detection and cross-batch redundancy detection, and
design from the ground up so as to do all the effec-
tive processing while ensuring protection of images.
Our customized design comes from a synergy of a se-
ries of techniques including image processing, data
encryption, efficient similarity search, and optimiza-
tion.
As future work, we plan to implement a proof-
of-concept system prototype and conduct a compre-
hensive evaluation over real-world datasets. Specif-
ically, we will measure the effectiveness of our se-
cure redundancy detection design over some real-
world disaster image datasets. We will also evalu-
ate the cost efficiency on different ends along the ser-
vice flow. We also intend to define formal security
definitions and provide formal proofs. Besides, we
will explore the design space of emerging security so-
lutions like trusted execution environments, for effi-
ciently defending against malicious adversaries that
compromise the edge server and deviate arbitrarily.
ACKNOWLEDGEMENTS
This work was supported in part by the Research
Grants Council of Hong Kong under Grants CityU
11202419, CityU 11212717, CityU 11217819, and
CityU C1008-16G.
REFERENCES
Chamoso, P., Rivas, A., S
´
anchez-Torres, R., and Rodr
´
ıguez,
S. (2018). Social computing for image matching. PloS
one, 13(5):e0197576.
Cui, H., Yuan, X., Zheng, Y., and Wang, C. (2016). En-
abling secure and effective near-duplicate detection
over encrypted in-network storage. In Proc. of IEEE
INFOCOM.
Dao, T., Roy-Chowdhury, A. K., Madhyastha, H. V., Krish-
namurthy, S. V., and Porta, T. L. (2017). Managing
redundant content in bandwidth constrained wireless
networks. IEEE/ACM TON, 25(2):988–1003.
Ferreira, B., Rodrigues, J., Leitao, J., and Domingos, H.
(2017). Practical privacy-preserving content-based
retrieval in cloud image repositories. IEEE TCC,
13(9):1–14.
Hua, Y., He, W., Liu, X., and Feng, D. (2015). Smarteye:
Real-time and efficient cloud image sharing for disas-
ter environments. In Proc. of IEEE INFOCOM.
Ma, L., Liu, X., Pei, Q., and Xiang, Y. (2019). Privacy-
preserving reputation management for edge comput-
ing enhanced mobile crowdsensing. IEEE Trans. Ser-
vices Computing, 12(5):786–799.
Neal Krawetz (2013). Kind of Like That.
http://www.hackerfactor.com/blog/?/archives/
529-Kind-of-Like-That.html/.
NetworkWorld (2017). When disasters strike,
edge computing must kick in. https:
//www.networkworld.com/article/3228884/
when-disasters-strike-edge-computing-must-kick-in.
html.
Nishiyama, J., Tabata, S., and Shigeno, H. (2017). An effi-
cient image gathering scheme with quality control in
disaster. In Proc. of IEEE AINA.
Partridge, K., Pathak, M. A., Uzun, E., and Wang, C.
(2012). Picoda: Privacy-preserving smart coupon de-
livery architecture. In Proc. of HotPETs.
StorageCraft.com (2020). Edge Computing vs.
Cloud Computing. https://blog.storagecraft.com/
edge-computing-cloud-computing/.
Weinsberg, U., Li, Q., Taft, N., Balachandran, A., Sekar,
V., Iannaccone, G., and Seshan, S. (2012). CARE:
content aware redundancy elimination for challenged
networks. In Proc. of ACM HotNets.
Zheng, Y., Cui, H., Wang, C., and Zhou, J. (2017).
Privacy-preserving image denoising from external
cloud databases. IEEE Trans. Information Forensics
and Security, 12(6):1285–1298.
Zheng, Y., Duan, H., and Wang, C. (2018). Learn-
ing the truth privately and confidently: Encrypted
confidence-aware truth discovery in mobile crowd-
sensing. IEEE Trans. Information Forensics and Se-
curity, 13(10):2475–2489.
Zuo, P., Hua, Y., Sun, Y., Liu, X. S., Wu, J., Guo, Y., Xia,
W., Cao, S., and Feng, D. (2019). Bandwidth and en-
ergy efficient image sharing for situation awareness in
disasters. IEEE TPDS, 30(1):15–28.
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness
301