2019
DOI: 10.3837/tiis.2019.11.023
|View full text |Cite
|
Sign up to set email alerts
|

EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud

Abstract: One of the best means to safeguard the confidentiality, security, and privacy of an image within the IoT-Cloud is through encryption. However, looking through encrypted data is a difficult process. Several techniques for searching encrypted data have been devised, but certain security solutions may not be used in IoT-Cloud because such solutions are not lightweight. We propose a lightweight scheme that can perform a content-based search of encrypted images, namely EEIRI. In this scheme, the images are represen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…This is one of the objectives of the Searchable Symmetric Encryption (SSE) protocol, which is to offer client the ability to carry out those operations while providing the host server precise guarantees about the privacy of the client's data and queries. This work [9][10][11][12] is considered one of the most basic data operations and the research community introduced keywords to search in the ciphertext. Using the static database [13][14][15][16][17][18][19], the user uploads their documents to a semitrusted server for searching and then issues the server search tokens without disclosing sensitive data.…”
Section: Introductionmentioning
confidence: 99%
“…This is one of the objectives of the Searchable Symmetric Encryption (SSE) protocol, which is to offer client the ability to carry out those operations while providing the host server precise guarantees about the privacy of the client's data and queries. This work [9][10][11][12] is considered one of the most basic data operations and the research community introduced keywords to search in the ciphertext. Using the static database [13][14][15][16][17][18][19], the user uploads their documents to a semitrusted server for searching and then issues the server search tokens without disclosing sensitive data.…”
Section: Introductionmentioning
confidence: 99%