期刊文献+

云计算环境下加密图像检索 被引量:12

Privacy-preserving query over the encrypted image in cloud computing
下载PDF
导出
摘要 公共云存储服务为企业海量多媒体数据提供了廉价的存储空间和多种多样的访问方法.但考虑到隐私安全问题,企业多媒体数据必须加密存储在云端,然而目前的大多数加密体制都不支持在加密多媒体数据上直接运算,因此,如何有效地管理和检索密文数据成为具有挑战性的问题.针对云计算环境下加密图像检索问题,首先给出了其形式化定义以及隐私安全要求;然后提出了一种基于安全相似度运算的隐私保护检索方案.该方案预先构建描述加密图像内容的基于内容的索引,再通过安全相似度运算检索加密图像.安全分析和性能评估证明该方案是IND-CCA安全的,并能有效地实现对加密图像检索. In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management syste^ns from local sites to the commercial public cloud for great flexibility and economic savings. For the consideration of users' privacy, sensitive images have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. In this paper, firstly, we define the problem of privacy-preserving query over encrypted images in cloud computing. And to solve the problem, we design a computable encryption scheme based on vector and matrix calculations. The scheme pre-builds a feature-based index to provide feature-related information about each encrypted image, and then chooses the efficient image similarity measure as the pruning tool to carry out the retrieval procedure. Security analysis and performance evaluation show that the scheme is IND-CCA.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2014年第2期151-158,共8页 Journal of Xidian University
基金 国家科技重大专项资助项目(2012ZX03002003) 国家自然科学基金资助项目(61272457) 陕西省教育厅科学研究资助项目(12JK0725) 中央高校基本业务费资助项目(K50511010001)
关键词 云计算 基于内容的图像检索 隐私保护 可搜索加密 cloud computing content based image retrieval privacy-preserving searchable searchencryption
  • 相关文献

参考文献17

  • 1Huang R W,Gui X L,Yu S,et al.Study of Privacy-preserving Framework for Cloud Storage[J].Computer Science and Information Systems,2011,8(3):801-819.
  • 2Jain A K,Vailaya A.Image Retrieval Using Color and Shape[J].Pattern Recognition,1997,29(8):1233-1244.
  • 3Ma W Y,Zhang H J.Benchmarking of Image Features for Content-based Retrieval[C]//The 32 Asilomar Conference on Signals,Systems & Computers.Los Alamitos:IEEE,1998:253-257.
  • 4Loncaric S.A Survey of Shape Analysis Techniques[J].Pattern Recognition,1998,31(8):983-1001.
  • 5Mokhtarian F.Silhouette-based Isolated Object Recognition through Curvature Scale Space[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1995,17(5):539-544.
  • 6孟繁杰,郭宝龙.使用兴趣点局部分布特征及多示例学习的图像检索方法[J].西安电子科技大学学报,2011,38(2):47-53. 被引量:16
  • 7崔力,陈玉坤,韩宇.视觉相似性图像质量评价方法[J].西安电子科技大学学报,2012,39(4):155-160. 被引量:6
  • 8Curtmola R,Garay J A,Kamara S,et al.Searchable Symmetric Encryption:Improved Definitions and Efficient Constructions[C]//Proceedings of ACM CCS.New York:ACM,2006:79-88.
  • 9Boneh D,Crescenzo G D,Ostrovsky R,et al.Public Key Encryption with Keyword Search[C]//Proceedings of EUROCRYPT.Interlaken:Springer,2004:506-522.
  • 10Wang C,Cao N,Li J,et al.Secure Ranked Keyword Search over Encrypted Cloud Data[C]//Proceedings of ICDCS.Berlin:Springer-Verlag,2010:506-522.

二级参考文献31

  • 1孟繁杰,郭宝龙.一种基于兴趣点颜色及空间分布的图像检索方法[J].西安电子科技大学学报,2005,32(2):256-259. 被引量:25
  • 2Rahmani R, Goldman S A, Hui Zhang, et al. Localized Content Based Image Retrieval [ C]//Proc of the 7th ACM SIGMM International Workshop on Multimedia Information Retrieval. New York: ACM, 2005: 227-236.
  • 3Zeng Zhiyong, Liu Shigang. A Novel Region-based Image Retrieval Algorithm Using Hybrid Feature[ C]//WRI World Congress on Computer Science and Information Engineering. Los Angeles: IEEE Computer Society, 2009: 416-420.
  • 4Chiang Cheng Chieh, Hung Yi Ping, Yang Hsuan, et al. Region-based Image Retrieval Using Color-size Features of Watershed Regions [ J]. Journal of Visual Communication and Image Representation, 2009, 20(3) : 167-177.
  • 5Wol C, Jolion J, Kropatsch W, et al. Content Based Image Retrieval Using Interest Points and Texture Features[ C]//Proc of 15th International Conference on Pattem Recognition. Barcelona: IAPR, 2000: 234-237.
  • 6Zheng Xia, Zhou Mingquan, Wang Xingce. Interest Point Based Medical Image Retrieval [ C] //Lecture Notes in Computer Science. Beijing: Springer Verlag, 2008: 118-124.
  • 7Jian Muwei, Chen Shi. Image Retrieval Based on Clustering of Salient Points [ C]//Proc of 2008 2nd International Symposium on Intelligent Information Technology Application. Shanghai: Inst of Elec and Elec Eng Computer Society, 2008: 347-351.
  • 8Schmid C, Mohr R. Local Grayvalue Invariants for Image Retrieval [J]. IEEE Trans on PAMI, 1997, 19(5) : 530-535.
  • 9Bas P, Chassery J M, Macq B. Geometrically Invariant Watermarking Using Feature Points [ J]. IEEE Trans on Image Processing, 2002, 11(9) : 1014-1028.
  • 10Mikolajczyk K, Schmid C. Scale and Affine Invariant Interest Point Detectors [ J]. International Journal of Computer Vision, 2004, 60(1) : 63-86.

共引文献19

同被引文献156

  • 1王成儒,张涛.一种快速图像纹理分析算法[J].光电工程,2005,32(1):74-76. 被引量:9
  • 2张瀚,王秀峰,李朝晖,刘大海.一种基于混沌系统及Henon映射的快速图像加密算法[J].计算机研究与发展,2005,42(12):2137-2142. 被引量:32
  • 3胡昊然,钱萌.基于特征码的Imagehide与JPEGX图像隐藏信息检测以及提取[J].科技广场,2007(1):125-127. 被引量:2
  • 4洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Z1):259-265.
  • 5Sahai A, Waters B. Fuzzy identity - based encryption [ C ]. Berlin Heidelberg: Advances in Cryptology - Eurocrypt'05, Springer,2005:557 - 557.
  • 6Goyal V, Pandey O, Sahai A, et al. Attribute - based encryp- tion for fine - grained access control of encrypted data [ C ].New York:Proceedings of the ACM Conference on Computer and Communications Security- CCS'06,ACM,2006:89-98.
  • 7Cheung L, Newport C. Provably secure ciphertext policy ABE [ C ]. Newyork : Proceedings of the ACM Conference on Com- puter and Communications Security - CCS'07, ACM, 2007 : 456 - 465.
  • 8Zhang Yinghui, Chen Xiaofeng, Li Jin, et al. FDR - ABE : At- tribute -based encryption with flexible and direct revocation [ C ]. Piscataway : Proceedings of the International Conference on Intelligent Networking and Collaborative Systems - INCoS'13, IEEE ,2013 ..38 - 45.
  • 9Zhang Yinghui, Chert Xiaofeng, Li Jin, et al. Attribute - based data sharing with flexible and direct revocation in cloud com- puting [ J ]. KSII Transactions on Intemet & Information Sys- tems,2014,8 ( 11 ) :4028 - 4049.
  • 10Chase M. Multi - authority attribute based encryption [ C 2- Berlin Heidelberg : Proceedings of the Theory of Cryptography Conference - TCC'07, Springer,2007:515 - 534.

引证文献12

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部