[1] RITTINGHOUSE J W, RANSOME J F.Cloud computing:implementation, management, and security[M].[S.l.]:CRC Press, 2016. [2] LI M, ZHANG M, WANG Q, et al.InstantCryptoGram:secure image retrieval service[C]//Proceedings of IEEE Conference on Computer Communications.Washington D.C., USA:IEEE Press, 2018:2222-2230. [3] WANG Q, HE M, DU M, et al.Searchable encryption over feature-rich data[J].IEEE Transactions on Dependable and Secure Computing, 2016, 15(3):496-510. [4] JARECKI S, JUTLA C, KRAWCZYK H, et al.Outsourced symmetric private information retrieval[C]//Proceedings of ACM Conference on Computer and Communications Security.New York, USA:ACM Press, 2013:875-888. [5] WANG Q, REN K, DU M, et al.SecGDB:graph encryption for exact shortest distance queries with efficient updates[C]//Proceedings of International Conference on Financial Crypto-graphy and Data Security.Berlin, Germany:Springer, 2017:79-97. [6] YLI-HUUMO J, KO D, CHOI S, et al.Where is current research on blockchain technology?-A systematic review[J].PloS One, 2016, 11(10):1-10. [7] XIA Z, WANG X, ZHANG L, et al.A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing[J].IEEE Transactions on Information Forensics and Security, 2016, 11(11):2594-2608. [8] YE J, XU Z, DING Y.Image search scheme over encrypted database[J].Future Generation Computer Systems, 2018, 87:251-258. [9] QIN J, LI H, XIANG X, et al.An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing[J].IEEE Access, 2019, 7:24626-24633. [10] ZHU L, ZHANG C, XU C, et al.An efficient and privacy-preserving biometric identification scheme in cloud computing[J].IEEE Access, 2018, 6:19025-19033. [11] YUAN J, YU S, GUO L.SEISA:secure and efficient encrypted image search with access control[C]//Proceedings of IEEE Conference on Computer Communications.Washington D.C., USA:IEEE Press, 2015:2083-2091. [12] FERREIRA B, RODRIGUES J, LEITAO J, et al.Practical privacy-preserving content-based retrieval in cloud image repositories[J].IEEE Transactions on Cloud Computing, 2017, 7(3):784-798. [13] KAMARA S, PAPAMANTHOU C, ROEDER T.Dynamic searchable symmetric encryption[C]//Proceedings of ACM Conference on Computer and Communications Security.New York, USA:ACM Press, 2012:965-976. [14] CUI H, YUAN X, WANG C.Harnessing encrypted data in cloud for secure and efficient mobile image sharing[J].IEEE Transactions on Mobile Computing, 2016, 16(5):1315-1329. [15] CASH D, JARECKI S, JUTLA C, et al.Highly-scalable searchable symmetric encryption with support for boolean queries[C]//Proceedings of Annual Cryptology Conference.Berlin, Germany:Springer, 2013:353-373. [16] GUO S, XU J, ZHANG C, et al.ImageProof:enabling authentication for large-scale image retrieval[C]//Proceedings of the 35th International Conference on Data Engineering.Washington D.C., USA:IEEE Press, 2019:1070-1081. [17] WANG S, ZHANG Y, ZHANG Y.A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems[J].IEEE Access, 2018, 6:38437-38450. [18] HU S, CAI C, WANG Q, et al.Searching an encrypted cloud meets blockchain:a decentralized, reliable and fair realization[C]//Proceedings of IEEE Conference on Computer Communications.Washington D.C., USA:IEEE Press, 2018:792-800. [19] CHEN L, LEE W K, CHANG C C, et al.Blockchain based searchable encryption for electronic health record sharing[J].Future Generation Computer Systems, 2019, 95:420-429. [20] BENET J.IPFS-content addressed, versioned, P2P file system[EB/OL].(2014-07-14)[2021-03-10].https://arxiv.org/pdf/1407.3561.pdf. [21] SUN X M, XIONG N N, VASILAKOS A V, et al.EPCBIR:an efficient and privacy-preserving content-based image retrieval scheme in cloud computing[J].Information Sciences, 2017, 387:195-204. [22] 曹宇思.云环境下密文图像检索系统研究[D].长沙:中南林业科技大学, 2019. CAO Y S.Research on ciphertext image retrieval system in cloud environment[D].Changsha:Central South University of Forestry and Technology, 2019.(in Chinese) [23] SHEN M, DENG Y, ZHU L, et al.Privacy-preserving image retrieval for medical IoT systems:a blockchain-based approach[J].IEEE Network, 2019, 33(5):27-33. |