Abstract
With the development of cloud computing, outsourcing storage-more and more people of all ages. Powerful cloud Server provides customers with a great deal of storage space. In order to protect privacy of outsourcing information, customer information must be encrypted, and redaction. However, it is difficult to search for information in the encrypted file. In this paper, we study the encrypted image retrieval technique of outsourcing. An image retrieval based on content encryption scheme is proposed. In this scenario, using blind method based on discrete logarithm problem of eigenvectors to maintain confidentiality and a clever retrieval method is used. This is a dynamic programme, support a fuzzy search. Clients can control the search. During the search, the original image does not leak.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Kuala Lumpur, Malaysia, 22–23 June, 2010, pp. 380–383 (2010)
Ateniese, G., Dagdelen, Ö., Damgård, I., Venturi, D.: Entangled cloud storage. Future Gen. Comput. Syst. 62, 104–118 (2016)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May, pp. 44–55, Springer-Verlag (2000)
Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 442–455, Springer (2005)
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 Oct–3 Nov 2006, pp. 79–88 (2006)
Yee, K., Swearingen, K., Li, K., Hearst, M.A.: Faceted metadata for image search and browsing. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, CHI 2003, Ft. Lauderdale, Florida, USA, 5–10 Apr 2003, pp. 401–408 (2003)
Jing, Y., Baluja, S.: Visualrank: applying pagerank to large-scale image search. IEEE Trans. Pattern Anal. Mach. Intell. 30(11), 1877–1890 (2008)
Esposito, C., Castiglione, A., Martini, B., Choo, K.K.R.: Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput. 3(4), 16–22 (2016)
Azfar, A., Choo, K.-K.R., Liu, L.: Android mobile VoIP apps: a survey and examination of their security and privacy. Electron. Commer. Res. 16(1), 73–111 (2016)
Choo, K.-K.R., Rokach, L., Bettini, C.: Mobile security and privacy: advances, challenges and future research directions. Pervasive Mob. Comput. 32, 1–2 (2016)
Li, L., Lu, R., Choo, K.-K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)
Choo, K.-K.R., Sarre, R.: Balancing privacy with legitimate surveillance and lawful data access. IEEE Cloud Comput. 2(4), 8–13 (2015)
Acknowledgment
The authors of this paper are members of Shanghai Engineering Research Center of Intelligent Video Surveillance. This work was supported in part the National Natural Science Foundation of China under Grant 61300202, 61332018, 61403084. Our research was sponsored by Program of Science and Technology Commission of Shanghai Municipality (No. 15530701300, 15XD15202000, 16511101700), in part by the technical research program of Chinese ministry of public security (2015JSYJB26).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Gao, P., Ye, J. (2018). Cloud Based Image Retrieval Scheme Using Feature Vector. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-67071-3_3
Published:
Publisher Name: Edizioni della Normale, Cham
Print ISBN: 978-3-319-67070-6
Online ISBN: 978-3-319-67071-3
eBook Packages: EngineeringEngineering (R0)