AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments
With the rapid development of cloud computing and other modern technologies, collaborative computing between data is increasing, and privacy protection and secure multi-party computation are also attracting more attention. The emergence of cloud computing provides new options for data holders to per...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI
2023
|
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
LEADER | 02391nam a2200265Ia 4500 | ||
---|---|---|---|
001 | 10.3390-electronics12091983 | ||
008 | 230529s2023 CNT 000 0 und d | ||
020 | |a 20799292 (ISSN) | ||
245 | 1 | 0 | |a AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments |
260 | 0 | |b MDPI |c 2023 | |
856 | |z View Fulltext in Publisher |u https://doi.org/10.3390/electronics12091983 | ||
856 | |z View in Scopus |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85159187449&doi=10.3390%2felectronics12091983&partnerID=40&md5=6b5f47af0fe7be7723b5e8abae7ec99b | ||
520 | 3 | |a With the rapid development of cloud computing and other modern technologies, collaborative computing between data is increasing, and privacy protection and secure multi-party computation are also attracting more attention. The emergence of cloud computing provides new options for data holders to perform complex computing problems and to store images; however, data privacy issues cannot be ignored. If a graphic is encrypted and stored in the cloud, the cloud server will perform confidential similar matching when the user searches. At present, most research on searchable encryption is focused on text search, with few schemes researched on how to finish the graphic search. To solve this problem, this paper proposes a secure search protocol based on graph shape under the semi-honest model. Using the cut-choose method and zero-knowledge proof, further designs of the anti-malicious attack graphic similarity judgment system (AAJS) based on the Paillier encryption algorithm, can achieve the secure search and matching of the graph while resisting malicious adversary attacks. The proposed protocol’s security is proved by the real/ideal model paradigm. This paper conducts performance analysis and experimental simulation on the existing scheme and the experiments demonstrate that the system achieves high execution efficiency. © 2023 by the authors. | |
650 | 0 | 4 | |a graphic similarity matching |
650 | 0 | 4 | |a graphics search in cloud computing |
650 | 0 | 4 | |a malicious attack |
650 | 0 | 4 | |a real/ideal model paradigm |
650 | 0 | 4 | |a secure multi-party computation |
700 | 1 | 0 | |a Chen, X. |e author |
700 | 1 | 0 | |a Liu, X. |e author |
700 | 1 | 0 | |a Liu, X. |e author |
700 | 1 | 0 | |a Luo, D. |e author |
700 | 1 | 0 | |a Xiong, N. |e author |
700 | 1 | 0 | |a Xu, G. |e author |
773 | |t Electronics (Switzerland) |