4.7 Article

Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings

Journal

IEEE TRANSACTIONS ON CLOUD COMPUTING
Volume 10, Issue 4, Pages 2936-2948

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2020.3034232

Keywords

Image search; multi-user settings; polynomial-based access strategy; proxy re-encryption; watermark

Funding

  1. NSFC [U1405255]
  2. National Natural Science Foundation of China [62072361, 61972094]
  3. Fundamental Research Funds for the Central Universities [JB191506]
  4. Shaanxi Science and Technology Coordination and Innovation Project [2016KTZDGY05-06]
  5. National Natural Science Foundation of Shaanxi Province [2019JQ-005]
  6. China Postdoctoral Science Foundation Funded Project [2017M613080]
  7. Guangxi KeyLaboratory of Cryptography and Information Security [GCIS201917]
  8. Peng Cheng Laboratory Project of Guangdong Province [PCL2018KP004]
  9. Key R&D Program of Shaanxi Province [2019ZDLGY12-04]
  10. Key Research and Development Plan of Jiangxi Province [20181ACE5002]

Ask authors/readers for more resources

This article introduces a new controllable encrypted cloud image search scheme and demonstrates its efficiency and high accuracy through empirical experiments.
With the advent of cloud computing, explosively increasing images are gradually outsourced to the cloud server for costs saving and feasibility. For security and privacy concerns, images (e.g., medical diagnosis, personal photos) should be encrypted before being outsourced. However, traditional encrypted image retrieval techniques still suffer from costly access control and low search accuracy. To solve these challenging issues, in this article, we first propose a Controllable encrypted cloud image Search scheme in Multi-user settings (namely CSM) by using the polynomial-based access strategy and proxy re-encryption technique. CSM achieves efficient access control and avoids heavy communication overhead caused by key transmission. Then, we improve the basic CSM to achieve malicious search user Tracing (namely TCSM) by utilizing the watermark technique, which can further prevent search users from illegally redistributing retrieved images to unauthorized search users. Our formal security analysis proves that our CSM (or TCSM) can guarantee the privacy of images, indexes, and search queries. Our empirical experiments using real-world datasets demonstrate the efficiency and high accuracy of our CSM (or TCSM) in practice.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available