Privacy-preserving content-based image retrieval in edge environment

Traditional centralized cloud services face challenges, such as high communication delay, single point of failure, etc. Edge computing is one of distributed computing services in which resources are placed closer to users, and thus is more robust and can reduce communication delay. Although outsourcing data to the edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users’ data privacy, a privacy-preserving content-based image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge environment and the requirement of lightweight computing, we design a secure interaction protocol completed through the collaborative cooperation of two or more edge servers. This scheme not only protects data privacy, but also has low communication overhead and delay as well as low computing complexity, therefore it is more suitable for edge computing environment. Theoretical analysis and experiments show that our scheme has high security, retrieval accuracy and efficiency.

[1]  Jiankun Hu,et al.  Content-Based Multi-Source Encrypted Image Retrieval in Clouds with Privacy Preservation , 2018, Future Gener. Comput. Syst..

[2]  I. Shatheesh Sam,et al.  LSB Elimination based Feature Extraction for Outsourced Image Retrieval in Encrypted Images , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).

[3]  Zhihua Xia,et al.  An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing , 2020, IEEE Access.

[4]  Jung-Shian Li,et al.  Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality , 2020, IEEE Access.

[5]  Zifeng Xu,et al.  Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications , 2020, IEEE Access.

[6]  Xiaoyu Zhang,et al.  Non-interactive privacy-preserving neural network prediction , 2019, Inf. Sci..

[7]  Siu-Ming Yiu,et al.  Privacy-preserving verifiable elastic net among multiple institutions in the cloud , 2018, J. Comput. Secur..

[8]  Myoungho Sunwoo,et al.  Development of Autonomous Car—Part II: A Case Study on the Implementation of an Autonomous Driving System Based on Distributed Architecture , 2015, IEEE Transactions on Industrial Electronics.

[9]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[10]  James Ze Wang,et al.  Automatic Linguistic Indexing of Pictures by a Statistical Modeling Approach , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[11]  Wenliang Du,et al.  Protocols for Secure Remote Database Access with Approximate Matching , 2001, E-Commerce Security and Privacy.

[12]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[13]  Yun Q. Shi,et al.  A privacy-preserving content-based image retrieval method in cloud environment , 2017, J. Vis. Commun. Image Represent..

[14]  Naixue Xiong,et al.  EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..

[15]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[16]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[17]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[18]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[19]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[20]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[21]  Kai Huang,et al.  Efficient Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2016, WAIM.

[22]  Mehdi Berenjkoub,et al.  Optimally Efficient Secure Scalar Product With Applications in Cloud Computing , 2019, IEEE Access.

[23]  Rafail Ostrovsky,et al.  Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[24]  Laurent Amsaleg,et al.  Privacy-Preserving Outsourced Media Search , 2016, IEEE Transactions on Knowledge and Data Engineering.

[25]  Chang Wen Chen,et al.  Prius: Hybrid Edge Cloud and Client Adaptation for HTTP Adaptive Streaming in Cellular Networks , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[26]  Dan Bogdanov,et al.  Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.

[27]  Xiao Zhao,et al.  A Privacy-preserving Image Retrieval Method Based on Improved BoVW Model in Cloud Environment , 2018, IETE Technical Review.

[28]  Hitoshi Kiya,et al.  A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images , 2020, 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[29]  Marcel Worring,et al.  Content-Based Image Retrieval at the End of the Early Years , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[30]  Guan-Ming Su,et al.  Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.

[31]  Dongxi Liu,et al.  Privacy-Preserving and Outsourced Multi-user K-Means Clustering , 2014, 2015 IEEE Conference on Collaboration and Internet Computing (CIC).

[32]  Zhenxing Qian,et al.  New Advances of Privacy Protection and Multimedia Content Security for Big Data and Cloud Computing , 2018 .

[33]  Moni Naor,et al.  Adaptively secure multi-party computation , 1996, STOC '96.

[34]  Xingming Sun,et al.  MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing , 2020, Future Gener. Comput. Syst..

[35]  Samiran Chattopadhyay,et al.  A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme , 2019, IEEE Access.

[36]  Nenghai Yu,et al.  Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving , 2017, IEEE Transactions on Information Forensics and Security.

[37]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[38]  Yuval Ishai,et al.  Protecting data privacy in private information retrieval schemes , 1998, STOC '98.

[39]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[40]  Xuan Li,et al.  Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network , 2018, Cluster Computing.

[41]  João Leitão,et al.  Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.

[42]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[43]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[44]  Jian Weng,et al.  A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing , 2021, IEEE Transactions on Network Science and Engineering.

[45]  Yunhao Liu,et al.  PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud , 2017, IEEE Trans. Parallel Distributed Syst..

[46]  Jing-Yu Yang,et al.  Content-based image retrieval using computational visual attention model , 2015, Pattern Recognit..

[47]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[48]  Zoe Lin Jiang,et al.  Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks , 2020, IEEE Access.

[49]  Jin Li,et al.  Privacy-preserving edge-assisted image retrieval and classification in IoT , 2018, Frontiers of Computer Science.

[50]  Simon Haykin,et al.  The maximum entropy method applied to the spectral analysis of radar clutter (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[51]  James Ze Wang,et al.  SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[52]  Hai Jin,et al.  Secure biometric image retrieval in IoT-cloud , 2016, 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[53]  Yan Zhang,et al.  A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.

[54]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[55]  Ximeng Liu,et al.  A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing , 2019, IEEE Transactions on Dependable and Secure Computing.

[56]  X. Shen,et al.  Efficient and Privacy-preserving Outsourced Image Retrieval in Public Clouds , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.

[57]  Yuval Ishai,et al.  Protecting data privacy in private information retrieval schemes , 1998, STOC '98.

[58]  Anderson C. A. Nascimento,et al.  Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols , 2015, ProvSec.