Secure Image Retrieval over Untrusted Cloud Servers
نویسنده
چکیده
140 Abstract-Security issue represents the main barrier facing the wide adoption of cloud computing. Encryption is the best method to mitigate users' concerns. However, this method makes searching the encrypted data a challenging task. Accordingly, several approaches have been proposed to enable searching the encrypted, remotely stored data without decryption. Till now, almost all these approaches are limited to handle text search but not multimedia search. In this paper, we propose an efficient scheme that provides content based search over encrypted image database. To do so, we utilize a locality sensitive hashing LSH method to build our searchable index. LSH index greatly enhances the system efficiency by returning the matching images in a ranked order with a minimum number of distance evaluations. For security purposes, we turn this index into a secure index to prevent the cloud server from learning any useful information from the contents of that index. Searchable index along with image collection are outsourced to the cloud server in their encrypted format. We provide several empirical experiments to illustrate the efficiency of our proposed scheme.
منابع مشابه
A secure online image trading system for untrusted cloud environments
In conventional image trading systems, images are usually stored unprotected on a server, rendering them vulnerable to untrusted server providers and malicious intruders. This paper proposes a conceptual image trading framework that enables secure storage and retrieval over Internet services. The process involves three parties: an image publisher, a server provider, and an image buyer. The aim ...
متن کاملA Distributed Framework for Scalable Search over Encrypted Documents
Nowadays, huge amount of documents are increasingly transferred to the remote servers due to the appealing features of cloud computing. On the other hand, privacy and security of the sensitive information in untrusted cloud environment is a big concern. To alleviate such concerns, encryption of sensitive data before its transfer to the cloud has become an important risk mitigation option. Encry...
متن کاملA Secure and Efficient Erasure Code-based Content Transmission in Cloud Using Cp-abe Approach
-In cloud the retention of retrieval data transmission which contain collection of storage servers to enable expanded storage services .Transmission of content in cloud causes data robustness and data confidentiality .For data robustness implementation of erasure code-based content with multiple key servers are concerned for the recovery process using redundancy. For data confidentiality implem...
متن کاملID-Based Cryptography for Secure Cloud Data Storage
This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it of...
متن کاملReview of " Achieving Secure , Scalable , and Fine - grained Data Access Control in Cloud Computing
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013