Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings.

Yingying Li,Jianfeng Ma,Yinbin Miao,Yue Wang,Tengfei Yang,Ximeng Liu,Kim-Kwang Raymond Choo
DOI: https://doi.org/10.1109/tcc.2020.3034232
IF: 5.697
2022-01-01
IEEE Transactions on Cloud Computing
Abstract:With the advent of cloud computing, explosively increasing images are gradually outsourced to the cloud server for costs saving and feasibility. For security and privacy concerns, images (e.g., medical diagnosis, personal photos) should be encrypted before being outsourced. However, traditional encrypted image retrieval techniques still suffer from costly access control and low search accuracy. To solve these challenging issues, in this article, we first propose a Controllable encrypted cloud image Search scheme in Multi-user settings (namely CSM) by using the polynomial-based access strategy and proxy re-encryption technique. CSM achieves efficient access control and avoids heavy communication overhead caused by key transmission. Then, we improve the basic CSM to achieve malicious search user Tracing (namely TCSM) by utilizing the watermark technique, which can further prevent search users from illegally redistributing retrieved images to unauthorized search users. Our formal security analysis proves that our CSM (or TCSM) can guarantee the privacy of images, indexes, and search queries. Our empirical experiments using real-world datasets demonstrate the efficiency and high accuracy of our CSM (or TCSM) in practice.
What problem does this paper attempt to address?