Secure and Efficient Image Retrieval over Encrypted Cloud Data

This paper proposes a novel image retrieval scheme over encrypted cloud data, which achieves high efficiency and confidentiality. For the purpose of improving search efficiency, an index tree is often deployed in the image retrieval scheme. Meanwhile, the confidentiality of the sensitive cloud data,...

Full description

Bibliographic Details
Main Authors: Haihua Liang, Xinpeng Zhang, Hang Cheng, Qiuhan Wei
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2018/7915393
id doaj-c742cb3d9d374ca69ab16a1f92bf1730
record_format Article
spelling doaj-c742cb3d9d374ca69ab16a1f92bf17302020-11-25T01:18:27ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/79153937915393Secure and Efficient Image Retrieval over Encrypted Cloud DataHaihua Liang0Xinpeng Zhang1Hang Cheng2Qiuhan Wei3School of Communication and Information Engineering, Shanghai University, Shanghai, ChinaSchool of Communication and Information Engineering, Shanghai University, Shanghai, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaSchool of Communication and Information Engineering, Shanghai University, Shanghai, ChinaThis paper proposes a novel image retrieval scheme over encrypted cloud data, which achieves high efficiency and confidentiality. For the purpose of improving search efficiency, an index tree is often deployed in the image retrieval scheme. Meanwhile, the confidentiality of the sensitive cloud data, such as outsourced images, index tree, and query request, is also a key issue. Firstly, a balanced binary clustering algorithm is exploited over the integrated image features composed of basic features, such as HSV histogram and DCT histogram, yielding a balanced binary tree (BBT). In particular, due to the adoption of a balanced index tree, our scheme can achieve logarithmic search time. Secondly, the secure inner product is employed to encrypt the index vector and query feature. Finally, to resist the statistical attack of the frequency distribution of the retrieved results, we copy the database and merge the subtree of encrypted BBT to blind the search results. Security analysis and experimental results show that the proposed scheme is secure and efficient.http://dx.doi.org/10.1155/2018/7915393
collection DOAJ
language English
format Article
sources DOAJ
author Haihua Liang
Xinpeng Zhang
Hang Cheng
Qiuhan Wei
spellingShingle Haihua Liang
Xinpeng Zhang
Hang Cheng
Qiuhan Wei
Secure and Efficient Image Retrieval over Encrypted Cloud Data
Security and Communication Networks
author_facet Haihua Liang
Xinpeng Zhang
Hang Cheng
Qiuhan Wei
author_sort Haihua Liang
title Secure and Efficient Image Retrieval over Encrypted Cloud Data
title_short Secure and Efficient Image Retrieval over Encrypted Cloud Data
title_full Secure and Efficient Image Retrieval over Encrypted Cloud Data
title_fullStr Secure and Efficient Image Retrieval over Encrypted Cloud Data
title_full_unstemmed Secure and Efficient Image Retrieval over Encrypted Cloud Data
title_sort secure and efficient image retrieval over encrypted cloud data
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2018-01-01
description This paper proposes a novel image retrieval scheme over encrypted cloud data, which achieves high efficiency and confidentiality. For the purpose of improving search efficiency, an index tree is often deployed in the image retrieval scheme. Meanwhile, the confidentiality of the sensitive cloud data, such as outsourced images, index tree, and query request, is also a key issue. Firstly, a balanced binary clustering algorithm is exploited over the integrated image features composed of basic features, such as HSV histogram and DCT histogram, yielding a balanced binary tree (BBT). In particular, due to the adoption of a balanced index tree, our scheme can achieve logarithmic search time. Secondly, the secure inner product is employed to encrypt the index vector and query feature. Finally, to resist the statistical attack of the frequency distribution of the retrieved results, we copy the database and merge the subtree of encrypted BBT to blind the search results. Security analysis and experimental results show that the proposed scheme is secure and efficient.
url http://dx.doi.org/10.1155/2018/7915393
work_keys_str_mv AT haihualiang secureandefficientimageretrievaloverencryptedclouddata
AT xinpengzhang secureandefficientimageretrievaloverencryptedclouddata
AT hangcheng secureandefficientimageretrievaloverencryptedclouddata
AT qiuhanwei secureandefficientimageretrievaloverencryptedclouddata
_version_ 1725142374035750912