4.8 Article

Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 4, Pages 3104-3113

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2964412

Keywords

Collective matrix factorization (CMF); homomorphic encryption (HE); locality-sensitive hashing (LSH); secure cross-modal retrieval (SCMR)

Funding

  1. National Science Foundation of China [61501080, 61871064, 61877007]
  2. Fundamental Research Funds for the Central Universities [DUT19JC08]
  3. Guangxi Key Laboratory of Trusted Software [kx201903]
  4. Cloud Technology Endowed Professorship
  5. National Science Foundation Centers of Research Excellence in Science and Technology (CREST) [HRD-1736209]

Ask authors/readers for more resources

Significant volume of information of a broad variety (or modalities, such as image, audio, video, and text) is sensed and collected [such as those by the Internet of Things (IoT) devices] regularly (e.g., hourly). Such information is then analyzed to inform decision making, such as clinical diagnosis and product recommendation. Data with different representations may have the same semantic information, and there have been considerable efforts devoted to designing efficient searching approaches on objects with different modalities. However, multimodal data carry sensitive information, and maintaining privacy is crucial in our privacy-aware and interconnected society. In this article, we combine both the collective matrix factorization (CMF) and homomorphic encryption (HE) to construct an efficient and accurate scheme to facilitate cross-modal retrieval, without the loss of any sensitive information. Our scheme identifies the unified feature vectors for every object in the training set with different modalities and obtains the mapping matrices for out-of-sample objects. After the encryption process, these matrices are stored on the remote cloud server (CS). Hence, the server can calculate the secure, unified features for any query. In this article, we also built a privacy-preserving index structure using locality-sensitive hashing (LSH), which provides both security and efficiency. Performance evaluations demonstrate the potential for our proposed scheme in the real-world IoT applications.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available