Abstract
Traditional centralized cloud services face challenges, such as high communication delay, single point of failure, etc. Edge computing is one of distributed computing services in which resources are placed closer to users, and thus is more robust and can reduce communication delay. Although outsourcing data to the edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users’ data privacy, a privacy-preserving content-based image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge environment and the requirement of lightweight computing, we design a secure interaction protocol completed through the collaborative cooperation of two or more edge servers. This scheme not only protects data privacy, but also has low communication overhead and delay as well as low computing complexity, therefore it is more suitable for edge computing environment. Theoretical analysis and experiments show that our scheme has high security, retrieval accuracy and efficiency.
Similar content being viewed by others
Data availability
The datasets that support the finding of this paper, i.e., Corel1K, Corel10K and GHIM20, are publicly available datasets, which can be obtained for scientific research and are available in the http://wang.ist.psu.edu/docs/related.shtml, http://www.ci.gxnu.edu.cn/cbir/Dataset.aspx.
References
Jo, K., Kim, J., Kim, D., Jang, C., Sunwoo, M.: Development of autonomous car - Part II: a case study on the implementation of an autonomous driving system based on distributed architecture. IEEE Trans. Ind. Electron. 62, 5119–5132 (2015)
Barman, S., Shum, H.P.H., Chattopadhyay, S., Samanta, D.: A secure authentication protocol for multi-server-based E-healthcare using a fuzzy commitment scheme. IEEE Access. 7, 12557–12574 (2019)
Yan, Z., Xue, J., Chen, C.W.: Prius: hybrid edge cloud and client adaptation for HTTP adaptive streaming in cellular networks. IEEE Trans. Circuits Syst. Video Technol. 27, 209–222 (2017)
Smeulders, A.W.M., Worring, M., Santini, S., Gupta, A., Jain, R.: Content-based image retrieval at the end of the early years. IEEE Trans. Pattern Anal. Mach. Intell. 22, 1349–1380 (2000)
Xu, Y., Gong, J., Xiong, L., Xu, Z., Wang, J., Shi, Y.: A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43, 164–172 (2017)
Gong, J., Xu, Y., Zhao, X.: A Privacy-preserving Image retrieval method based on improved BoVW model in cloud environment. IETE Tech. Rev. 35, 1–9 (2018)
Lu, W., Varna, A.L., Swaminathan, A., Wu, M.: Secure image retrieval through feature protection. In: Proceedings of the ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pp. 1533–1536 (2009)
Hsu, C.Y., Lu, C.S., Pei, S.C.: Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21, 4593–4607 (2012)
Zhang, Y., Zhuo, L., Peng, Y., Zhang, J.: A secure image retrieval method based on homomorphic encryption for cloud computing. In: Proceedings of the International Conference on Digital Signal Processing, DSP, pp. 269–274 (2014)
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science. pp. 41–50 (1995)
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of the Annual Symposium Foundation of Computer Science. pp. 364–373 (1997)
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592–629 (2000)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 44–55 (2000)
Boneh, D., Crescenzo, G. Di, Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of the Advances in Cryptology - EUROCRYPT. , pp. 506–522 (2004)
Swaminathan, A., Mao, Y., Su, G.M., Gou, H., Varna, A.L., He, S., Wu, M., Oard, D.W.: Confidentiality-preserving rank-ordered search. In: StorageSS’07 - Proceedings of the 2007 ACM Workshop on Storage Security and Survivability. pp. 7–12 (2007)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings - International Conference on Distributed Computing Systems. pp. 253–262. (2010)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27, 340–352 (2016)
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98, 190–200 (2015)
Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling search over encrypted multimedia databases. In: Proceedings of the SPIE Int Soc Opt Eng, San Jose, CA, USA, vol. 7254, pp. 725418, January 19–21 (2009)
Nalini Sujantha Bel, K., Shatheesh Sam, I.: LSB Elimination based feature extraction for outsourced image retrieval in encrypted images. In: Proceedings of the International Conference on Trends in Electronics and Informatics, ICOEI 2019. 2019-April, pp. 130–135 (2019)
Iida, K., Kiya, H.: A privacy-preserving content-based image retrieval scheme allowing mixed use of encrypted and plain images. In: Proceedings of the 2020 Asia-Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. APSIPA ASC 2020, pp. 1436–1441 (2020)
Xia, Z., Wang, L., Tang, J., Xiong, N.N., Weng, J.: A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing. IEEE Trans. Netw. Sci. Eng. 8, 318–330 (2021)
Wang, H., Xia, Z., Fei, J., Xiao, F.: An AES-based secure image retrieval scheme using random mapping and BOW in cloud computing. IEEE Access. 8, 61138–61147 (2020)
Gu, Q., Xia, Z., Sun, X.: MSPPIR: multi-source privacy-preserving image retrieval in cloud computing (2020)
Xia, Z., Xiong, N.N., Vasilakos, A.V., Sun, X.: EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf. Sci. (NY) 387, 195–204 (2017)
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2017)
Kai, H., Ming, X., Fu, S., Wang, D.: Efficient privacy-preserving content-based image retrieval in the cloud. In: Proceedings of the International Conference on Web-age Information Management. Springer, Cham (2016)
Song, F., Qin, Z., Zhang, J., Liu, D., Liang, J., Shen, X.S.: Efficient and privacy-preserving outsourced image retrieval in public clouds. In: Proceedings of the 2020 IEEE IEEE Global Communications Conference GLOBECOM 2020 - Proc. 0–5 (2020)
Li, J.S., Liu, I.H., Tsai, C.J., Su, Z.Y., Li, C.F., Liu, C.G.: Secure content-based image retrieval in the cloud with key confidentiality. IEEE Access. 8, 114940–114952 (2020)
Zhang, L., Jung, T., Liu, K., Li, X.Y., Ding, X., Gu, J., Liu, Y.: PIC: enable large-scale privacy preserving content-based image search on cloud. IEEE Trans. Parallel Distrib. Syst. 28, 3258–3271 (2017)
Abduljabbar, Z.A., Jin, H., Ibrahim, A., Hussien, Z.A., Hussain, M.A., Abbdal, S.H., Zou, D.: Secure biometric image retrieval in IoT-cloud. In: Proceedings of the International Conference on Signal Processing, Communication, Computing ICSPCC 2016 (2016)
Ferreira, B., Rodrigues, J., Leitao, J., Domingos, H.: Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans. Cloud Comput. 7, 784–798 (2017)
Zhang, Z., Zhou, F., Qin, S., Jia, Q., Xu, Z.: Privacy-preserving image retrieval and sharing in social multimedia applications. IEEE Access 8, 66828–66838 (2020)
Shen, M., Cheng, G., Zhu, L., Du, X., Hu, J.: Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109, 621–632 (2020)
Weng, L., Amsaleg, L., Furon, T.: Privacy-preserving outsourced media search. IEEE Trans. Knowl. Data Eng. 28(10), 2738–2751 (2016)
Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302 (2017)
Li, X., Li, J., Yiu, S., Gao, C., Xiong, J.: Privacy-preserving edge-assisted image retrieval and classification in IoT. Front. Comput. Sci. 13(005), 1136–1147 (2019)
Yao, A.C.C.: How to generate and exchange secrets. In: Proceedings of the Annual Symposium on Foundations of Computer Science (Proceedings). pp. 162–167 (1986)
David, B., Dowsley, R., Katti, R., Nascimento, A.C.A.: Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. In: Proceedings of the 9th International Conference on Provable Security. pp. 354–367 (2015)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Yao, A.C.: Protocols for secure computations. In: Proceedings of the Annual Symposium on Foundations of Computer Science. pp. 160–164 (1982)
Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: Proceedings of the Annual ACM Symposium on Theory of Computing. pp. 639–648 (1996)
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Proceedings of the 13th ESORICS on Computer Security (2008)
Du, W., Atallah, M.J.: Protocols for secure remote database access with approximate matching. In: Proceedings of the 7th ACM conference on Computer and Communications Security (CCS). pp. 87–111 (2001)
Siabi, B., Berenjkoub, M., Susilo, W.: Optimally efficient secure scalar product with applications in cloud computing. IEEE Access 7, 798–815 (2019)
Gao, C.Z., Cheng, Q., Li, X., Xia, S.B.: Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust Comput. 22, 1655–1663 (2019)
Rao, F.Y., Samanthula, B.K., Bertino, E., Yi, X., Liu, D.: Privacy-preserving and outsourced multi-user K-means clustering. In: Proceedings of the IEEE Conference on Collaboration and Internet Computing, CIC 2015. pp. 80–89 (2015)
Ma, X., Chen, X., Zhang, X.: Non-interactive privacy-preserving neural network prediction. Inf. Sci. (NY) 481, 507–519 (2019)
Huang, K., Liu, X., Fu, S., Guo, D., Xu, M.: A lightweight privacy-preserving CNN feature extraction framework for mobile sensing. IEEE Trans. Dependable Secur. Comput. (2020)
Xue, K., Li, S., Hong, J., Xue, Y., Yu, N., Hong, P.: Two-cloud secure database for numeric-related SQL range queries with privacy preserving. IEEE Trans. Inf. Forensics Secur. 12, 1596–1608 (2017)
Zhang, J., Hu, S., Jiang, Z.L.: Privacy-preserving similarity computation in cloud-based mobile social networks. IEEE Access. 8, 111889–111898 (2020)
Zhang, J., He, M., Zeng, G., Yiu, S.M.: Privacy-preserving verifiable elastic net among multiple institutions in the cloud. J. Comput. Secur. 26, 791–815 (2018)
Wang, J.Z., Li, J., Wiederholdy, G.: SIMPLIcity: semantics-sensitive integrated matching for picture libraries. IEEE Trans Pami 23(9), 947–963 (2001)
Li, J., Wang, J.Z.: Automatic linguistic indexing of pictures by a statistical modeling approach. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1075–1088 (2003)
Liu, G.H., Yang, J.Y., Li, Z.Y.: Content-based image retrieval using computational visual attention model. Pattern Recognit. 48, 2554–2566 (2015)
Kesler, S.B., Haykin, S.: The maximum entropy method applied to the spectral analysis of radar clutter. IEEE Trans. Inf. Theory 24, 269–272 (1978)
Funding
This research is supported by the National Natural Science Foundation of China (No. 41571426), National Key Research and Development Program of China under Grant (No. 2017YFB0504202).
Author information
Authors and Affiliations
Contributions
All authors have made great contributions to the research. The main design of the work, the analysis of data and the revising of the work were performed by YY and YX. The first draft of the manuscript and the experiments were finished by YY. YZ, ZW, and ZR assisted in data collection, data presentation and manuscript correction. All authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
We declare there is no conflict of interest.
Ethical approval
This manuscript is not be submitted to more than one journal for simultaneous consideration, which is original and not published elsewhere in any form or language. This study is not be split up into several parts to increase the quantity of submissions. The results is presented honestly without inappropriate data manipulation.
Informed consent
This manuscript has not been previously published and is not currently in press, under review, or being considered for publication by another journal. All authors have read and approved the manuscript being submitted and agree to its submittal to this journal.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yan, Y., Xu, Y., Zhang, Y. et al. Privacy-preserving content-based image retrieval in edge environment. Cluster Comput 25, 363–381 (2022). https://doi.org/10.1007/s10586-021-03404-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-021-03404-2