Efficient encrypted image retrieval in IoT-cloud with multi-user authentication

Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. A number of techniques for searching encrypted data have been devised. However, certain security solutions may not be used in smart devices in IoT-cloud beca...

Full description

Bibliographic Details
Main Authors: Mustafa A Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Ayad Ibrahim, Zaid Alaa Hussien, Keyan Abdul-Aziz Mutlaq, Mohammed Abdulridha Hussain
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2018-02-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147718761814
Description
Summary:Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. A number of techniques for searching encrypted data have been devised. However, certain security solutions may not be used in smart devices in IoT-cloud because such solutions are not lightweight. In this article, we present a lightweight scheme that can enable a content-based search through encrypted images. In particular, images are represented using local features. We develop and validate a secure scheme for measuring the Euclidean distance between two feature vectors. In addition, we use a hashing method, namely, locality-sensitive hashing, to devise the searchable index. The use of an locality-sensitive hashing index increases the proficiency and effectiveness of a system, thereby allowing the retrieval of only relevant images with a minimum number of distance evaluations. Refining vector techniques are used to refine relevant results efficiently and securely. Our index construction process ensures that stored data and trapdoors are kept private. Our system also efficiently supports multi-user authentication by avoiding the expensive traditional method, which enables data owners to define who can search for a specific image. Compared with other similarity-based encryption methods predicated upon searchability, the option presented in this study offers superior search speed and storage efficiency.
ISSN:1550-1477