Browse > Article
http://dx.doi.org/10.3837/tiis.2019.11.023

EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud  

Abduljabbar, Zaid Ameen (College of Education for Pure Sciences, University of Basrah)
Ibrahim, Ayad (College of Education for Pure Sciences, University of Basrah)
Hussain, Mohammed Abdulridha (College of Education for Pure Sciences, University of Basrah)
Hussien, Zaid Alaa (Southern Technical University)
Al Sibahee, Mustafa A. (Shenzhen Huazhong University of Science and Technology Research Institute)
Lu, Songfeng (Shenzhen Huazhong University of Science and Technology Research Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.11, 2019 , pp. 5692-5716 More about this Journal
Abstract
One of the best means to safeguard the confidentiality, security, and privacy of an image within the IoT-Cloud is through encryption. However, looking through encrypted data is a difficult process. Several techniques for searching encrypted data have been devised, but certain security solutions may not be used in IoT-Cloud because such solutions are not lightweight. We propose a lightweight scheme that can perform a content-based search of encrypted images, namely EEIRI. In this scheme, the images are represented using local features. We develop and validate a secure scheme for measuring the Euclidean distance between two descriptor sets. To improve the search efficiency, we employ the k-means clustering technique to construct a searchable tree-based index. Our index construction process ensures the privacy of the stored data and search requests. When compared with more familiar techniques of searching images over plaintexts, EEIRI is considered to be more efficient, demonstrating a higher search cost of 7% and a decrease in search accuracy of 1.7%. Numerous empirical investigations are carried out in relation to real image collections so as to evidence our work.
Keywords
Searchable encryption; secure image retrieval; IoT-Cloud; k-means clustering; SURF local feature; similarity measure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Lu, A. L. Varna, M. Wu, "Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization," IEEE Access, vol. 2, pp. 125-141, 2014.   DOI
2 D. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, vol. 60, no. 2, pp.91-110, 2004.   DOI
3 S. A. Oliveira, A. R. R. Neto, F. N. Bezerra, "A novel genetic algorithms and surf-based approach for image retargeting," Expert Systems with Applications, vol. 44, pp. 332-343, February, 2016.   DOI
4 H. Bay, A. Ess, T. Tuytelaars, L. V. Gool, "Speeded-up robust features (SURF)," Computer Vision and Image Understanding, vol. 110, no.3, pp. 346-359, June, 2008.   DOI
5 D. D. Truong, C. S. Ngoc, V. T. Nguyen, M. T. Tran, A. D. Duong, "Local descriptors without orientation normalization to enhance landmark recognition," in Proc. of Knowledge and Systems Engineering, Advances in Intelligent Systems and Computing, vol. 244, pp. 401-413, 2014.
6 Y. Yue, T. Finley, F. Radlinski, T. Joachims, "A support vector method for optimizing average precision," in Proc of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 271-278, 23-27 July, 2007.
7 B. Bakhache, J. M. Ghazal, S. E. Assad, "Improvement of the security of zigbee by a new chaotic algorithm," IEEE Systems Journal, vol. 8, no. 4, pp.1024-1033, Dec. 2014.   DOI
8 H. Shafagh, A. Hithnawi, A. Droescher, S. Duquennoy, W. Hu, "Talos: Encrypted query processing for the internet of things," in Proc of the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys'15), pp. 197-210, 1-4 November, 2015.
9 B. Schneier, "Description of a new variable-length key, 64-bit block cipher (blowfish)," in Fast Software Encryption, Cambridge Security Workshop, pp. 191-204, 14-16 December, 1994.
10 P. Kumar, S. B. Rana, "Development of modified {AES} algorithm for data security," International Journal for Light and Electron Optics, vol. 127, no. 4, pp. 2341-2345, February, 2016.   DOI
11 R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc of the 13th ACM Conference on Computer and Communications Security, pp. 79-88, October 30 - November 03, 2006.
12 S. Qiu, J. Liu, Y. Shi, M. Li, W. Wang, "Identity-based private matching over outsourced encrypted datasets," IEEE Transactions on cloud Computing, vol. 6, no. 3, p. 747-759, December, 2015.   DOI
13 W. Du, M. J. Atallah, "Protocols for secure remote database access with approximate matching," E-Commerce Security and Privacy, vol. 2, pp. 87-111, 2001.   DOI
14 J. Y. Chun, D. H. Lee, I. R. Jeong, "Privacy-preserving range set union for rare cases in healthcare data," IET Communications, vol. 6, no. 18, pp. 3288-3293, 2012.   DOI
15 S. Upadhyay, C. Sharma, P. Sharma, P. Bharadwaj, K. Seeja, K "Privacy preserving data mining with 3-d rotation transformation," Journal of King Saud University - Computer and Information Sciences, vol. 30, no. 4, pp.524-530, October, 2018.   DOI
16 Corel test set. http://InfoLab.Stanford.EDU/-wangz/image.vary.jpg.tar
17 W. Liao, "Parallel k-means data clustering", Dec. 5, 2013. http://www.ece.northwestern.edu/-wkliao/Kmeans/index.html
18 E. Luo, Q. Liu, J. H. Abawajy, G. Wang, "Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks," Future Generation Computer Systems, vol. 68, pp. 222-233, March, 2017.   DOI
19 X. Yang, R. Lu, H. Liang, X. Tang, "SFPM: A secure and fine-grained privacy-preserving matching protocol for mobile social networking," Big Data Research, vol. 3, pp. 2-9, April, 2016.   DOI
20 S. Wang, J. Y. Mao, N. Archer, "On the performance of B2B e-markets: An analysis of organizational capabilities and market opportunities," Electronic Commerce Research and Applications, vol. 11, no. 1, pp. 59-74, February, 2012.   DOI
21 D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, "Public key encryption with keyword search," in Proc of Springer International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506-522, 2-6 May, 2004. 30
22 H. C. Chen, I. You, C. E. Weng, C. H. Cheng, Y. F. Huang, "A security gateway application for End-to-End M2M communications," Computer Standards and Interfaces, vol. 44, pp. 85-93, February, 2016.   DOI
23 M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, March, 2013.   DOI
24 D. X. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data." in Proc of IEEE Symposium on Security and Privacy, pp. 44-55, 14-17 May, 2000.
25 C. Wang, N. Cao, J. Li, K. Ren, W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc of IEEE 30th International Conference on Distributed Computing Systems, pp. 253-262, 21-25 June, 2010.
26 P. Golle, J. Staddon, B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc of Second International Springer Conference of Applied Cryptography and Network Security, pp. 31-45, 8-11 June, 2004.
27 C. Liu, L. Zhu, L. Li, Y. Tan, "Fuzzy keyword search on encrypted cloud storage data with small index," in Proc of IEEE International Conference on cloud Computing and Intelligence Systems, pp. 269-273, 15-17 Sept., 2011.
28 W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, H. Li, H, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 71-82, 8-10 May, 2013.
29 W. Zhang, Y. Lin, S. Xiao, J. Wu, S. Zhou, S, "Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing," IEEE Transactions on Computers, vol. 65, no. 5, pp. 1566-1577, May, 2016.   DOI
30 J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc of INFOCOM, pp. 1-5, 14-19 March, 2010.
31 B. Wang, S. Yu, W. Lou, Y. T. Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," in Proc of IEEE Conference on Computer Communications, pp. 2112-2120, 27 April-2 May, 2014.
32 W. Lu, A. Swaminathan, A.L.Varna, M. Wu, "Enabling search over encrypted multimedia databases," in Proc. of Springer Media Forensics and Security, SPIE, vol. 7254, pp. 18-29, 18-22 January, 2009.
33 F. Perronnin, Y. Liu, J. Sanchez, H. Poirier, "Large-scale image retrieval with compressed fisher vectors," in Proc of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3384-3391, 13-18 June, 2010.
34 M. Douze, A. Ramisa, C. Schmid, "Combining attributes and fisher vectors for efficient image retrieval, " in Proc of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 745-752, 20-25 June, 2011.
35 C. Y. Hsu, C. S. Lu, S. C. Pei, "Image feature extraction in encrypted domain with privacy-preserving SIFT," IEEE Transactions on Image Processing, vol. 21, no. 11, pp. 4593-4607, Nov., 2012.   DOI