{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:38:18Z","timestamp":1770917898097,"version":"3.50.1"},"reference-count":32,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"The Natural Science Foundation of Hubei Province","award":["2016CFB541"],"award-info":[{"award-number":["2016CFB541"]}]},{"name":"the Applied Basic Research Program of Wuhan Science and Technology Bureau","award":["2016010101010003"],"award-info":[{"award-number":["2016010101010003"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,2]]},"abstract":"<jats:p> Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. A number of techniques for searching encrypted data have been devised. However, certain security solutions may not be used in smart devices in IoT-cloud because such solutions are not lightweight. In this article, we present a lightweight scheme that can enable a content-based search through encrypted images. In particular, images are represented using local features. We develop and validate a secure scheme for measuring the Euclidean distance between two feature vectors. In addition, we use a hashing method, namely, locality-sensitive hashing, to devise the searchable index. The use of an locality-sensitive hashing index increases the proficiency and effectiveness of a system, thereby allowing the retrieval of only relevant images with a minimum number of distance evaluations. Refining vector techniques are used to refine relevant results efficiently and securely. Our index construction process ensures that stored data and trapdoors are kept private. Our system also efficiently supports multi-user authentication by avoiding the expensive traditional method, which enables data owners to define who can search for a specific image. Compared with other similarity-based encryption methods predicated upon searchability, the option presented in this study offers superior search speed and storage efficiency. <\/jats:p>","DOI":"10.1177\/1550147718761814","type":"journal-article","created":{"date-parts":[[2018,2,27]],"date-time":"2018-02-27T07:23:28Z","timestamp":1519716208000},"page":"155014771876181","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":30,"title":["Efficient encrypted image retrieval in IoT-cloud with multi-user authentication"],"prefix":"10.1177","volume":"14","author":[{"given":"Mustafa A","family":"Al Sibahee","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Songfeng","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Zaid Ameen","family":"Abduljabbar","sequence":"additional","affiliation":[{"name":"University of Basrah, Basra, Iraq"}]},{"given":"Ayad","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"University of Basrah, Basra, Iraq"}]},{"given":"Zaid Alaa","family":"Hussien","sequence":"additional","affiliation":[{"name":"Southern Technical University, Basra, Iraq"}]},{"given":"Keyan Abdul-Aziz","family":"Mutlaq","sequence":"additional","affiliation":[{"name":"University of Basrah, Basra, Iraq"}]},{"given":"Mohammed Abdulridha","family":"Hussain","sequence":"additional","affiliation":[{"name":"University of Basrah, Basra, Iraq"}]}],"member":"179","published-online":{"date-parts":[[2018,2,26]]},"reference":[{"key":"bibr1-1550147718761814","first-page":"799","volume-title":"Proceedings of the 2016 IEEE Trustcom\/BigDataSE\/ISPA","author":"Abduljabbar ZA"},{"key":"bibr2-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2015.09.001"},{"key":"bibr3-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"bibr4-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"bibr5-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"bibr6-1550147718761814","first-page":"253","volume-title":"Proceedings of the 2010 IEEE 30th international conference on distributed computing systems","author":"Wang C"},{"key":"bibr7-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"bibr8-1550147718761814","volume-title":"Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security (ASIA CCS\u201913)","author":"Sun W"},{"key":"bibr9-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"bibr10-1550147718761814","first-page":"1","volume-title":"Proceedings of the 2010 IEEE INFOCOM","author":"Li J"},{"key":"bibr11-1550147718761814","first-page":"269","volume-title":"Proceedings of the 2011 IEEE international conference on cloud computing and intelligence systems","author":"Liu C"},{"key":"bibr12-1550147718761814","first-page":"2112","volume-title":"Proceedings of the 2014 IEEE INFOCOM","author":"Wang B"},{"key":"bibr13-1550147718761814","first-page":"725418-1","volume-title":"Proceedings of the SPIE media forensics and security: IS&T\/SPIE electronic imaging","volume":"7254","author":"Lu W"},{"key":"bibr14-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2204272"},{"key":"bibr15-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2307057"},{"key":"bibr16-1550147718761814","first-page":"1533","volume-title":"Proceedings of the international conference on acoustics, speech and signal processing","author":"Lu W"},{"key":"bibr17-1550147718761814","first-page":"116","volume-title":"Proceedings of the 2014 IEEE 4th international conference on big data and cloud computing (BdCloud\u201914)","author":"Cheng B"},{"key":"bibr18-1550147718761814","first-page":"11","volume-title":"Proceedings of the 2015 IEEE 34th symposium on reliable distributed systems (SRDS\u201915)","author":"Ferreira B"},{"key":"bibr19-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2491933"},{"key":"bibr20-1550147718761814","first-page":"197","volume-title":"Proceedings of the 13th ACM conference on embedded networked sensor systems (SenSys\u201915)","author":"Shafagh H"},{"key":"bibr21-1550147718761814","first-page":"563","volume-title":"Proceedings of the 2004 ACM SIGMOD international conference on management of data (SIGMOD\u201904)","author":"Agrawal R"},{"key":"bibr22-1550147718761814","first-page":"3384","volume-title":"Proceedings of the 2010 IEEE conference on computer vision and pattern recognition","author":"Perronnin F"},{"key":"bibr23-1550147718761814","first-page":"745","volume-title":"Proceedings of the 2011 IEEE conference on computer vision and pattern recognition (CVPR\u20192011)","author":"Douze M"},{"key":"bibr24-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"bibr25-1550147718761814","first-page":"401","volume-title":"Proceedings of the 5th international conference on knowledge and systems engineering","author":"Truong DD"},{"key":"bibr26-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2367354"},{"key":"bibr27-1550147718761814","first-page":"604","volume-title":"Proceedings of the 30th annual ACM symposium on theory of computing (STOC\u201998)","author":"Indyk P"},{"key":"bibr28-1550147718761814","first-page":"950","volume-title":"Proceedings of the 33rd international conference on very large data bases (VLDB\u201907)","author":"Lv Q"},{"key":"bibr30-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_24"},{"key":"bibr31-1550147718761814","volume-title":"Computer security: principles and practice","author":"Stallings W","year":"2007","edition":"1"},{"key":"bibr33-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1145\/1132956.1132959"},{"key":"bibr34-1550147718761814","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1690"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718761814","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718761814","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718761814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T01:22:19Z","timestamp":1607304139000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718761814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["10.1177\/1550147718761814"],"URL":"https:\/\/doi.org\/10.1177\/1550147718761814","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}