Journal on Communications ›› 2020, Vol. 41 ›› Issue (4): 14-26.doi: 10.11959/j.issn.1000-436x.2020086
Special Issue: 边缘计算
• Topics: Key Technologies of Edge Computing • Previous Articles Next Articles
Yingying LI1,2,Jianfeng MA1,2,Yinbin MIAO1
Revised:
2020-03-26
Online:
2020-04-25
Published:
2020-04-30
Supported by:
CLC Number:
Yingying LI,Jianfeng MA,Yinbin MIAO. Encrypted image retrieval in multi-key settings based on edge computing[J]. Journal on Communications, 2020, 41(4): 14-26.
[1] | LU W J , VARNA A L , SWAMINATHAN A ,et al. Secure image retrieval through feature protection[C]// Proceedings of 34th Internet Conference on Acoustics,Speech and Signal Processing. Piscataway:IEEE Press, 2009: 1533-1536. |
[2] | LU W J , VARNA A L , WU M . Confidentiality-preserving image search:a comparative study between homomorphic encryption and distance-preserving randomization[J]. IEEE Access, 2014(2): 125-141. |
[3] | ZHANG L , JUNG T , LIU K B ,et al. PIC:enable large-scale privacy preserving content-based image search on cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2017,28(11): 3258-3271. |
[4] | XIA Z H , ZHU Y , SUN X M ,et al. Towards privacy-preserving content-based image retrieval in cloud computing[J]. IEEE Transactions on Cloud Computing, 2018,6(1): 276-286. |
[5] | ZHENG P J , HUANG J W . An efficient image homomorphic encryption scheme with small ciphertext expansion[C]// Proceedings of 21st ACM Internet Conference on Multimedia. New York:ACM Press, 2013: 803-812. |
[6] | QIN Z , YAN J B , REN K ,et al. Privacy-preserving outsourcing of image global feature detection[C]// Proceedings of Global Communications Conference. Piscataway:IEEE Press, 2014: 710-715. |
[7] | QIN Z , YAN J B , REN K ,et al. Towards efficient privacy-preserving image feature extraction in cloud computing[C]// Proceedings of Internet Conference on Computational Geometry. Piscataway:IEEE Press, 2014: 497-506. |
[8] | LU W J , SWAMINATHAN A , VARNA A L ,et al. Enabling search over encrypted multimedia databases[C]// Proceedings of IS&T/SPIE Electronic Imaging,International Society for Optics and Photonics. Bellingham:SPIE, 2009:725418. |
[9] | ZHANG Y , ZHOU L , PENG Y F ,et al. A secure image retrieval method based on homomorphic encryption for cloud computing[C]// Proceedings of 19th Internet Conference on Digital Signal Processing. NewYork:ACM Press, 2014: 269-274. |
[10] | XIA Z H , XIONG N N , VASILAKOS A V ,et al. EPCBIR:an efficient and privacy-preserving content-based image retrieval scheme in cloud computing[J]. Information Sciences, 2017,387: 195-204. |
[11] | YUAN J W , YU S C , GUO L K . SEISA:secure and efficient encrypted image search with access control[C]// Proceedings of 34th Internet Conference on Computer Communications. Piscataway:IEEE Press, 2015: 2083-2091. |
[12] | LIANG H H , ZHANG X P , WEI Q H ,et al. Secure image retrieval with multiple keys[J]. Journal of Electronic Imaging, 2018,27(2):023032. |
[13] | SHEN M , CHENG G , ZHU L ,et al. Content-based multi-source encrypted image retrieval in clouds with privacy preservation[J]. Future Generation Computer Systems,,(2018-05-09)[2020-01-06].doi.org/10.1016/j.future.2018.04.089. |
[14] | YIN H , QIN Z , ZHANG J X ,et al. Secure conjunctive multi-keyword search for multiple data owners in cloud computing[C]// Proceedings of 22nd Internet Conference on Parallel and Distributed Systems. New York:ACM Press, 2016: 761-768. |
[15] | SUN W H , YU S C , LOU W J ,et al. Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 1187-1198. |
[16] | MIAO Y B , MA J F , LIU X M ,et al. VKSE-MO:verifiable keyword search over encrypted data in multi-owner settings[J]. Science China Information Sciences, 2017,60(12): 1-15. |
[17] | MIAO Y B , MA J F , LIU X M ,et al. VCKSM:verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings[J]. Pervasive and Mobile Computing, 2017,40: 205-219. |
[18] | 王祥宇, 马建峰, 苗银宾 . 高效隐私保护的多用户图像外包检索方案[J]. 通信学报, 2019,40(2): 31-39. |
WANG X Y , MA J F , MIAO Y B . Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user[J]. Journal on Communications, 2019,40(2): 31-39. | |
[19] | SUN S F , LIU J K , SAKZAD A ,et al. An efficient non-interactive multi-client searchable encryption with support for boolean queries[C]// European Symposium On Research in Computer Security. Berlin:Springer, 2016: 154-172. |
[20] | HAMLIN A , SHELAT A , WEISS M ,et al. Multi-key searchable encryption,revisited[C]// IACR International Workshop on Public Key Cryptography. Berlin:Springer, 2018: 95-124. |
[21] | SHANKAR K , LAKSHMANAPRABU S K , GUPTA D ,et al. Adaptive optimal multi key based encryption for digital image security[J]. Concurrency and Computation:Practice and Experience, 2018:e5122. |
[22] | GALBRAITH S D , PATERSON K G , SMART N P . Pairings for cryptographers[J]. Discrete Applied Mathematics, 2008,156(16): 3113-3121. |
[23] | ATENIESE G , FU K , GREEN M ,et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006,9(1): 1-30. |
[24] | ANDONI A , INDYK P . Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions[C]// Proceedings of 47th Symposium on Foundations of Computer Science. New York:ACM Press, 2006: 459-468. |
[25] | DATAR M , IMMORLICA N , INDYK P ,et al. Locality-sensitive hashing scheme based on p-stable distributions[C]// Proceedings of 20th Symposium on Computational Geometry. New York:ACM Press, 2004: 253-262. |
[26] | DELFS H , KNEBL H , KNEBL H . Introduction to cryptography:principles and applications[M]. Berlin: SpringerPress, 2002. |
[27] | LIU K , GIANNELLA C , KARGUPTA H . An attacker’s view of distance preserving maps for privacy preserving data mining[C]// Proceedings of European Conference Principles of Data Mining and Knowledge Discovery. Berlin:Springer, 2006: 297-308. |
[28] | WONG W K , CHEUNG D W , KAO B ,et al. Secure kNN computation on encrypted databases[C]// Proceedings of 28th Internet Conference on Management of Data. New York:ACM Press, 2009: 139-152. |
[29] | CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 222-233. |
[30] | CHOR B , GOLDREICH O , KUSHILEVITZ E ,et al. Private Information Retrieval[C]// Proceedings of 36th Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 1995: 41-50. |
[31] | WANG J Z , LI J , WIEDERHOLD G . SIMPLlcity:semantics-sensitive integrated matching for picture libraries[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2001,23(9): 947-963. |
[32] | MANJUNATH B S , OHM J R , VASUDEVAN V V ,et al. Color and texture descriptors[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001,11(6): 703-715. |
[1] | Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration [J]. Journal on Communications, 2022, 43(5): 144-154. |
[2] | Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG. Secure and verifiable multi-keyword searchable encryption scheme in cloud [J]. Journal on Communications, 2021, 42(4): 139-149. |
[3] | Ruiqi LI, Chunfu JIA, Yafei WANG. Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application [J]. Journal on Communications, 2021, 42(3): 11-22. |
[4] | Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG. Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain [J]. Journal on Communications, 2021, 42(12): 236-246. |
[5] | Shufen NIU,Wenke LIU,Lixia CHEN,Caifen WANG,Xiaoni DU. Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain [J]. Journal on Communications, 2020, 41(8): 204-214. |
[6] | FENG Chaosheng,LUO Wangping,QIN Zhiguang,YUAN Ding,ZOU Liping. Attribute-based proxy re-encryption scheme with multiple features [J]. Journal on Communications, 2019, 40(6): 177-189. |
[7] | Mang SU,Yan YU,Bin WU,Anmin FU. Research on the programming language for proxy re-encryption [J]. Journal on Communications, 2018, 39(6): 89-97. |
[8] | Mang SU,Guozhen SHI,Anmin FU,Yan YU,Wei JIN. Proxy re-encryption based multi-factor access control scheme in cloud [J]. Journal on Communications, 2018, 39(2): 96-104. |
[9] | En ZHANG,Yaoyao PEI,Jiao DU. RLWE-based ciphertext-policy attribute proxy re-encryption [J]. Journal on Communications, 2018, 39(11): 129-137. |
[10] | Ju-yan LI,Chun-guang MA,Qian ZHAO. Resplittable threshold multi-broker proxy re-encryption scheme from lattices [J]. Journal on Communications, 2017, 38(5): 157-164. |
[11] | En-tao LUO,Guo-jun WANG,Shu-hong CHEN,Khan-butt PINIAL. Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks [J]. Journal on Communications, 2017, 38(10): 81-93. |
[12] | Wei GUO,Xue-guang ZHOU,Cheng-qin QU,Fang LUO,Xiang-jun JI. Naval fleet across-domain communication scheme based on CP-ABE [J]. Journal on Communications, 2015, 36(Z1): 250-258. |
[13] | . Multi-element based on proxy re-encryption scheme for mobile cloud computing [J]. Journal on Communications, 2015, 36(11): 73-79. |
[14] | . Efficient chosen-ciphertext secure proxy re-encryption scheme [J]. Journal on Communications, 2013, 34(7): 10-97. |
[15] | Wei-wei ZHANG,Ru ZHANG,Jian-yi LIU,Xin-xin NIU,Yi-xian YANG. Efficient chosen-ciphertext secure proxy re-encryption scheme [J]. Journal on Communications, 2013, 34(7): 87-97. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|