Flexible Key Revocation and Access Control for a Privacy-Protecting Cloud CBIR System

While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data, especially images, which usually contain a lot of private information, sometimes are carelessly handled by users and the cloud servers as well. There for, it is necessary to protect those outsourced image data. Although data encryption is useful for storage purposes, data retrieval becomes a problem. Thanks to the techniques of searchable encryption (SE), it is becoming more efficient to perform query over encrypted data. However, most of the current SE schemes are not capable of managing image data. Another common problem for SE schemes is that it is usually inefficient for them to perform user privilege revocation and access control. This paper proposed a system framework of a SE scheme for a cloud image database based on Content-based Image Retrieval (CBIR) with flexible key revocation and access control.

[1]  Dengguo Feng,et al.  Multi-user Searchable Encryption with Efficient Access Control for Cloud Storage , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[2]  Yi Zhu,et al.  Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[3]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[4]  Peter Stanchev,et al.  Content-Based Image Retrieval Systems , 2001 .

[5]  Goto Hideaki,et al.  Privacy-enhanced Similarity Search Scheme for Cloud Image Databases , 2016 .

[6]  João Leitão,et al.  Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2014, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).

[7]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[9]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[10]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[11]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .