• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Tong, Qiuyun (Tong, Qiuyun.) [1] | Miao, Yinbin (Miao, Yinbin.) [2] | Chen, Lei (Chen, Lei.) [3] | Weng, Jian (Weng, Jian.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [6] | Deng, Robert H. (Deng, Robert H..) [7]

Indexed by:

EI

Abstract:

To ensure the security of images outsourced to the malicious cloud without affecting searchability on such outsourced (typically encrypted) images, one could use privacy-preserving Content-Based Image Retrieval (CBIR) primitive. However, conventional privacy-preserving CBIR schemes based on Searchable Symmetric Encryption (SSE) are not capable of supporting efficient fine-grained access control and result verification simultaneously. Therefore, in this article, we propose a Verifiable Fine-grained encrypted Image Retrieval scheme in the Multi-owner multi-user settings (VFIRM). VFIRM first utilizes a novel polynomial-based access strategy to provide efficient fine-grained access control. Then, it employs the dual secure kk-nearest neighbor technique to distribute distinct keys to different data owners and data users, and finally implements an adapted homomorphic MAC technique to check the correctness of search results. Our formal security analysis shows that VFIRM is non-adaptive semantic secure if the client's search key is generated randomly and keeps in secret. Our empirical experiments using two real-world datasets (i.e., Caltech101 and Corel5k) demonstrate the practicality of VFIRM. © 2008-2012 IEEE.

Keyword:

Access control Content based retrieval Image coding Nearest neighbor search Privacy-preserving techniques Semantics

Community:

  • [ 1 ] [Tong, Qiuyun]School of Cyber Engineering, Xidian University, Xian; 710071, China
  • [ 2 ] [Tong, Qiuyun]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 3 ] [Tong, Qiuyun]City University of Hong Kong, Department of Computer Science, Hong Kong
  • [ 4 ] [Miao, Yinbin]School of Cyber Engineering, Xidian University, Xian; 710071, China
  • [ 5 ] [Miao, Yinbin]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 6 ] [Miao, Yinbin]City University of Hong Kong, Department of Computer Science, Hong Kong
  • [ 7 ] [Chen, Lei]Nsfocus Information Technology Company, Ltd, Beijing; 100089, China
  • [ 8 ] [Chen, Lei]Tsinghua University, Research Institute of Information Technology (RIIT), Beijing; 100084, China
  • [ 9 ] [Weng, Jian]Jinan University, College of Cyber Security, Guangdong Key Laboratory of Data Security and Privacy Preserving, Guangzhou; 510632, China
  • [ 10 ] [Liu, Ximeng]Fuzhou University, School of Mathematics and Computer Science, Key Laboratory of Information Security of Network Systems, Fuzhou; 350108, China
  • [ 11 ] [Choo, Kim-Kwang Raymond]The University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio; TX; 78249, United States
  • [ 12 ] [Deng, Robert H.]Singapore Management University, School of Information Systems, Singapore; 178902, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Services Computing

Year: 2022

Issue: 6

Volume: 15

Page: 3606-3619

8 . 1

JCR@2022

5 . 5 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 14

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:262/9556261
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1