4.8 Article

VerFHS: Verifiable Image Retrieval on Forward Privacy in Blockchain-Enabled IoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds

Hua Zhang et al.

Summary: In this article, a scalable fuzzy keyword ranked search scheme over encrypted data under hybrid clouds architecture is proposed. The similarity of keywords is measured using the edit distance, and an edit distance algorithm over encrypted data is designed to achieve fuzzy keyword search with a constant storage size and accurate results for any similarity threshold. Furthermore, a two-factor ranking function combining keyword weight with keyword morphology similarity is designed to enhance system usability. Extensive experiments are performed to demonstrate the trade-off of efficiency and security of the proposed scheme.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things

Lin Song et al.

Summary: Encrypted image retrieval is a promising technique in the cloud-assisted Internet of Things (IoT) environment for data confidentiality and searchability. However, existing image retrieval solutions often have low efficiency and leak similarity score values and orders to the cloud server. To address these challenges, we propose a privacy-preserving threshold-based image retrieval scheme using a convolutional neural network (CNN) model and a secure k-nearest neighbor (kNN) algorithm. Our proposed scheme improves retrieval efficiency and prevents the cloud server from learning similarity score values and orders. Formal security analysis shows that our scheme can resist ciphertext-only attack (COA) and chosen-plaintext attack (CPA), and extensive experiments demonstrate its efficiency and feasibility for real-world datasets.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data

Yandong Zheng et al.

Summary: This article proposes a new efficient and privacy-preserving exact set similarity search scheme under a single cloud server. By designing a symmetric-key predicate encryption (SPE-Sim) scheme and employing B+ tree-based index, the scheme achieves efficient set similarity search while preserving the privacy of data.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing

Jiayi Li et al.

Summary: Ranked keyword search has gained traction due to its flexibility and accessibility, but existing schemes ignore the semantic associations between documents and queries. In this paper, a Semantic-aware Ranked Multi-keyword Search (SRMS) scheme is proposed, utilizing LDA topic model and CRT-based secret sharing mechanism. A verification mechanism is implemented to ensure the correctness and completeness of search results. Security analysis proves the security of SRMS and the extended result verification mechanisms. Extensive experiments using real-world dataset demonstrate the efficiency and practicality of SRMS.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search

Qin Liu et al.

Summary: This article presents a prime inner product encoding (PIPE) scheme for efficient and accurate multi-keyword fuzzy search. By encoding keywords into vectors filled with primes or reciprocals of primes, the scheme achieves effective search results based on the inner product of vectors.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data

Xuelong Dai et al.

Summary: This article presents a privacy-preserving searchable encryption scheme based on the LDA topic model and the query likelihood model. By extracting feature keywords and using the query likelihood model, the scheme achieves more accurate semantic-aware keyword search.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

Similarity Search for Encrypted Images in Secure Cloud Computing

Yingying Li et al.

Summary: The article presents a method SEI for similarity search of encrypted images in secure cloud computing. It improves search accuracy and efficiency by using feature descriptors extracted by the CNN model, constructing an encrypted hierarchical index tree, and proposing a limited key-leakage kNN algorithm to protect privacy. The SEI is extended to prevent exposure of search information to the cloud server and has been proven to protect image and key privacy.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Automation & Control Systems

A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images

Cheng Guo et al.

Summary: Medical imaging plays a crucial role in medical diagnosis, and ensuring the security and privacy of medical images is essential. This paper proposes a secure and efficient scheme for finding the exact nearest neighbor over encrypted medical images, demonstrating its utility in Healthcare Industry 4.0.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing

Yingying Li et al.

Summary: This study proposes a secure and verifiable multikey image search (SVMIS) scheme in cloud-assisted edge computing, which utilizes a pretrained convolutional neural network model to improve search accuracy, designs a key distribution protocol to support multikey setting in edge computing, and uses a learning with errors based secure k-nearest neighbor algorithm to encrypt feature vectors, and a Merkle hash tree to check the correctness of search results returned by edge servers.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Hardware & Architecture

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency

Xiangfu Song et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Multi-Keyword Top-k Similarity Search Over Encrypted Data

Xiaofeng Ding et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Automation & Control Systems

Blockchain-Enabled Data Collection and Sharing for Industrial IoT With Deep Reinforcement Learning

Chi Harold Liu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Hardware & Architecture

Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things

Ke Zhang et al.

IEEE NETWORK (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key

Xiangyu Wang et al.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019) (2019)

Proceedings Paper Computer Science, Information Systems

ImageProof: Enabling Authentication for Large-Scale Image Retrieval

Shangwei Guo et al.

2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019) (2019)

Article Engineering, Electrical & Electronic

Dynamic searchable encryption with privacy protection for cloud computing

Selasi Kwame Ocansey et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

Path ORAM: An Extremely Simple Oblivious RAM Protocol

Emil Stefanov et al.

JOURNAL OF THE ACM (2018)

Article Computer Science, Information Systems

Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds

Hongwei Li et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2018)

Article Computer Science, Information Systems

Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing

Zhihua Xia et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Article Computer Science, Theory & Methods

PIC: Enable Large-Scale Privacy Preserving Content-Based Image Search on Cloud

Lan Zhang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2017)

Article Computer Science, Information Systems

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing

Zhihua Xia et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Theory & Methods

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Zhihua Xia et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

Hongwei Li et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2015)

Article Optics

Commutative watermarking and encryption for media data

Shiguo Lian et al.

OPTICAL ENGINEERING (2006)

Review Computer Science, Artificial Intelligence

Content-based image retrieval at the end of the early years

AWM Smeulders et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2000)