Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
Senthil Nathan M1, Sivaram S2, Surya Prakash A3, Kiruthiga N4
1Senthil Nathan M*, Department of Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, India.
2Sivaram S, Department of Computer Science and Engineering,Sri Krishna College of Technology, Coimbatore, India.
3Surya Prakash A, Department of Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, India.
4Kiruthiga N, Department of Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, India.
Manuscript received on March 15, 2020. | Revised Manuscript received on March 24, 2020. | Manuscript published on March 30, 2020. | PP: 4679-4683 | Volume-8 Issue-6, March 2020. | Retrieval Number: F8842038620/2020©BEIESP | DOI: 10.35940/ijrte.E8842.038620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Capacity necessities for visual information have been expanding as of late, after the rise of numerous profoundly intelligent sight and sound administrations and applications for cell phones in both individual and corporate situations. This has been a key driving variable for the selection of cloud-based information re-appropriating arrangements. Nonetheless, re-appropriating information stockpiling to the Cloud additionally prompts new security challenges that must be painstakingly tended to, particularly with respect to protection. Right now propose a safe system for re-appropriated protection safeguarding capacity and recovery in huge shared picture vaults. Our proposition depends on IES-CBIR, a novel Picture Encryption Plan that displays Content-Based Picture Recovery properties. The system empowers scrambled stockpiling and looking through utilizing Content-Based Picture Recovery questions while safeguarding security against legitimate yet inquisitive cloud managers. We have fabricated a model of the proposed structure, officially broke down and demonstrated its security properties, and tentatively assessed its presentation and recovery exactness. Our outcomes show that IES-CBIR is provably secure, permits more productive tasks than existing proposition, both as far as reality multifaceted nature, and makes ready for new down to earth application situations.
Keywords: Cloud, Encryption, Security, Recovery, Information.
Scope of the Article: Security and Privacy.