Towards efficient privacy-preserving encrypted image search in cloud computing

With the rapid development of cloud computing and big data, it is an ever-increasing trend to outsource the huge amount of multimedia data to the cloud. Although data outsourcing can alleviate data maintenance cost of user side, it inevitably brings some new security challenges, of which privacy of image content is the most significant one. Thus, privacy-preserving image search becomes a new research interest in academic community. In this paper, we propose a novel efficient search scheme for encrypted image by incorporating K-means and secure modular hashing, which can simultaneously achieve privacy-preserving of image search and comparable search accuracy to plaintext image. Furthermore, we provide comprehensively security analysis on the proposed solution and detailed efficiency evaluation over some real-world datasets. The results show that our solution can achieve desired security goals while providing a comparable search efficiency and accuracy.

[1]  Yan Zhang,et al.  A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.

[2]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[3]  Xiaofeng Chen,et al.  Efficient and secure encrypted image search in mobile cloud computing , 2017, Soft Comput..

[4]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Xiaofeng Chen,et al.  Efficient request-based comparable encryption scheme based on sliding window method , 2016, Soft Comput..

[6]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[7]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[8]  Alexandr Andoni,et al.  Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).

[9]  Jin Li,et al.  Privacy-preserving outsourcing of image feature extraction in cloud computing , 2017, Soft Comput..

[10]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[11]  Jian Sun,et al.  K-Means Hashing: An Affinity-Preserving Quantization Method for Learning Binary Compact Codes , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[12]  Derong Liu,et al.  Optimization of electricity consumption in office buildings based on adaptive dynamic programming , 2017, Soft Comput..

[13]  Min Wu,et al.  Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization , 2014, IEEE Access.

[14]  Jun Zhao,et al.  Edge-Guided Dual-Modality Image Reconstruction , 2014, IEEE Access.

[15]  Chengsheng Yuan,et al.  Coverless Image Steganography Based on SIFT and BOF , 2017 .

[16]  David G. Lowe,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.

[17]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[18]  Yunhao Liu,et al.  POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[19]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[20]  Fatos Xhafa,et al.  An efficient PHR service system supporting fuzzy keyword search and fine-grained access control , 2013, Soft Computing.

[21]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[22]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[23]  K. Srinathan,et al.  Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[24]  Jianfeng Wang,et al.  Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing , 2016, Soft Comput..

[25]  Cordelia Schmid,et al.  Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.

[26]  Kai Huang,et al.  Efficient Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2016, WAIM.

[27]  Alan M. Frieze,et al.  Min-wise independent permutations (extended abstract) , 1998, STOC '98.

[28]  Shucheng Yu,et al.  SEISA: Secure and efficient encrypted image search with access control , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[29]  Bhiksha Raj,et al.  Secure Modular Hashing , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[30]  Toshikazu Kato,et al.  Query by Visual Example - Content based Image Retrieval , 1992, EDBT.

[31]  C. Schmid,et al.  Hamming Embedding and Weak Geometry Consistency for Large Scale Image Search - extended version , 2008 .

[32]  Zhangjie Fu,et al.  Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.

[33]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[34]  Jin Wang,et al.  Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing , 2015 .

[35]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[36]  Jin Li,et al.  Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud , 2012, NSS.

[37]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[38]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[39]  Yu Bai,et al.  Secure Index Construction for Privacy-Preserving Large-Scale Image Retrieval , 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.