• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Li, Yingying (Li, Yingying.) [1] | Ma, Jianfeng (Ma, Jianfeng.) [2] | Miao, Yinbin (Miao, Yinbin.) [3] | Wang, Yue (Wang, Yue.) [4] | Yang, Tengfei (Yang, Tengfei.) [5] | Liu, Ximeng (Liu, Ximeng.) [6] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [7]

Indexed by:

EI

Abstract:

With the advent of cloud computing, explosively increasing images are gradually outsourced to the cloud server for costs saving and feasibility. For security and privacy concerns, images (e.g., medical diagnosis, personal photos) should be encrypted before being outsourced. However, traditional encrypted image retrieval techniques still suffer from costly access control and low search accuracy. To solve these challenging issues, in this article, we first propose a Controllable encrypted cloud image Search scheme in Multi-user settings (namely CSM) by using the polynomial-based access strategy and proxy re-encryption technique. CSM achieves efficient access control and avoids heavy communication overhead caused by key transmission. Then, we improve the basic CSM to achieve malicious search user Tracing (namely TCSM) by utilizing the watermark technique, which can further prevent search users from illegally redistributing retrieved images to unauthorized search users. Our formal security analysis proves that our CSM (or TCSM) can guarantee the privacy of images, indexes, and search queries. Our empirical experiments using real-world datasets demonstrate the efficiency and high accuracy of our CSM (or TCSM) in practice. © 2013 IEEE.

Keyword:

Access control Cloud computing Cryptography Diagnosis Image enhancement Image retrieval Medical imaging Watermarking

Community:

  • [ 1 ] [Li, Yingying]Guangxi Key Laboratory of Cryptography and Information Security, Guangxi; 541004, China
  • [ 2 ] [Li, Yingying]Xidian University, Shaanxi Key Laboratory of Network and System Security, Xi'an; 710071, China
  • [ 3 ] [Ma, Jianfeng]Guangxi Key Laboratory of Cryptography and Information Security, Guangxi; 541004, China
  • [ 4 ] [Ma, Jianfeng]Xidian University, Shaanxi Key Laboratory of Network and System Security, Xi'an; 710071, China
  • [ 5 ] [Miao, Yinbin]Guangxi Key Laboratory of Cryptography and Information Security, Guangxi; 541004, China
  • [ 6 ] [Miao, Yinbin]Xidian University, Shaanxi Key Laboratory of Network and System Security, Xi'an; 710071, China
  • [ 7 ] [Wang, Yue]Guangxi Key Laboratory of Cryptography and Information Security, Guangxi; 541004, China
  • [ 8 ] [Wang, Yue]Xidian University, Shaanxi Key Laboratory of Network and System Security, Xi'an; 710071, China
  • [ 9 ] [Yang, Tengfei]Xi'an University of Posts and Telecommunications, School of Cyberspace Security, Xi'an; 710121, China
  • [ 10 ] [Liu, Ximeng]Fuzhou University, College of Mathematics and Computer Science, Fuzhou; 350108, China
  • [ 11 ] [Liu, Ximeng]Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen; 518066, China
  • [ 12 ] [Choo, Kim-Kwang Raymond]University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio; TX; 78249, United States

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Cloud Computing

Year: 2022

Issue: 4

Volume: 10

Page: 2936-2948

6 . 5

JCR@2022

5 . 3 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 21

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Affiliated Colleges:

Online/Total:50/10285813
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1