TY - GEN
T1 - Flexible Key Revocation and Access Control for a Privacy-Protecting Cloud CBIR System
AU - Liu, Hao
AU - Goto, Hideaki
PY - 2017/9/7
Y1 - 2017/9/7
N2 - While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data, especially images, which usually contain a lot of private information, sometimes are carelessly handled by users and the cloud servers as well. There for, it is necessary to protect those outsourced image data. Although data encryption is useful for storage purposes, data retrieval becomes a problem. Thanks to the techniques of searchable encryption (SE), it is becoming more efficient to perform query over encrypted data. However, most of the current SE schemes are not capable of managing image data. Another common problem for SE schemes is that it is usually inefficient for them to perform user privilege revocation and access control. This paper proposed a system framework of a SE scheme for a cloud image database based on Content-based Image Retrieval (CBIR) with flexible key revocation and access control.
AB - While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data, especially images, which usually contain a lot of private information, sometimes are carelessly handled by users and the cloud servers as well. There for, it is necessary to protect those outsourced image data. Although data encryption is useful for storage purposes, data retrieval becomes a problem. Thanks to the techniques of searchable encryption (SE), it is becoming more efficient to perform query over encrypted data. However, most of the current SE schemes are not capable of managing image data. Another common problem for SE schemes is that it is usually inefficient for them to perform user privilege revocation and access control. This paper proposed a system framework of a SE scheme for a cloud image database based on Content-based Image Retrieval (CBIR) with flexible key revocation and access control.
UR - http://www.scopus.com/inward/record.url?scp=85032869507&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85032869507&partnerID=8YFLogxK
U2 - 10.1109/COMPSAC.2017.131
DO - 10.1109/COMPSAC.2017.131
M3 - Conference contribution
AN - SCOPUS:85032869507
T3 - Proceedings - International Computer Software and Applications Conference
SP - 738
EP - 743
BT - Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference Workshops, COMPSAC 2017
A2 - Demartini, Claudio
A2 - Yang, Ji-Jiang
A2 - Ahamed, Sheikh Iqbal
A2 - Conte, Thomas
A2 - Akiyama, Toyokazu
A2 - Reisman, Sorel
A2 - Takakura, Hiroki
A2 - Hasan, Kamrul
A2 - Claycomb, William
A2 - Nakamura, Motonori
A2 - Tovar, Edmundo
A2 - Zhang, Zhiyong
A2 - Liu, Ling
A2 - Lung, Chung-Horng
A2 - Cimato, Stelvio
PB - IEEE Computer Society
T2 - 41st IEEE Annual Computer Software and Applications Conference Workshops, COMPSAC 2017
Y2 - 4 July 2017 through 8 July 2017
ER -