Skip to main content

Blockchain-Based Encrypted Image Storage and Search in Cloud Computing

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13245))

Abstract

In the traditional cloud computing system, existing ranked image search mechanisms will leak the similarity of search results, even cannot prevent malicious cloud servers from tampering with or forging results. Therefore, with the help of blockchain technology, we propose an encrypted image storage and search system. A threshold encryption method based on the matrix similarity transformation theory is designed to protect the similarity of search results. Besides, a hybrid storage structure based on blockchain and cloud server is designed to ensure the correctness and completeness of search results. Finally, we implement the prototype in Python and Solidity, and conduct performance evaluations on local Ethereum client. The theoretical analysis and performance evaluations using the real-world dataset demonstrate that our proposed system is secure and feasible.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The readers can refer to the reference [12].

  2. 2.

    Splitting index and query vectors with a random Boolean vector, and then encrypting them with two random matrices and their inverse matrices.

  3. 3.

    Using Paillier homomorphic algorithm to encrypt index and query vectors.

References

  1. Cai, C., Weng, J., Yuan, X., Wang, C.: Enabling reliable keyword search in encrypted decentralized storage with fairness. IEEE Trans. Dependable Secure Comput., 1 (2018). https://doi.org/10.1109/TDSC.2018.2877332

  2. Griffin, G., Holub, A., Perona, P.: Caltech-256 object category dataset (2007)

    Google Scholar 

  3. Guo, C., Su, S., Choo, K.R., Tang, X.: A fast nearest neighbor search scheme over outsourced encrypted medical images. IEEE Trans. Industr. Inf. 17(1), 514–523 (2021)

    Article  Google Scholar 

  4. Guo, Y., Zhang, C., Jia, X.: Verifiable and forward-secure encrypted search using blockchain techniques. In: ICC 2020–2020 IEEE International Conference on Communications, pp. 1–7 (2020)

    Google Scholar 

  5. Hu, S., Cai, C., Wang, Q., Wang, C., Luo, X., Ren, K.: Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 792–800 (2018)

    Google Scholar 

  6. Li, X., Xue, Q., Chuah, M.: Casheirs: cloud assisted scalable hierarchical encrypted based image retrieval system. In: Proceedings of the IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017)

    Google Scholar 

  7. Li, Y., Ma, J., Miao, Y., Wang, Y., Liu, X., Choo, K.R.: Similarity search for encrypted images in secure cloud computing. IEEE Trans. Cloud Comput., (2020). https://doi.org/10.1109/TCC.2020.2989923

  8. Li, Y., Ma, J., Miao, Y., Liu, L., Liu, X., Choo, K.K.R.: Secure and verifiable multikey image search in cloud-assisted edge computing. IEEE Trans. Industr. Inf. 17(8), 5348–5359 (2020)

    Article  Google Scholar 

  9. Shen, M., Cheng, G., Zhu, L., Du, X., Hu, J.: Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Futur. Gener. Comput. Syst. 109, 621–632 (2020)

    Article  Google Scholar 

  10. Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 139–152 (2009)

    Google Scholar 

  11. Yuan, J., Yu, S., Guo, L.: Seisa: secure and efficient encrypted image search with access control. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2083–2091. IEEE (2015)

    Google Scholar 

  12. Zhou, K., Ren, J.: Passbio: privacy-preserving user-centric biometric authentication. IEEE Trans. Inf. Forensics Secur. 13(12), 3050–3063 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (No. 62072361), the Fundamental Research Funds for the Central Universities (No. JB211505), Henan Key Laboratory of Network Cryptography Technology, State Key Laboratory of Mathematical Engineering and Advanced Computing (No. LNCT2020-A06).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianfeng Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Ma, J., Miao, Y., Liu, X., Jiang, Q. (2022). Blockchain-Based Encrypted Image Storage and Search in Cloud Computing. In: Bhattacharya, A., et al. Database Systems for Advanced Applications. DASFAA 2022. Lecture Notes in Computer Science, vol 13245. Springer, Cham. https://doi.org/10.1007/978-3-031-00123-9_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-00123-9_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-00122-2

  • Online ISBN: 978-3-031-00123-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics