首页 | 官方网站   微博 | 高级检索  
     

基于访问控制安全高效的多用户外包图像检索方案
作者姓名:宋甫元  秦拯  张吉昕  刘羽
作者单位:1. 湖南大学信息科学与工程学院,湖南 长沙 410082;2. 湖北工业大学计算机学院,湖北 武汉 430068
基金项目:国家自然科学基金(61772191);国家自然科学基金(61902123);国家自然科学基金(62002112);国家自然科学基金(62002106);长沙市科技计划项目(kq2004025);长沙市科技计划项目(kq2004027);湖南省科技计划重点资助项目(2015TP1004);湖南省科技计划重点资助项目(2018TP1009);湖南省科技计划重点资助项目(2020JJ5085);湖南省科技计划重点资助项目(2018TP3001)
摘    要:由于公有云不是可信的实体,通过公有云提供图像检索服务时,它可能会窃取图像数据的敏感信息。近年来,密文图像检索方法被提出,用于保护图像隐私。然而,传统的隐私保护图像检索方案搜索效率较低,且无法支持多用户场景。因此,提出一种基于访问控制安全高效的多用户外包图像检索方案。该方案采用一次一密和矩阵变换方法,实现基于欧几里得距离(简称欧氏距离)相似性的密文图像检索,并利用矩阵分解和代理重加密,实现多用户外包图像检索。采用局部敏感哈希算法构建索引,提高密文图像检索效率。特别地,提出一种基于角色多项式函数的轻量级访问控制策略,该策略能够灵活设定图像访问权限,防止恶意用户窃取隐私信息。安全性分析论证了所提方案能够保护图像和查询请求的机密性;实验结果表明所提方案能够达到高效的图像检索。

关 键 词:图像检索  可搜索加密  隐私保护  访问控制  

Efficient and secure multi-user outsourced image retrieval scheme with access control
Authors:Fuyuan SONG  Zheng QIN  Jixin ZHANG  Yu LIU
Affiliation:1. College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China;2. School of Computer Science, Hubei University of Technology, Wuhan 430068, China
Abstract:In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.
Keywords:image retrieval  searchable encryption  privacy-preserving  access control  
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号