homomorphic encryption for cloud computing. In: 2014 19th international conference on digital signal processing (DSP), pp. 269–274. IEEE
Zurück zum Zitat Zhou Z, Wang Y, Wu QJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics and Secur 12(1):48–63CrossRef Zhou Z, Wang Y, Wu QJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics and Secur 12(1):48–63CrossRef
Zurück zum Zitat Zou, Q, Wang, J, Ye, J, Shen, J, Chen, X (2016) Efficient and secure encrypted image search in mobile cloud computing. Soft Comput, pp. 1–11 Zou, Q, Wang, J, Ye, J, Shen, J, Chen, X (2016) Efficient and secure encrypted image search in mobile cloud computing. Soft Comput, pp. 1–11
Metadaten
Titel
Towards efficient privacy-preserving encrypted image search in cloud computing
verfasst von
Yuan Wang
Meixia Miao
Jian Shen
Jianfeng Wang
Publikationsdatum
20.11.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 6/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2927-6

Weitere Artikel der Ausgabe 6/2019

Soft Computing 6/2019 Zur Ausgabe