• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Song, Lin (Song, Lin.) [1] | Miao, Yinbin (Miao, Yinbin.) [2] | Weng, Jian (Weng, Jian.) [3] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Deng, Robert H. (Deng, Robert H..) [6]

Indexed by:

EI

Abstract:

Encrypted image retrieval is a promising technique for achieving data confidentiality and searchability the in cloud-assisted Internet of Things (IoT) environment. However, most of the existing top- k ranked image retrieval solutions have low retrieval efficiency and may leak the values and orders of similarity scores to the cloud server. Hence, if a malicious server learns user background information through some improper means, then the malicious server can potentially infer user preferences and guess the most similar image content according to similarity scores. To solve the above challenges, we propose a privacy-preserving threshold-based image retrieval scheme using the convolutional neural network (CNN) model and a secure k -nearest neighbor (kNN) algorithm, which improves the retrieval efficiency and prevents the cloud server from learning the values and orders of similarity scores. Formal security analysis shows that our proposed scheme can resist both ciphertext-only attack (COA) and chosen-plaintext attack (CPA), and extensive experiments demonstrate that our proposed scheme is efficient and feasible for real-world data sets. © 2014 IEEE.

Keyword:

Cloud computing Cloud data security Efficiency Image enhancement Image retrieval Internet of things Nearest neighbor search Neural networks Privacy-preserving techniques

Community:

  • [ 1 ] [Song, Lin]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 2 ] [Song, Lin]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 3 ] [Miao, Yinbin]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 4 ] [Miao, Yinbin]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 5 ] [Weng, Jian]Jinan University, College of Cyber Security, Guangzhou; 510632, China
  • [ 6 ] [Choo, Kim-Kwang Raymond]The University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio; TX; 78249, United States
  • [ 7 ] [Liu, Ximeng]College of Mathematics and Computer Science, Fuzhou University, Key Laboratory of Information Security of Network Systems, Fuzhou; 350108, China
  • [ 8 ] [Deng, Robert H.]Singapore Management University, School of Information Systems, 178902, Singapore

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Internet of Things Journal

Year: 2022

Issue: 15

Volume: 9

Page: 13598-13611

1 0 . 6

JCR@2022

8 . 2 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 34

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Affiliated Colleges:

Online/Total:134/10058883
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1