Title: A new approximate image verification mechanism in cloud computing

Authors: Mengping Yin; Shichong Tan; Ning Zhang; Xiaotong Fu; Suchun Yuan

Addresses: State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, Shaanxi, China ' State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, Shaanxi, China ' State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, Shaanxi, China ' State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, Shaanxi, China ' China Academy of Space Technology, Xi'an, Shaanxi, China

Abstract: With the growing prevalence of cloud computing, more and more data especially images and videos are stored in cloud servers. To ensure the security of private data, data owners usually encrypt their private data before outsourcing the data to cloud servers. It is discovered that highly correlated data exist in storage outsourcing and much useful information can be extracted from these correlated data and used for cloud-based services. In the paper, we propose a scheme of encrypted image verification in cloud computing for mobile devices. Many existing schemes focus on verification of query results for outsourced text data or identical images. Different from that, the proposed scheme aims to verify the correctness of query results for similar images. Through the successful query of similar images, power and memory resources of mobile devices can be saved. The security of our scheme is analysed in the random oracle model, and analysis shows that the scheme is secure against adaptive chosen-keyword attack. And what's more, the experimental results demonstrate that our scheme is an efficient one.

Keywords: correctness verification; encrypted image; cloud computing; local sensitive hashing.

DOI: 10.1504/IJES.2019.103982

International Journal of Embedded Systems, 2019 Vol.11 No.6, pp.687 - 697

Received: 25 Apr 2017
Accepted: 31 Jul 2017

Published online: 05 Dec 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article