2023
DOI: 10.1109/jstars.2022.3231890
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Assisted Verifiable and Secure Remote Sensing Image Retrieval in Cloud Environment

Abstract: Secure retrieval of remote sensing images in an outsourced cloud environment garners considerable attention. Since the cloud service provider (CSP) is considered as a semitrusted third party that may return incorrect retrieval results to save computational resources or defraud retrieval fees for profit, it becomes a critical challenge to achieve secure and verifiable remote sensing image retrieval. This article presents a secure retrieval and blockchain-assisted verifiable scheme for encrypted remote sensing i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…The values for execution time, latency, and throughput in the experiments represent the average outcomes from multiple runs. Additionally, the retrieval accuracy of the algorithm was evaluated using precision and recall rates [26,27]. The application's functionalities include the following: batch writing of encoded remote sensing image data, querying a specified number of remote sensing images based on spatial range, and batch querying of remote sensing images by keywords.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The values for execution time, latency, and throughput in the experiments represent the average outcomes from multiple runs. Additionally, the retrieval accuracy of the algorithm was evaluated using precision and recall rates [26,27]. The application's functionalities include the following: batch writing of encoded remote sensing image data, querying a specified number of remote sensing images based on spatial range, and batch querying of remote sensing images by keywords.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Mainstream data security technologies, such as fragile watermarking [5], cryptographic algorithms [6] and block chain [7], are still insufficient in the integrity authentication of HRRS images. The most prominent performance is that mainstream security technologies implement authentication at binary level.…”
Section: Introductionmentioning
confidence: 99%
“…The analysis and utilization of big data play an important role in hazard alerts, emergency response, and so on [2,3]. A notable increase in remote sensing archives has amplified the demand for content-based image retrieval (CBIR) within the field of remote sensing [4][5][6]. A typical CBIR system comprises two key components: visual feature extraction and similarity measurement.…”
Section: Introductionmentioning
confidence: 99%