Loading web-font TeX/Math/Italic
Similarity Search for Encrypted Images in Secure Cloud Computing | IEEE Journals & Magazine | IEEE Xplore

Similarity Search for Encrypted Images in Secure Cloud Computing


Abstract:

With the emergence of intelligent terminals, the Content-Based Image Retrieval (CBIR) technique has attracted much attention from many areas (i.e., cloud computing, socia...Show More

Abstract:

With the emergence of intelligent terminals, the Content-Based Image Retrieval (CBIR) technique has attracted much attention from many areas (i.e., cloud computing, social networking services, etc.). Although existing privacy-preserving CBIR schemes can guarantee image privacy while supporting image retrieval, these schemes still have inherent defects (i.e., low search accuracy, low search efficiency, key leakage, etc.). To address these challenging issues, in this article we provide a similarity Search for Encrypted Images in secure cloud computing (called SEI). First, the feature descriptors extracted by the Convolutional Neural Network (CNN) model are used to improve search accuracy. Next, an encrypted hierarchical index tree by using K-means clustering based on Affinity Propagation (AP) clustering is devised, which can improve search efficiency. Then, a limited key-leakage k-Nearest Neighbor (kNN) algorithm is proposed to protect key from being completely leaked to untrusted image users. Finally, SEI is extended to further prevent image users’ search information from being exposed to the cloud server. Our formal security analysis proves that SEI can protect image privacy as well as key privacy. Our empirical experiments using a real-world dataset illustrate the higher search accuracy and efficiency of SEI.
Published in: IEEE Transactions on Cloud Computing ( Volume: 10, Issue: 2, 01 April-June 2022)
Page(s): 1142 - 1155
Date of Publication: 27 April 2020

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.