Privacy-preserving Image Processing in the Cloud

被引:0
作者
Qin, Zhan [1 ]
Weng, Jian [2 ]
Cui, Yong [3 ]
Ren, Kui [4 ,5 ]
机构
[1] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[2] Jinan Univ, Sch Informat Technol, Guangzhou, Guangdong, Peoples R China
[3] Tsinghua Univ, Beijing, Peoples R China
[4] SUNY Buffalo, Comp Sci & Engn, Buffalo, NY USA
[5] SUNY Buffalo, UbiSeC Lab, Buffalo, NY USA
来源
IEEE CLOUD COMPUTING | 2018年 / 5卷 / 02期
基金
美国国家科学基金会;
关键词
Cloud Computing; Cryptography; Image Process; Privacy Preservation; Security;
D O I
10.1109/MCC.2018.022171667
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Millions of private images are generated in various digital devices every day. The consequent massive computational workload makes people turn to cloud computing platforms for their economical computation resources. Meanwhile, the privacy concerns over the sensitive information contained in outsourced image data arise in public. In fact, once uploaded to the cloud, the security and privacy of the image content can only presume upon the reliability of the cloud service providers. Lack of assuring security and privacy guarantees becomes the main barrier to further deployment of cloud-based image processing systems. This paper studies the design targets and technical challenges lie in constructing cloud-based privacy-preserving image processing system. We explore various image processing tasks, including image feature detection, digital watermarking, content-based image search. The state-of-the-art techniques, including secure multiparty computation, and homomorphic encryption are investigated. A detailed taxonomy of the problem statement and the corresponding solutions is provided.
引用
收藏
页码:48 / 57
页数:10
相关论文
共 50 条
  • [1] Privacy-Preserving Image Denoising From External Cloud Databases
    Zheng, Yifeng
    Cui, Helei
    Wang, Cong
    Zhou, Jiantao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1285 - 1298
  • [2] Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 534 - 548
  • [3] Privacy-Preserving Contact Query Processing Over Trajectory Data in Mobile Cloud Computing
    Lu, Qu
    Dai, Hua
    Li, Pengyue
    Wan, Shuyan
    Yang, Geng
    Xiang, Yang
    Xiao, Fu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) : 1818 - 1832
  • [4] Efficient Security Solution for Privacy-Preserving Cloud Services
    Malina, Lukas
    Hajny, Jan
    2013 36TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2013, : 23 - 27
  • [5] Privacy-Preserving IoT Cloud Data Processing Using SGX
    Gremaud, Pascal
    Durand, Arnaud
    Pasquier, Jacques
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS ( IOT 2019), 2019,
  • [6] Privacy-preserving query over the encrypted image in cloud computing
    Zhu, Xudong
    Li, Hui
    Guo, Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02): : 151 - 158
  • [7] Privacy-preserving outsourcing of image feature extraction in cloud computing
    Ping Li
    Tong Li
    Zheng-An Yao
    Chun-Ming Tang
    Jin Li
    Soft Computing, 2017, 21 : 4349 - 4359
  • [8] Privacy-preserving outsourcing of image feature extraction in cloud computing
    Li, Ping
    Li, Tong
    Yao, Zheng-An
    Tang, Chun-Ming
    Li, Jin
    SOFT COMPUTING, 2017, 21 (15) : 4349 - 4359
  • [9] Privacy-preserving Layer over MapReduce on Cloud
    Zhang, Xuyun
    Liu, Chang
    Nepal, Surya
    Dou, Wanchun
    Chen, Jinjun
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 304 - 310
  • [10] Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
    Du, Minxin
    Wang, Qian
    He, Meiqi
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2320 - 2332