Secure and Efficient Image Retrieval over Encrypted Cloud Data
This paper proposes a novel image retrieval scheme over encrypted cloud data, which achieves high efficiency and confidentiality. For the purpose of improving search efficiency, an index tree is often deployed in the image retrieval scheme. Meanwhile, the confidentiality of the sensitive cloud data,...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2018/7915393 |
id |
doaj-c742cb3d9d374ca69ab16a1f92bf1730 |
---|---|
record_format |
Article |
spelling |
doaj-c742cb3d9d374ca69ab16a1f92bf17302020-11-25T01:18:27ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/79153937915393Secure and Efficient Image Retrieval over Encrypted Cloud DataHaihua Liang0Xinpeng Zhang1Hang Cheng2Qiuhan Wei3School of Communication and Information Engineering, Shanghai University, Shanghai, ChinaSchool of Communication and Information Engineering, Shanghai University, Shanghai, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaSchool of Communication and Information Engineering, Shanghai University, Shanghai, ChinaThis paper proposes a novel image retrieval scheme over encrypted cloud data, which achieves high efficiency and confidentiality. For the purpose of improving search efficiency, an index tree is often deployed in the image retrieval scheme. Meanwhile, the confidentiality of the sensitive cloud data, such as outsourced images, index tree, and query request, is also a key issue. Firstly, a balanced binary clustering algorithm is exploited over the integrated image features composed of basic features, such as HSV histogram and DCT histogram, yielding a balanced binary tree (BBT). In particular, due to the adoption of a balanced index tree, our scheme can achieve logarithmic search time. Secondly, the secure inner product is employed to encrypt the index vector and query feature. Finally, to resist the statistical attack of the frequency distribution of the retrieved results, we copy the database and merge the subtree of encrypted BBT to blind the search results. Security analysis and experimental results show that the proposed scheme is secure and efficient.http://dx.doi.org/10.1155/2018/7915393 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Haihua Liang Xinpeng Zhang Hang Cheng Qiuhan Wei |
spellingShingle |
Haihua Liang Xinpeng Zhang Hang Cheng Qiuhan Wei Secure and Efficient Image Retrieval over Encrypted Cloud Data Security and Communication Networks |
author_facet |
Haihua Liang Xinpeng Zhang Hang Cheng Qiuhan Wei |
author_sort |
Haihua Liang |
title |
Secure and Efficient Image Retrieval over Encrypted Cloud Data |
title_short |
Secure and Efficient Image Retrieval over Encrypted Cloud Data |
title_full |
Secure and Efficient Image Retrieval over Encrypted Cloud Data |
title_fullStr |
Secure and Efficient Image Retrieval over Encrypted Cloud Data |
title_full_unstemmed |
Secure and Efficient Image Retrieval over Encrypted Cloud Data |
title_sort |
secure and efficient image retrieval over encrypted cloud data |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2018-01-01 |
description |
This paper proposes a novel image retrieval scheme over encrypted cloud data, which achieves high efficiency and confidentiality. For the purpose of improving search efficiency, an index tree is often deployed in the image retrieval scheme. Meanwhile, the confidentiality of the sensitive cloud data, such as outsourced images, index tree, and query request, is also a key issue. Firstly, a balanced binary clustering algorithm is exploited over the integrated image features composed of basic features, such as HSV histogram and DCT histogram, yielding a balanced binary tree (BBT). In particular, due to the adoption of a balanced index tree, our scheme can achieve logarithmic search time. Secondly, the secure inner product is employed to encrypt the index vector and query feature. Finally, to resist the statistical attack of the frequency distribution of the retrieved results, we copy the database and merge the subtree of encrypted BBT to blind the search results. Security analysis and experimental results show that the proposed scheme is secure and efficient. |
url |
http://dx.doi.org/10.1155/2018/7915393 |
work_keys_str_mv |
AT haihualiang secureandefficientimageretrievaloverencryptedclouddata AT xinpengzhang secureandefficientimageretrievaloverencryptedclouddata AT hangcheng secureandefficientimageretrievaloverencryptedclouddata AT qiuhanwei secureandefficientimageretrievaloverencryptedclouddata |
_version_ |
1725142374035750912 |