A Trinity Approach for Secure Image Access and Retrieval in Cloud
نویسنده
چکیده
Images plays an important role in human’s day to day life and it consumes much more space for storage rather than other formats. Hence, the need for cloud storage outsourcing arises. The Privacy of user and transfer of images in the network is the main concern. For privacy-preservation purposes, sensitive images, such as medical and personal images are needed to be encrypted before outsourcing, which makes the CBIR technique on plaintext realm to be inoperative. To ensure user privacy, a keyword based technique is introduced to provide individuality for the users. User validation for accessing their images from the cloud is provided by generating an OTP. The cryptography and segmentation techniques are upholding image security during transfer. Additionally, the illicit publication of user images is recognized with the help of watermark extraction. Keyword: User Keyword, One Time Password (OTP), AES 128 bit Encryption/Decryption, Watermark, Segmentation, Least Significant Bit (LSB) Steganography, and Locality Sensitive Hashing (LSH).
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملبازیابی اطلاعات تصویری حوزهی سلامت در وب از دیدگاه متخصصان علوم پزشکی:یک مطالعه کیفی
Introduction: The medical image as a source of non-textual information has an important role in the field of medicine. Since the quality of life is directly related to health, employing this type of information is effective in improving the practice of health professionals. This study was aimed to survey medical image retrieval in the Web from the perspective of experts in medical sciences. M...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017