Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2019, Vol. 13 Issue (5) : 1136-1147    https://doi.org/10.1007/s11704-018-8067-z
RESEARCH ARTICLE
Privacy-preserving edge-assisted image retrieval and classification in IoT
Xuan LI1,2,3, Jin LI4(), Siuming YIU2, Chongzhi GAO4, Jinbo XIONG1,3
1. College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China
2. Department of Computer Science, The University of Hong Kong, Hong Kong 999077, China
3. Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou 350117, China
4. School of Computational Science and Education Software, Guangzhou University, Guangzhou 510006, China
 Download: PDF(436 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Internet of Things (IoT) has drawn much attention in recent years. However, the image data captured by IoT terminal devices are closely related to users’ personal information, which are sensitive and should be protected. Though traditional privacy-preserving outsourced computing solutions such as homomorphic cryptographic primitives can support privacy-preserving computing, they consume a significant amount of computation and storage resources. Thus, it becomes a heavy burden on IoT terminal devices with limited resources. In order to reduce the resource consumption of terminal device, we propose an edge-assisted privacy-preserving outsourced computing framework for image processing, including image retrieval and classification. The edge nodes cooperate with the terminal device to protect data and support privacy-preserving computing on the semitrusted cloud server. Under this framework, edge-assisted privacy-preserving image retrieval and classification schemes are proposed in this paper. The security analysis and performance evaluation show that the proposed schemes greatly reduce the computational, communication and storage burden of IoT terminal device while ensuring image data security.

Keywords Internet of Things      outsourced computation      privacy protection      cryptographic primitive      image processing     
Corresponding Author(s): Jin LI   
Just Accepted Date: 25 July 2018   Online First Date: 30 January 2019    Issue Date: 25 June 2019
 Cite this article:   
Xuan LI,Jin LI,Siuming YIU, et al. Privacy-preserving edge-assisted image retrieval and classification in IoT[J]. Front. Comput. Sci., 2019, 13(5): 1136-1147.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-018-8067-z
https://academic.hep.com.cn/fcs/EN/Y2019/V13/I5/1136
1 B Liu, Y Li, B Zeng, C Lei. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Frontiers of Computer Science, 2016, 10(3): 543–558
https://doi.org/10.1007/s11704-015-4559-2
2 X Chen, X Huang, J Li, J Ma, W Lou, D Wong. New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Transactions on Information Forensics and Security, 2015, 10(1): 69–78
https://doi.org/10.1109/TIFS.2014.2363765
3 J Shen, C Wang, T Li, X Chen, X Huang, Z H Zhan. Secure data uploading scheme for a smart home system. Information Sciences, 2018, 453: 186–197
https://doi.org/10.1016/j.ins.2018.04.048
4 J Xiong, J Ren, L Chen, Z Yao, M Lin, D Wu, B Niu. Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet of Things Journal, 2018, 6(2): 1530–1540
5 D Wu, S Si, S Wu, R Wang. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet of Things Journal, 2018, 5(4): 2958–2970
https://doi.org/10.1109/JIOT.2017.2768073
6 S Peng, A Yang, L Cao, S Yu, D Xie. Social influence modeling using information theory in mobile social networks. Information Sciences, 2017, 379: 146–159
https://doi.org/10.1016/j.ins.2016.08.023
7 Z Cai, H Yan, P Li, Z A Huang, C Gao. Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Cluster Computing, 2017, 20(3): 2415–2422
https://doi.org/10.1007/s10586-017-0796-5
8 H Wang, Z Zheng, L Wu, P Li. New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Cluster Computing, 2017, 20(3): 2385–2392
https://doi.org/10.1007/s10586-016-0701-7
9 M Satyanarayanan, P Simoens, Y Xiao, P Pillai, Z Chen, K Ha, W L Hu, B Amos. Edge analytics in the Internet of Things. IEEE Pervasive Computing, 2015, 14(2): 24–31
https://doi.org/10.1109/MPRV.2015.32
10 J Li, X Huang, J Li, X Chen, Y Xiang. Securely outsourcing attributebased encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(8): 2201–2210
https://doi.org/10.1109/TPDS.2013.271
11 J Li, J Li, X Chen, C Jia, W Lou. Identity-based encryption with outsourced revocation in cloud computing. IEEE Transactions on Computers, 2015, 64(2): 425–437
https://doi.org/10.1109/TC.2013.208
12 H Li, D Liu, Y Dai, T Luan. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. IEEE Wireless Communications, 2015, 22(4): 74–80
https://doi.org/10.1109/MWC.2015.7224730
13 J Xiong, Y Zhang, X Li, M Lin, Z Yao, G Liu. RSE-PoW: a role symmetric encryption PoW scheme with authorized deduplication for multimedia data. Mobile Networks and Applications, 2018, 23(3): 650–663
https://doi.org/10.1007/s11036-017-0975-x
14 X Li, J Li, F Huang. A secure cloud storage system supporting privacypreserving fuzzy deduplication. Soft Computing, 2016, 20(4): 1437–1448
https://doi.org/10.1007/s00500-015-1596-6
15 J Li, J Li, D Xie, Z Cai. Secure auditing and deduplicating data in cloud. IEEE Transactions on Computers, 2016, 65(8): 2386–2396
https://doi.org/10.1109/TC.2015.2389960
16 C Gao, Q Cheng, P He, W Susilo, J Li. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Information Sciences, 2018, 444: 72–88
https://doi.org/10.1016/j.ins.2018.02.058
17 T Li, J Li, Z Liu, P Li, C Jia. Differentially private Naive Bayes learning over multiple data sources. Information Sciences, 2018, 444: 89–104
https://doi.org/10.1016/j.ins.2018.02.056
18 P Li, J Li, Z Huang, T Li, C Gao, S Yiu, K Chen. Multi-key privacypreserving deep learning in cloud computing. Future Generation Computer Systems, 2017, 74: 76–85
https://doi.org/10.1016/j.future.2017.02.006
19 S H Seo, M Nabeel, X Ding, E Bertino. An efficient certificateless encryption for secure data sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(9): 2107–2119
https://doi.org/10.1109/TKDE.2013.138
20 M Ali, R Dhamotharan, E Khan, S U Khan, A V Vasilakos, K Li, A Y Zomaya. SeDaSC: secure data sharing in clouds. IEEE Systems Journal, 2017, 11(2): 395–404
https://doi.org/10.1109/JSYST.2014.2379646
21 Z Wu, L Tian, P Li, T Wu, M Jiang, C Wu. Generating stable biometric keys for flexible cloud computing authentication using finger vein. Information Sciences, 2018, 433: 431–447
https://doi.org/10.1016/j.ins.2016.12.048
22 L Zhang, T Jung, K Liu, X Li, X Ding, J Gu, Y Liu. PIC: enable largescale privacy preserving content-based image search on cloud. IEEE Transactions on Parallel and Distributed Systems, 2017, 28(11): 3258–3271
https://doi.org/10.1109/TPDS.2017.2712148
23 J Li, X Chen, M Li, J Li, P P C Lee, W Lou. Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(6): 1615–1625
https://doi.org/10.1109/TPDS.2013.284
24 X Chen, J Li, X Huang, J Ma, W Lou. New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 2015, 12(5): 546–556
https://doi.org/10.1109/TDSC.2014.2366471
25 X Chen, J Li, J Weng, J Ma, W Lou. Verifiable computation over large database with incremental updates. IEEE Transactions on Computers, 2016, 65(10): 3184–3195
https://doi.org/10.1109/TC.2015.2512870
26 F Hahn, F Kerschbaum. Searchable encryption with secure and efficient updates. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014, 310–320
https://doi.org/10.1145/2660267.2660297
27 M Kuzu, M S Islam, M Kantarcioglu. Efficient similarity search over encrypted data. In: Proceedings of the 28th IEEE International Conference on Data Engineering. 2012, 1156–1167
https://doi.org/10.1109/ICDE.2012.23
28 C Gao, S Lv, Y Wei, Z Wang, Z Liu, X Cheng. M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access, 2018, 6: 38860–38869
https://doi.org/10.1109/ACCESS.2018.2852329
29 B Cheng, L Zhuo, Y Bai, Y Peng, J Zhang. Secure index construction for privacy-preserving large-scale image retrieval. In: Proceedings of the 4th IEEE International Conference on Big Data and Cloud Computing. 2014, 116–120
https://doi.org/10.1109/BDCloud.2014.36
30 B Ferreira, J Rodrigues, J Leitao, H Domingos. Privacy-preserving content-based image retrieval in the cloud. In: Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems (SRDS). 2015, 11–20
https://doi.org/10.1109/SRDS.2015.27
31 Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 2016, 11(11): 2594–2608
https://doi.org/10.1109/TIFS.2016.2590944
32 H Cheng, X Zhang, J Yu, F Li. Markov process-based retrieval for encrypted JPEG images. EURASIP Journal on Information Security, 2016, 2016(1): 1–9
https://doi.org/10.1186/s13635-015-0028-6
33 H Yan, X Li, Y Wang, C Jia. Centralized duplicate removal video storage system with privacy preservation in IoT. Sensors, 2018, 18(6): 1814
https://doi.org/10.3390/s18061814
34 Y Li, G Wang, L Nie, Q Wang, W Tan. Distance metric optimization driven convolutional neural network for age invariant face recognition. Pattern Recognition, 2018, 75: 51–62
https://doi.org/10.1016/j.patcog.2017.10.015
35 B Ferreira, J Rodrigues, J Leitao, H Domingos. Practical privacypreserving content-based retrieval in cloud image repositories. IEEE Transactions on Cloud Computing, 2017, 99: 1
https://doi.org/10.1109/TCC.2017.2669999
36 L Zhang, T Jung, C Liu, X Ding, X Li, Y Liu. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. In: Proceedings of the 35th International Conference on Distributed Computing Systems. 2015, 308–317
37 C Y Hsu, C S Lu, S C Pei. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Transactions on Image Processing, 2012, 21(11): 4593–4607
https://doi.org/10.1109/TIP.2012.2204272
38 S Hu, Q Wang, J Wang, Z Qin, K Ren. Securing SIFT: privacypreserving outsourcing computation of feature extractions over encrypted image data. IEEE Transactions on Image Processing, 2016, 25(7): 3411–3425
https://doi.org/10.1109/TIP.2016.2568460
39 T Li, W Chen, Y Tang, H Yan. A homomorphic network coding signature scheme for multiple sources and its application in IoT. Security and Communication Networks, 2018
https://doi.org/10.1155/2018/9641273
40 T P Juan Ram, P G Fernando. Secure signal processing in the cloud: enabling technologies for privacy-preserving multimedia cloud processing. IEEE Signal Processing Magazine, 2013, 30(2): 29–41
https://doi.org/10.1109/MSP.2012.2228533
41 Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang. An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access, 2018, 6(1): 20632–20640
https://doi.org/10.1109/ACCESS.2018.2809426
42 J Fridrich. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259–1284
https://doi.org/10.1142/S021812749800098X
43 A Belazi, A A A El-Latif, S Belghith. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing, 2016, 128: 155–170
https://doi.org/10.1016/j.sigpro.2016.03.021
44 P Ping, F Xu, Y Mao, Z Wang. Designing permutation-substitution image encryption networks with Henon map. Neurocomputing, 2018, 283(29): 53–63
https://doi.org/10.1016/j.neucom.2017.12.048
45 X Li, G Zhang, X Zhang. Image encryption algorithm with compound chaotic maps. Journal of Ambient Intelligence and Humanized Computing, 2015, 6(5): 563–570
https://doi.org/10.1007/s12652-013-0217-4
46 P Paillier. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. 1999, 223–238
https://doi.org/10.1007/3-540-48910-X_16
47 R Lu, X Liang, X Li, X Lin, X Shen. EPPA: an efficient and privacypreserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(9): 1621–1631
https://doi.org/10.1109/TPDS.2012.86
[1] Article highlights Download
[1] Edje E. ABEL, Muhammad Shafie Abd LATIFF. The utilization of algorithms for cloud internet of things application domains: a review[J]. Front. Comput. Sci., 2021, 15(3): 153502-.
[2] Hao LIN, Guannan LIU, Fengzhi LI, Yuan ZUO. Where to go? Predicting next location in IoT environment[J]. Front. Comput. Sci., 2021, 15(1): 151306-.
[3] Xingyue CHEN, Tao SHANG, Feng ZHANG, Jianwei LIU, Zhenyu GUAN. Dynamic data auditing scheme for big data storage[J]. Front. Comput. Sci., 2020, 14(1): 219-229.
[4] Yu ZHANG, Yuxing HAN, Jiangtao WEN. SMER: a secure method of exchanging resources in heterogeneous internet of things[J]. Front. Comput. Sci., 2019, 13(6): 1198-1209.
[5] Chunjie ZHOU, Xiaoling WANG, Zhiwang ZHANG, Zhenxing ZHANG, Haiping QU. The time model for event processing in internet of things[J]. Front. Comput. Sci., 2019, 13(3): 471-488.
[6] Xianxian LI, Peipei SUI, Yan BAI, Li-E WANG. M-generalization for multipurpose transactional data publication[J]. Front. Comput. Sci., 2018, 12(6): 1241-1254.
[7] Zheng HE, Kunpeng BAI, Dongdai LIN, Chuankun WU. Unification of identifiers in the Sea-Cloud system[J]. Front. Comput. Sci., 2018, 12(4): 749-762.
[8] Fei YAN, Sihao JIAO, Abdullah M. ILIYASU, Zhengang JIANG. Chromatic framework for quantum movies and applications in creating montages[J]. Front. Comput. Sci., 2018, 12(4): 736-748.
[9] Xiao PAN,Weizhang CHEN,Lei WU,Chunhui PIAO,Zhaojun HU. Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services[J]. Front. Comput. Sci., 2016, 10(2): 370-386.
[10] Ahmad ALI,Abdul JALIL,Jianwei NIU,Xiaoke ZHAO,Saima RATHORE,Javed AHMED,Muhammad AKSAM IFTIKHAR. Visual object tracking—classical and contemporary approaches[J]. Front. Comput. Sci., 2016, 10(1): 167-188.
[11] Wei FAN, Zhengyong CHEN, Zhang XIONG, Hui CHEN. The Internet of data: a new idea to extend the IOT in the digital world[J]. Front Comput Sci, 2012, 6(6): 660-667.
[12] Lei CHEN, Mitchell TSENG, Xiang LIAN, . Development of foundation models for Internet of Things[J]. Front. Comput. Sci., 2010, 4(3): 376-385.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed