Abstract
The increasing production and processing of image data, especially in remote sensing applications, has raised concerns regarding image security, privacy, and efficient retrieval as it is most widely used in sensitive applications. In this article, to address these challenges, a novel privacy-preserving content-based image retrieval (PPCBIR) system has been proposed that leverages a trusted edge computing layer that performs image encryption and feature extraction tasks, reducing the processing overload on user devices and bolstering system efficiency. Feature extraction harnesses the MobileNetV2 deep learning model, which enables the extraction of intricate visual features, enhancing image retrieval accuracy in the presence of high inter-class similarity in the dataset. Furthermore, the system has been deployed in a distributed storage environment, ensuring image availability even during server outages. The proposed system also incorporates trusted third-party auditing (TPA) as a means to verify the integrity of images during the storage and retrieval processes. The presence of TPA plays a crucial role in maintaining the reliability and trustworthiness of the stored images. The proposed system achieves a high mean Average Precision (mAP) of 0.889, surpassing existing PPCBIR systems. Overall, the system prioritizes image retrieval performance, privacy, availability, and integrity, making it suitable for processing remote sensing image data efficiently and securely.
Similar content being viewed by others
Data availability
All publicly available datasets have been utilized for this work.
References
Bai L (2006) A Reliable (k, n) Image secret sharing scheme.2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, IN, USA. pp 31-36. 10.1109/ DASC.2006
Bhavyasree V, Yalla P (2021) Public auditing to provide privacy preservation of cloud data using ring signatures. 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 1154–1160. https://doi.org/10.1109/I-SMAC52330.2021.9640805
Chakraborty S, Singh S, Thokchom S (2018) Integrity checking using third party auditor in cloud storage. 2018 Eleventh International Conference on Contemporary Computing (IC3), Noida, India, pp 1–6. https://doi.org/10.1109/IC3.2018.8530649
Garg N, Nehra A, Baza M, Kumar N (2023) Secure and efficient data integrity verification scheme for cloud data storage. 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 1-6, https://doi.org/10.1109/CCNC51644.2023.10059690
Hou D, Miao Z, Xing H et al (2020) Exploiting low dimensional features from the MobileNets for remote sensing image retrieval. Earth Sci Inform 13:1437–1443. https://doi.org/10.1007/s12145-020-00484-3
Kapoor R, Sharma D, Gulati T (2021) State of the art content based image retrieval techniques using deep learning: a survey. Multimed Tools Appl 80:29561–29583. https://doi.org/10.1007/s11042-021-11045-1
Kumar S, Kumar D, Lamkuche HS (2021) TPA auditing to enhance the privacy and security in cloud systems. JCSANDM 10(3):537–568
Kumar A, Jones R, Joshi P (2017) Survey of cryptographic hashing algorithms for message signing. In IJCST, 8(2)
Li J-S, Liu I-H, Tsai C-J, Su Z-Y, Li C-F, Liu C-G (2020) Secure content-based image retrieval in the cloud with key confidentiality. IEEE Access 8:114940–114952. https://doi.org/10.1109/ACCESS.2020.3003928
Mingchang W, Zhang X, Niu X, Wang F, Zhang X (2019) Scene classification of high-resolution remotely sensed image based on ResNet. J Geovis Spat Anal. 3:16. https://doi.org/10.1007/s41651-019-0039-9
Pérez J, Díaz J, Berrocal J et al (2022) Edge computing. Computing 104:2711–2747. https://doi.org/10.1007/s00607-022-01104-2
Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-Preserving image processing in the cloud. IEEE Cloud Comput 5(2):48–57. https://doi.org/10.1109/MCC.2018.022171667
Qin Z, Yan J, Ren K, Chen CW, Wang C (2014) Towards efficient privacy-preserving image feature extraction in cloud computing. In: Proceedings of the 22nd ACM International Conference on Multimedia pp 497–506
Rajath AN, Vidyalakshmi K, Keshava Murthy GN (2023) A comprehensive analysis on deep learning based image retrieval. 2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC), Dharwad, India, pp 1–4. https://doi.org/10.1109/ICAISC58445.2023.10200622
Sengar SS, Kumar S (2022) Content-based secure image retrieval in an untrusted third party environment. EasyChair Preprint 9037
Shafique A, Hazzazi MM, Alharbi AR, Hussain I (2021) Integration of spatial and frequency domain encryption for digital images. IEEE Access 9:149943–149954. https://doi.org/10.1109/ACCESS.2021.3125961
Sunitha T, Sivarani TS (2021) An efficient content-based satellite image retrieval system for big data utilizing threshold based checking method. Earth Sci Inform 14:1847–1859. https://doi.org/10.1007/s12145-021-00629-y
Tanwar VK, Rajput AS, Raman B, Bhargava R (2018) Privacy preserving image scaling using 2D bicubic interpolation over the cloud. 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, pp 2073–2078. https://doi.org/10.1109/SMC.2018.00357
Tanwar VK, Raman B, Rajput AS, Bhargava R (2022) SecureDL: A privacy preserving deep learning model for image recognition over cloud. J Vis Commun Image Represent 86:103503
Wen L, Cheng Y, Fang Y, Li X (2023) A comprehensive survey of oriented object detection in remote sensing images. Expert Syst Appl 224:119960. https://doi.org/10.1016/j.eswa.2023.119960
Wentao W, Zhou T, Qin J, Xiang X, Tan Y, Cai Z (2022) A privacy-preserving content-based image retrieval method based on deep learning in cloud computing. Expert Syst Appl 203:117508. https://doi.org/10.1016/j.eswa.2022.117508
Xia Z, Wang L, Tang J, Xiong NN, Weng J (2021) A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing. In: IEEE Transactions on Network Science and Engineering, 8, (1):318–330. https://doi.org/10.1109/TNSE.2020.3038218
Zhang J, Zhou Q, Shen X et al (2019) Cloud detection in high-resolution remote sensing images using multi-features of ground objects. J Geovis Spat Anal 3:14. https://doi.org/10.1007/s41651-019-0037-y
Zhang C, Zhu L, Zhang S, Yu W (2020) TDHPPIR: An efficient deep hashing based privacy-preserving image retrieval method. Neurocomputing 406:386–398. https://doi.org/10.1016/j.neucom.2019.11.119
Zhou F, Qin S, Hou R, Zhang Z (2022) Privacy-preserving image retrieval in a distributed environment. Int J Intell Syst 37:7478–7501. https://doi.org/10.1002/int.22890
Funding
No funding was received for this work.
Author information
Authors and Affiliations
Contributions
Conceptualization: Vetriselvi V, Ajitesh M, Deekshith M, Arun Amaithi Rajan, Hemanth D;
Methodology and Development: Ajitesh M, Deekshith M, Hemanth D;
Formal analysis and investigation: Ajitesh M, Deekshith M, Hemanth D;
Writing - original draft preparation: Ajitesh M, Deekshith M, Arun Amaithi Rajan, Hemanth D;
Writing - review and editing: Deekshith M, Ajitesh M, Arun Amaithi Rajan, Vetriselvi V;
Supervision: Vetriselvi V.
Corresponding author
Ethics declarations
Competing interest
The authors declare no competing interests.
Additional information
Communicated by: H. Babaie
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
M, A., M, D., Amaithi Rajan, A. et al. EdgeShield: Attack resistant secure and privacy-aware remote sensing image retrieval system for military and geological applications using edge computing. Earth Sci Inform (2024). https://doi.org/10.1007/s12145-024-01256-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12145-024-01256-z