AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments

With the rapid development of cloud computing and other modern technologies, collaborative computing between data is increasing, and privacy protection and secure multi-party computation are also attracting more attention. The emergence of cloud computing provides new options for data holders to per...

Full description

Bibliographic Details
Main Authors: Chen, X. (Author), Liu, X. (Author), Luo, D. (Author), Xiong, N. (Author), Xu, G. (Author)
Format: Article
Language:English
Published: MDPI 2023
Subjects:
Online Access:View Fulltext in Publisher
View in Scopus
LEADER 02391nam a2200265Ia 4500
001 10.3390-electronics12091983
008 230529s2023 CNT 000 0 und d
020 |a 20799292 (ISSN) 
245 1 0 |a AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments 
260 0 |b MDPI  |c 2023 
856 |z View Fulltext in Publisher  |u https://doi.org/10.3390/electronics12091983 
856 |z View in Scopus  |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85159187449&doi=10.3390%2felectronics12091983&partnerID=40&md5=6b5f47af0fe7be7723b5e8abae7ec99b 
520 3 |a With the rapid development of cloud computing and other modern technologies, collaborative computing between data is increasing, and privacy protection and secure multi-party computation are also attracting more attention. The emergence of cloud computing provides new options for data holders to perform complex computing problems and to store images; however, data privacy issues cannot be ignored. If a graphic is encrypted and stored in the cloud, the cloud server will perform confidential similar matching when the user searches. At present, most research on searchable encryption is focused on text search, with few schemes researched on how to finish the graphic search. To solve this problem, this paper proposes a secure search protocol based on graph shape under the semi-honest model. Using the cut-choose method and zero-knowledge proof, further designs of the anti-malicious attack graphic similarity judgment system (AAJS) based on the Paillier encryption algorithm, can achieve the secure search and matching of the graph while resisting malicious adversary attacks. The proposed protocol’s security is proved by the real/ideal model paradigm. This paper conducts performance analysis and experimental simulation on the existing scheme and the experiments demonstrate that the system achieves high execution efficiency. © 2023 by the authors. 
650 0 4 |a graphic similarity matching 
650 0 4 |a graphics search in cloud computing 
650 0 4 |a malicious attack 
650 0 4 |a real/ideal model paradigm 
650 0 4 |a secure multi-party computation 
700 1 0 |a Chen, X.  |e author 
700 1 0 |a Liu, X.  |e author 
700 1 0 |a Liu, X.  |e author 
700 1 0 |a Luo, D.  |e author 
700 1 0 |a Xiong, N.  |e author 
700 1 0 |a Xu, G.  |e author 
773 |t Electronics (Switzerland)