Skip to main content
Log in

Privacy-preserving content-based image retrieval in edge environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Traditional centralized cloud services face challenges, such as high communication delay, single point of failure, etc. Edge computing is one of distributed computing services in which resources are placed closer to users, and thus is more robust and can reduce communication delay. Although outsourcing data to the edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users’ data privacy, a privacy-preserving content-based image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge environment and the requirement of lightweight computing, we design a secure interaction protocol completed through the collaborative cooperation of two or more edge servers. This scheme not only protects data privacy, but also has low communication overhead and delay as well as low computing complexity, therefore it is more suitable for edge computing environment. Theoretical analysis and experiments show that our scheme has high security, retrieval accuracy and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

The datasets that support the finding of this paper, i.e., Corel1K, Corel10K and GHIM20, are publicly available datasets, which can be obtained for scientific research and are available in the http://wang.ist.psu.edu/docs/related.shtml, http://www.ci.gxnu.edu.cn/cbir/Dataset.aspx.

References

  1. Jo, K., Kim, J., Kim, D., Jang, C., Sunwoo, M.: Development of autonomous car - Part II: a case study on the implementation of an autonomous driving system based on distributed architecture. IEEE Trans. Ind. Electron. 62, 5119–5132 (2015)

    Article  Google Scholar 

  2. Barman, S., Shum, H.P.H., Chattopadhyay, S., Samanta, D.: A secure authentication protocol for multi-server-based E-healthcare using a fuzzy commitment scheme. IEEE Access. 7, 12557–12574 (2019)

    Article  Google Scholar 

  3. Yan, Z., Xue, J., Chen, C.W.: Prius: hybrid edge cloud and client adaptation for HTTP adaptive streaming in cellular networks. IEEE Trans. Circuits Syst. Video Technol. 27, 209–222 (2017)

    Article  Google Scholar 

  4. Smeulders, A.W.M., Worring, M., Santini, S., Gupta, A., Jain, R.: Content-based image retrieval at the end of the early years. IEEE Trans. Pattern Anal. Mach. Intell. 22, 1349–1380 (2000)

    Article  Google Scholar 

  5. Xu, Y., Gong, J., Xiong, L., Xu, Z., Wang, J., Shi, Y.: A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43, 164–172 (2017)

    Article  Google Scholar 

  6. Gong, J., Xu, Y., Zhao, X.: A Privacy-preserving Image retrieval method based on improved BoVW model in cloud environment. IETE Tech. Rev. 35, 1–9 (2018)

    Article  Google Scholar 

  7. Lu, W., Varna, A.L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: Proceedings of the ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pp. 1533–1536 (2009)

  8. Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21, 4593–4607 (2012)

    Article  MathSciNet  Google Scholar 

  9. Zhang, Y., Zhuo, L., Peng, Y., Zhang, J.: A secure image retrieval method based on homomorphic encryption for cloud computing. In: Proceedings of the International Conference on Digital Signal Processing, DSP, pp. 269–274 (2014)

  10. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science. pp. 41–50 (1995)

  11. Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of the Annual Symposium Foundation of Computer Science. pp. 364–373 (1997)

  12. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)

    Article  MathSciNet  Google Scholar 

  13. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 44–55 (2000)

  14. Boneh, D., Crescenzo, G. Di, Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of the Advances in Cryptology - EUROCRYPT. , pp. 506–522 (2004)

  15. Swaminathan, A., Mao, Y., Su, G.M., Gou, H., Varna, A.L., He, S., Wu, M., Oard, D.W.: Confidentiality-preserving rank-ordered search. In: StorageSS’07 - Proceedings of the 2007 ACM Workshop on Storage Security and Survivability. pp. 7–12 (2007)

  16. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings - International Conference on Distributed Computing Systems. pp. 253–262. (2010)

  17. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27, 340–352 (2016)

    Article  Google Scholar 

  18. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98, 190–200 (2015)

    Article  Google Scholar 

  19. Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling search over encrypted multimedia databases. In: Proceedings of the SPIE Int Soc Opt Eng, San Jose, CA, USA, vol. 7254, pp. 725418, January 19–21 (2009)

  20. Nalini Sujantha Bel, K., Shatheesh Sam, I.: LSB Elimination based feature extraction for outsourced image retrieval in encrypted images. In: Proceedings of the International Conference on Trends in Electronics and Informatics, ICOEI 2019. 2019-April, pp. 130–135 (2019)

  21. Iida, K., Kiya, H.: A privacy-preserving content-based image retrieval scheme allowing mixed use of encrypted and plain images. In: Proceedings of the 2020 Asia-Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. APSIPA ASC 2020, pp. 1436–1441 (2020)

  22. Xia, Z., Wang, L., Tang, J., Xiong, N.N., Weng, J.: A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing. IEEE Trans. Netw. Sci. Eng. 8, 318–330 (2021)

    Article  MathSciNet  Google Scholar 

  23. Wang, H., Xia, Z., Fei, J., Xiao, F.: An AES-based secure image retrieval scheme using random mapping and BOW in cloud computing. IEEE Access. 8, 61138–61147 (2020)

    Article  Google Scholar 

  24. Gu, Q., Xia, Z., Sun, X.: MSPPIR: multi-source privacy-preserving image retrieval in cloud computing (2020)

  25. Xia, Z., Xiong, N.N., Vasilakos, A.V., Sun, X.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. (NY) 387, 195–204 (2017)

    Article  Google Scholar 

  26. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2017)

    Article  Google Scholar 

  27. Kai, H., Ming, X., Fu, S., Wang, D.: Efficient privacy-preserving content-based image retrieval in the cloud. In: Proceedings of the International Conference on Web-age Information Management. Springer, Cham (2016)

  28. Song, F., Qin, Z., Zhang, J., Liu, D., Liang, J., Shen, X.S.: Efficient and privacy-preserving outsourced image retrieval in public clouds. In: Proceedings of the 2020 IEEE IEEE Global Communications Conference GLOBECOM 2020 - Proc. 0–5 (2020)

  29. Li, J.S., Liu, I.H., Tsai, C.J., Su, Z.Y., Li, C.F., Liu, C.G.: Secure content-based image retrieval in the cloud with key confidentiality. IEEE Access. 8, 114940–114952 (2020)

    Article  Google Scholar 

  30. Zhang, L., Jung, T., Liu, K., Li, X.Y., Ding, X., Gu, J., Liu, Y.: PIC: enable large-scale privacy preserving content-based image search on cloud. IEEE Trans. Parallel Distrib. Syst. 28, 3258–3271 (2017)

    Article  Google Scholar 

  31. Abduljabbar, Z.A., Jin, H., Ibrahim, A., Hussien, Z.A., Hussain, M.A., Abbdal, S.H., Zou, D.: Secure biometric image retrieval in IoT-cloud. In: Proceedings of the International Conference on Signal Processing, Communication, Computing ICSPCC 2016 (2016)

  32. Ferreira, B., Rodrigues, J., Leitao, J., Domingos, H.: Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans. Cloud Comput. 7, 784–798 (2017)

    Article  Google Scholar 

  33. Zhang, Z., Zhou, F., Qin, S., Jia, Q., Xu, Z.: Privacy-preserving image retrieval and sharing in social multimedia applications. IEEE Access 8, 66828–66838 (2020)

    Article  Google Scholar 

  34. Shen, M., Cheng, G., Zhu, L., Du, X., Hu, J.: Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109, 621–632 (2020)

    Article  Google Scholar 

  35. Weng, L., Amsaleg, L., Furon, T.: Privacy-preserving outsourced media search. IEEE Trans. Knowl. Data Eng. 28(10), 2738–2751 (2016)

    Article  Google Scholar 

  36. Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302 (2017)

    Article  Google Scholar 

  37. Li, X., Li, J., Yiu, S., Gao, C., Xiong, J.: Privacy-preserving edge-assisted image retrieval and classification in IoT. Front. Comput. Sci. 13(005), 1136–1147 (2019)

    Article  Google Scholar 

  38. Yao, A.C.C.: How to generate and exchange secrets. In: Proceedings of the Annual Symposium on Foundations of Computer Science (Proceedings). pp. 162–167 (1986)

  39. David, B., Dowsley, R., Katti, R., Nascimento, A.C.A.: Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. In: Proceedings of the 9th International Conference on Provable Security. pp. 354–367 (2015)

  40. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  41. Yao, A.C.: Protocols for secure computations. In: Proceedings of the Annual Symposium on Foundations of Computer Science. pp. 160–164 (1982)

  42. Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: Proceedings of the Annual ACM Symposium on Theory of Computing. pp. 639–648 (1996)

  43. Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Proceedings of the 13th ESORICS on Computer Security (2008)

  44. Du, W., Atallah, M.J.: Protocols for secure remote database access with approximate matching. In: Proceedings of the 7th ACM conference on Computer and Communications Security (CCS). pp. 87–111 (2001)

  45. Siabi, B., Berenjkoub, M., Susilo, W.: Optimally efficient secure scalar product with applications in cloud computing. IEEE Access 7, 798–815 (2019)

    Article  Google Scholar 

  46. Gao, C.Z., Cheng, Q., Li, X., Xia, S.B.: Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust Comput. 22, 1655–1663 (2019)

    Article  Google Scholar 

  47. Rao, F.Y., Samanthula, B.K., Bertino, E., Yi, X., Liu, D.: Privacy-preserving and outsourced multi-user K-means clustering. In: Proceedings of the IEEE Conference on Collaboration and Internet Computing, CIC 2015. pp. 80–89 (2015)

  48. Ma, X., Chen, X., Zhang, X.: Non-interactive privacy-preserving neural network prediction. Inf. Sci. (NY) 481, 507–519 (2019)

    Article  Google Scholar 

  49. Huang, K., Liu, X., Fu, S., Guo, D., Xu, M.: A lightweight privacy-preserving CNN feature extraction framework for mobile sensing. IEEE Trans. Dependable Secur. Comput. (2020)

  50. Xue, K., Li, S., Hong, J., Xue, Y., Yu, N., Hong, P.: Two-cloud secure database for numeric-related SQL range queries with privacy preserving. IEEE Trans. Inf. Forensics Secur. 12, 1596–1608 (2017)

    Article  Google Scholar 

  51. Zhang, J., Hu, S., Jiang, Z.L.: Privacy-preserving similarity computation in cloud-based mobile social networks. IEEE Access. 8, 111889–111898 (2020)

    Article  Google Scholar 

  52. Zhang, J., He, M., Zeng, G., Yiu, S.M.: Privacy-preserving verifiable elastic net among multiple institutions in the cloud. J. Comput. Secur. 26, 791–815 (2018)

    Article  Google Scholar 

  53. Wang, J.Z., Li, J., Wiederholdy, G.: SIMPLIcity: semantics-sensitive integrated matching for picture libraries. IEEE Trans Pami 23(9), 947–963 (2001)

    Article  Google Scholar 

  54. Li, J., Wang, J.Z.: Automatic linguistic indexing of pictures by a statistical modeling approach. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1075–1088 (2003)

    Article  Google Scholar 

  55. Liu, G.H., Yang, J.Y., Li, Z.Y.: Content-based image retrieval using computational visual attention model. Pattern Recognit. 48, 2554–2566 (2015)

    Article  Google Scholar 

  56. Kesler, S.B., Haykin, S.: The maximum entropy method applied to the spectral analysis of radar clutter. IEEE Trans. Inf. Theory 24, 269–272 (1978)

    Article  Google Scholar 

Download references

Funding

This research is supported by the National Natural Science Foundation of China (No. 41571426), National Key Research and Development Program of China under Grant (No. 2017YFB0504202).

Author information

Authors and Affiliations

Authors

Contributions

All authors have made great contributions to the research. The main design of the work, the analysis of data and the revising of the work were performed by YY and YX. The first draft of the manuscript and the experiments were finished by YY. YZ, ZW, and ZR assisted in data collection, data presentation and manuscript correction. All authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Yanyan Xu.

Ethics declarations

Conflict of interest

We declare there is no conflict of interest.

Ethical approval

This manuscript is not be submitted to more than one journal for simultaneous consideration, which is original and not published elsewhere in any form or language. This study is not be split up into several parts to increase the quantity of submissions. The results is presented honestly without inappropriate data manipulation.

Informed consent

This manuscript has not been previously published and is not currently in press, under review, or being considered for publication by another journal. All authors have read and approved the manuscript being submitted and agree to its submittal to this journal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, Y., Xu, Y., Zhang, Y. et al. Privacy-preserving content-based image retrieval in edge environment. Cluster Comput 25, 363–381 (2022). https://doi.org/10.1007/s10586-021-03404-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03404-2

Keywords

Navigation