Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (5): 29-39.doi: 10.11959/j.issn.2096-109x.2021076

• TopicⅠ: Voice Image and Audio-Video Processing • Previous Articles     Next Articles

Efficient and secure multi-user outsourced image retrieval scheme with access control

Fuyuan SONG1, Zheng QIN1, Jixin ZHANG2, Yu LIU1   

  1. 1 College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China
    2 School of Computer Science, Hubei University of Technology, Wuhan 430068, China
  • Revised:2021-01-18 Online:2021-10-15 Published:2021-10-01
  • Supported by:
    TheNational Natural Science Foundation of China(61772191);TheNational Natural Science Foundation of China(61902123);TheNational Natural Science Foundation of China(62002112);TheNational Natural Science Foundation of China(62002106);The Science and Technology Projects of Changsha(kq2004025);The Science and Technology Projects of Changsha(kq2004027);The Science and Technology Key Projects of Hunan Province(2015TP1004);The Science and Technology Key Projects of Hunan Province(2018TP1009);The Science and Technology Key Projects of Hunan Province(2020JJ5085);The Science and Technology Key Projects of Hunan Province(2018TP3001)

Abstract:

In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.

Key words: image retrieval, searchable encryption, privacy-preserving, access control

CLC Number: 

No Suggested Reading articles found!