Privacy-preserving Image Processing in the Cloud

被引:0
作者
Qin, Zhan [1 ]
Weng, Jian [2 ]
Cui, Yong [3 ]
Ren, Kui [4 ,5 ]
机构
[1] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[2] Jinan Univ, Sch Informat Technol, Guangzhou, Guangdong, Peoples R China
[3] Tsinghua Univ, Beijing, Peoples R China
[4] SUNY Buffalo, Comp Sci & Engn, Buffalo, NY USA
[5] SUNY Buffalo, UbiSeC Lab, Buffalo, NY USA
来源
IEEE CLOUD COMPUTING | 2018年 / 5卷 / 02期
基金
美国国家科学基金会;
关键词
Cloud Computing; Cryptography; Image Process; Privacy Preservation; Security;
D O I
10.1109/MCC.2018.022171667
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Millions of private images are generated in various digital devices every day. The consequent massive computational workload makes people turn to cloud computing platforms for their economical computation resources. Meanwhile, the privacy concerns over the sensitive information contained in outsourced image data arise in public. In fact, once uploaded to the cloud, the security and privacy of the image content can only presume upon the reliability of the cloud service providers. Lack of assuring security and privacy guarantees becomes the main barrier to further deployment of cloud-based image processing systems. This paper studies the design targets and technical challenges lie in constructing cloud-based privacy-preserving image processing system. We explore various image processing tasks, including image feature detection, digital watermarking, content-based image search. The state-of-the-art techniques, including secure multiparty computation, and homomorphic encryption are investigated. A detailed taxonomy of the problem statement and the corresponding solutions is provided.
引用
收藏
页码:48 / 57
页数:10
相关论文
共 24 条
[1]  
[Anonymous], 2009, P 41 ANN ACM S THEOR
[2]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[3]  
Diephuis M., 2012, P CONT BAS MULT IND
[4]  
Eggers J., 2000, P EUR S SEC PRIV EUR
[5]  
Erkin Z., 2009, P PRIV ENH TECHN S P
[6]  
Esfahani H., 2016, SOFTWARE ENG PRACTIC
[7]  
Goldreich Oded, 1998, MANUSCRIPT PRE UNPUB
[8]  
Hsu C.-Y., 2011, P SPIE SPIE 11
[9]   Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT [J].
Hsu, Chao-Yung ;
Lu, Chun-Shien ;
Pei, Soo-Chang .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (11) :4593-4607
[10]  
Ivanova K., 2012, DATA ENG MANAGEMENT