通信学报 ›› 2020, Vol. 41 ›› Issue (4): 14-26.doi: 10.11959/j.issn.1000-436x.2020086
所属专题: 边缘计算
李颖莹1,2,马建峰1,2,苗银宾1
修回日期:
2020-03-26
出版日期:
2020-04-25
发布日期:
2020-04-30
作者简介:
李颖莹(1995- ),女,陕西汉中人,西安电子科技大学博士生,主要研究方向为数据隐私保护、云计算安全|马建峰(1963- ),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为计算机系统安全、移动与无线安全、系统可生存性和可信计算|苗银宾(1988- ),男,河南驻马店人,博士,西安电子科技大学讲师,主要研究方向为应用密码学、无线网络安全
基金资助:
Yingying LI1,2,Jianfeng MA1,2,Yinbin MIAO1
Revised:
2020-03-26
Online:
2020-04-25
Published:
2020-04-30
Supported by:
摘要:
针对现有加密图像检索方案未考虑不同密钥加密图像集的情况,基于局部敏感哈希、安全近邻及代理重加密技术提出了基于边缘计算的支持多密钥的加密图像检索系统(包含基础方案和改进方案)。所提方案不但提高了图像查询效率、精度,而且降低了查询用户的额外计算开销。安全性分析表明,所提基础方案仅可抵抗已知密文攻击,而所提改进方案可抵抗已知背景攻击。基于实际数据集的实验性能测试表明,所提方案在实际应用场景中是可行的。
中图分类号:
李颖莹,马建峰,苗银宾. 基于边缘计算的支持多密钥的加密图像检索[J]. 通信学报, 2020, 41(4): 14-26.
Yingying LI,Jianfeng MA,Yinbin MIAO. Encrypted image retrieval in multi-key settings based on edge computing[J]. Journal on Communications, 2020, 41(4): 14-26.
[1] | LU W J , VARNA A L , SWAMINATHAN A ,et al. Secure image retrieval through feature protection[C]// Proceedings of 34th Internet Conference on Acoustics,Speech and Signal Processing. Piscataway:IEEE Press, 2009: 1533-1536. |
[2] | LU W J , VARNA A L , WU M . Confidentiality-preserving image search:a comparative study between homomorphic encryption and distance-preserving randomization[J]. IEEE Access, 2014(2): 125-141. |
[3] | ZHANG L , JUNG T , LIU K B ,et al. PIC:enable large-scale privacy preserving content-based image search on cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2017,28(11): 3258-3271. |
[4] | XIA Z H , ZHU Y , SUN X M ,et al. Towards privacy-preserving content-based image retrieval in cloud computing[J]. IEEE Transactions on Cloud Computing, 2018,6(1): 276-286. |
[5] | ZHENG P J , HUANG J W . An efficient image homomorphic encryption scheme with small ciphertext expansion[C]// Proceedings of 21st ACM Internet Conference on Multimedia. New York:ACM Press, 2013: 803-812. |
[6] | QIN Z , YAN J B , REN K ,et al. Privacy-preserving outsourcing of image global feature detection[C]// Proceedings of Global Communications Conference. Piscataway:IEEE Press, 2014: 710-715. |
[7] | QIN Z , YAN J B , REN K ,et al. Towards efficient privacy-preserving image feature extraction in cloud computing[C]// Proceedings of Internet Conference on Computational Geometry. Piscataway:IEEE Press, 2014: 497-506. |
[8] | LU W J , SWAMINATHAN A , VARNA A L ,et al. Enabling search over encrypted multimedia databases[C]// Proceedings of IS&T/SPIE Electronic Imaging,International Society for Optics and Photonics. Bellingham:SPIE, 2009:725418. |
[9] | ZHANG Y , ZHOU L , PENG Y F ,et al. A secure image retrieval method based on homomorphic encryption for cloud computing[C]// Proceedings of 19th Internet Conference on Digital Signal Processing. NewYork:ACM Press, 2014: 269-274. |
[10] | XIA Z H , XIONG N N , VASILAKOS A V ,et al. EPCBIR:an efficient and privacy-preserving content-based image retrieval scheme in cloud computing[J]. Information Sciences, 2017,387: 195-204. |
[11] | YUAN J W , YU S C , GUO L K . SEISA:secure and efficient encrypted image search with access control[C]// Proceedings of 34th Internet Conference on Computer Communications. Piscataway:IEEE Press, 2015: 2083-2091. |
[12] | LIANG H H , ZHANG X P , WEI Q H ,et al. Secure image retrieval with multiple keys[J]. Journal of Electronic Imaging, 2018,27(2):023032. |
[13] | SHEN M , CHENG G , ZHU L ,et al. Content-based multi-source encrypted image retrieval in clouds with privacy preservation[J]. Future Generation Computer Systems,,(2018-05-09)[2020-01-06].doi.org/10.1016/j.future.2018.04.089. |
[14] | YIN H , QIN Z , ZHANG J X ,et al. Secure conjunctive multi-keyword search for multiple data owners in cloud computing[C]// Proceedings of 22nd Internet Conference on Parallel and Distributed Systems. New York:ACM Press, 2016: 761-768. |
[15] | SUN W H , YU S C , LOU W J ,et al. Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 1187-1198. |
[16] | MIAO Y B , MA J F , LIU X M ,et al. VKSE-MO:verifiable keyword search over encrypted data in multi-owner settings[J]. Science China Information Sciences, 2017,60(12): 1-15. |
[17] | MIAO Y B , MA J F , LIU X M ,et al. VCKSM:verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings[J]. Pervasive and Mobile Computing, 2017,40: 205-219. |
[18] | 王祥宇, 马建峰, 苗银宾 . 高效隐私保护的多用户图像外包检索方案[J]. 通信学报, 2019,40(2): 31-39. |
WANG X Y , MA J F , MIAO Y B . Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user[J]. Journal on Communications, 2019,40(2): 31-39. | |
[19] | SUN S F , LIU J K , SAKZAD A ,et al. An efficient non-interactive multi-client searchable encryption with support for boolean queries[C]// European Symposium On Research in Computer Security. Berlin:Springer, 2016: 154-172. |
[20] | HAMLIN A , SHELAT A , WEISS M ,et al. Multi-key searchable encryption,revisited[C]// IACR International Workshop on Public Key Cryptography. Berlin:Springer, 2018: 95-124. |
[21] | SHANKAR K , LAKSHMANAPRABU S K , GUPTA D ,et al. Adaptive optimal multi key based encryption for digital image security[J]. Concurrency and Computation:Practice and Experience, 2018:e5122. |
[22] | GALBRAITH S D , PATERSON K G , SMART N P . Pairings for cryptographers[J]. Discrete Applied Mathematics, 2008,156(16): 3113-3121. |
[23] | ATENIESE G , FU K , GREEN M ,et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006,9(1): 1-30. |
[24] | ANDONI A , INDYK P . Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions[C]// Proceedings of 47th Symposium on Foundations of Computer Science. New York:ACM Press, 2006: 459-468. |
[25] | DATAR M , IMMORLICA N , INDYK P ,et al. Locality-sensitive hashing scheme based on p-stable distributions[C]// Proceedings of 20th Symposium on Computational Geometry. New York:ACM Press, 2004: 253-262. |
[26] | DELFS H , KNEBL H , KNEBL H . Introduction to cryptography:principles and applications[M]. Berlin: SpringerPress, 2002. |
[27] | LIU K , GIANNELLA C , KARGUPTA H . An attacker’s view of distance preserving maps for privacy preserving data mining[C]// Proceedings of European Conference Principles of Data Mining and Knowledge Discovery. Berlin:Springer, 2006: 297-308. |
[28] | WONG W K , CHEUNG D W , KAO B ,et al. Secure kNN computation on encrypted databases[C]// Proceedings of 28th Internet Conference on Management of Data. New York:ACM Press, 2009: 139-152. |
[29] | CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 222-233. |
[30] | CHOR B , GOLDREICH O , KUSHILEVITZ E ,et al. Private Information Retrieval[C]// Proceedings of 36th Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 1995: 41-50. |
[31] | WANG J Z , LI J , WIEDERHOLD G . SIMPLlcity:semantics-sensitive integrated matching for picture libraries[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2001,23(9): 947-963. |
[32] | MANJUNATH B S , OHM J R , VASUDEVAN V V ,et al. Color and texture descriptors[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001,11(6): 703-715. |
[1] | 李瑞琪, 贾春福, 王雅飞. 基于NTRU的多密钥同态代理重加密方案及其应用[J]. 通信学报, 2021, 42(3): 11-22. |
[2] | 杨小东, 席婉婷, 王嘉琪, 陈艾佳, 王彩芬. 基于签密和区块链的车联网电子证据共享方案[J]. 通信学报, 2021, 42(12): 236-246. |
[3] | 牛淑芬,刘文科,陈俐霞,王彩芬,杜小妮. 基于联盟链的可搜索加密电子病历数据共享方案[J]. 通信学报, 2020, 41(8): 204-214. |
[4] | 冯朝胜,罗王平,秦志光,袁丁,邹莉萍. 支持多种特性的基于属性代理重加密方案[J]. 通信学报, 2019, 40(6): 177-189. |
[5] | 苏铓,俞研,吴槟,付安民. 面向代理重加密算法的程序设计语言研究[J]. 通信学报, 2018, 39(6): 89-97. |
[6] | 苏铓,史国振,付安民,俞研,金伟. 基于代理重加密的云端多要素访问控制方案[J]. 通信学报, 2018, 39(2): 96-104. |
[7] | 张恩,裴瑶瑶,杜蛟. 基于RLWE的密文策略属性代理重加密[J]. 通信学报, 2018, 39(11): 129-137. |
[8] | 李菊雁,马春光,赵乾. 格上可重新拆分的门限多代理者的代理重加密方案[J]. 通信学报, 2017, 38(5): 157-164. |
[9] | 罗恩韬,王国军,陈淑红,PINIALKhan-butt. 移动社交网络中跨域代理重加密朋友发现隐私保护方案研究[J]. 通信学报, 2017, 38(10): 81-93. |
[10] | 郭威,周学广,瞿成勤,罗芳,纪祥君. 基于CP-ABE的编队跨域通信方案研究[J]. 通信学报, 2015, 36(Z1): 250-258. |
[11] | 苏 铓,史国振,谢绒娜,付安民. 面向移动云计算的多要素代理重加密方案[J]. 通信学报, 2015, 36(11): 73-79. |
[12] | 张维纬,张茹,刘建毅,钮心忻,杨义先. 高效的选择密文安全的单向代理重加密方案[J]. 通信学报, 2013, 34(7): 87-97. |
[13] | 张维纬1,2,张茹1,2,刘建毅1,2,钮心忻1,2,杨义先1,2. 高效的选择密文安全的单向代理重加密方案[J]. 通信学报, 2013, 34(7): 10-97. |
[14] | 蓝才会,王彩芬. 构造适合云的公平交换协议[J]. 通信学报, 2013, 34(3): 111-118. |
[15] | 洪澄,张敏,冯登国. 面向云存储的高效动态密文访问控制方法[J]. 通信学报, 2011, 32(7): 125-132. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|