网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (5): 29-39.doi: 10.11959/j.issn.2096-109x.2021076

• 专栏Ⅰ:语音图像与音视频处理 • 上一篇    下一篇

基于访问控制安全高效的多用户外包图像检索方案

宋甫元1, 秦拯1, 张吉昕2, 刘羽1   

  1. 1 湖南大学信息科学与工程学院,湖南 长沙 410082
    2 湖北工业大学计算机学院,湖北 武汉 430068
  • 修回日期:2021-01-18 出版日期:2021-10-15 发布日期:2021-10-01
  • 作者简介:宋甫元(1991− ),男,江西上饶人,湖南大学博士生,主要研究方向为隐私保护、数据安全、应用密码学
    秦拯(1969−),男,湖南长沙人,湖南大学教授、博士生导师,主要研究方向为云计算安全、隐私保护、图数据管理与应用
    张吉昕(1987−),男,湖北武汉人,湖北工业大学讲师,主要研究方向为人工智能、知识图谱、异常行为分析与恶意代码分析
    刘羽(1994− ),女,湖南邵阳人,湖南大学博士生,主要研究方向为应用密码学、图像加密
  • 基金资助:
    国家自然科学基金(61772191);国家自然科学基金(61902123);国家自然科学基金(62002112);国家自然科学基金(62002106);长沙市科技计划项目(kq2004025);长沙市科技计划项目(kq2004027);湖南省科技计划重点资助项目(2015TP1004);湖南省科技计划重点资助项目(2018TP1009);湖南省科技计划重点资助项目(2020JJ5085);湖南省科技计划重点资助项目(2018TP3001)

Efficient and secure multi-user outsourced image retrieval scheme with access control

Fuyuan SONG1, Zheng QIN1, Jixin ZHANG2, Yu LIU1   

  1. 1 College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China
    2 School of Computer Science, Hubei University of Technology, Wuhan 430068, China
  • Revised:2021-01-18 Online:2021-10-15 Published:2021-10-01
  • Supported by:
    TheNational Natural Science Foundation of China(61772191);TheNational Natural Science Foundation of China(61902123);TheNational Natural Science Foundation of China(62002112);TheNational Natural Science Foundation of China(62002106);The Science and Technology Projects of Changsha(kq2004025);The Science and Technology Projects of Changsha(kq2004027);The Science and Technology Key Projects of Hunan Province(2015TP1004);The Science and Technology Key Projects of Hunan Province(2018TP1009);The Science and Technology Key Projects of Hunan Province(2020JJ5085);The Science and Technology Key Projects of Hunan Province(2018TP3001)

摘要:

由于公有云不是可信的实体,通过公有云提供图像检索服务时,它可能会窃取图像数据的敏感信息。近年来,密文图像检索方法被提出,用于保护图像隐私。然而,传统的隐私保护图像检索方案搜索效率较低,且无法支持多用户场景。因此,提出一种基于访问控制安全高效的多用户外包图像检索方案。该方案采用一次一密和矩阵变换方法,实现基于欧几里得距离(简称欧氏距离)相似性的密文图像检索,并利用矩阵分解和代理重加密,实现多用户外包图像检索。采用局部敏感哈希算法构建索引,提高密文图像检索效率。特别地,提出一种基于角色多项式函数的轻量级访问控制策略,该策略能够灵活设定图像访问权限,防止恶意用户窃取隐私信息。安全性分析论证了所提方案能够保护图像和查询请求的机密性;实验结果表明所提方案能够达到高效的图像检索。

关键词: 图像检索, 可搜索加密, 隐私保护, 访问控制

Abstract:

In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.

Key words: image retrieval, searchable encryption, privacy-preserving, access control

中图分类号: 

No Suggested Reading articles found!