J4 ›› 2014, Vol. 41 ›› Issue (2): 151-158.doi: 10.3969/j.issn.1001-2400.2014.02.025

• 研究论文 • 上一篇    下一篇

云计算环境下加密图像检索

朱旭东1;李晖2;郭祯2   

  1. (1. 西安建筑科技大学 信息与控制工程学院,陕西 西安  710055;
    2. 西安电子科技大学 通信工程学院,陕西 西安  710071)
  • 收稿日期:2012-11-12 出版日期:2014-04-20 发布日期:2014-05-30
  • 通讯作者: 朱旭东
  • 作者简介:朱旭东(1973-),男,讲师,博士,E-mail: zhudongxu@vip.sina.com.
  • 基金资助:

    国家科技重大专项资助项目(2012ZX03002003);国家自然科学基金资助项目(61272457);陕西省教育厅科学研究资助项目(12JK0725);中央高校基本业务费资助项目(K50511010001)

Privacy-preserving query over the encrypted image in cloud computing

ZHU Xudong1;LI Hui2;GUO Zhen2   

  1. (1. School of Information and Control Engineering, Xi'an Univ. of Architecture & Technology, Xi'an  710055, China;
    2. School of Telecommunication Engineering, Xidian Univ., Xi'an  710071, China)
  • Received:2012-11-12 Online:2014-04-20 Published:2014-05-30
  • Contact: ZHU Xudong

摘要:

公共云存储服务为企业海量多媒体数据提供了廉价的存储空间和多种多样的访问方法.但考虑到隐私安全问题,企业多媒体数据必须加密存储在云端,然而目前的大多数加密体制都不支持在加密多媒体数据上直接运算,因此,如何有效地管理和检索密文数据成为具有挑战性的问题.针对云计算环境下加密图像检索问题,首先给出了其形式化定义以及隐私安全要求;然后提出了一种基于安全相似度运算的隐私保护检索方案.该方案预先构建描述加密图像内容的基于内容的索引,再通过安全相似度运算检索加密图像.安全分析和性能评估证明该方案是IND-CCA安全的,并能有效地实现对加密图像检索.

关键词: 云计算, 基于内容的图像检索, 隐私保护, 可搜索加密

Abstract:

In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. For the consideration of users' privacy, sensitive images have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. In this paper, firstly, we define the problem of privacy-preserving query over encrypted images in cloud computing. And to solve the problem, we design a computable encryption scheme based on vector and matrix calculations. The scheme pre-builds a feature-based index to provide feature-related information about each encrypted image, and then chooses the efficient image similarity measure as the pruning tool to carry out the retrieval procedure. Security analysis and performance evaluation show that the scheme is IND-CCA.

Key words: cloud computing, content based image retrieval, privacy-preserving, searchable search encryption

中图分类号: 

  • TP391