skip to main content
10.1145/2393347.2396394acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
poster

Secure cloud-based medical data visualization

Published: 29 October 2012 Publication History

Abstract

Outsourcing the tasks of medical data visualization to cloud centers presents new security challenges. In this paper, we propose a framework for cloud-based remote medical data visualization that protects the security of data at the cloud centers. To achieve this, we integrate the cryptographic secret sharing with pre-classification volume ray-casting and propose a secure volume ray-casting pipeline that hides the color-coded information of the secret medical data during rendering at the data centers. Results and analysis show the utility of the proposed framework.

References

[1]
Karlheinz Dorn, Vladyslav Ukis, and Thomas Friese. A cloud-deployed 3D medical imaging system with dynamically optimized scalability and cloud costs. Soft. Eng. and Adv. Appl., Euromicro Conf., 0:155--158, 2011.
[2]
3Di-cloud based medical image management and visualization platform. http://www.shina-sys.com/assets/brochures/3Di.pdf.
[3]
Nasir A. Memon and S. A. M. Gilani. Watermarking of chest CT scan medical images for content authentication. Intl. J. of Computer Mathematics, 88:265--280, 2011.
[4]
Geoffrey D. Schott. Colored illustrations of the brain: some conceptual and contextual issues. The Neuroscientist, 16:508--518, 2010.
[5]
Denis Vazhenin. Cloud-based Web-service for health 2.0. In Proc. of the 2012 Joint Intl. Conf. on Human-Centered Comp. Env., pages 240--243, 2012.
[6]
Marc Levoy. Display of surfaces from volume data. IEEE Comput. Graph. Appl., 8:29--37, 1988.
[7]
Adi Shamir. How to share a secret. Commun. ACM, 22, 1979.
[8]
Mustafa Ulutas, Güzin Ulutas, and Vasif V. Nabiyev. Medical image security and EPR hiding using Shamir's secret sharing scheme. J. Syst. Softw., 84:341--353, 2011.
[9]
Esam Elsheh and A. Ben Hamza. Secret sharing approaches for 3D object encryption. Expert Syst. Appl., 38:13906--13911, 2011.
[10]
Josh Cohen Benaloh. Secret sharing homomorphisms: keeping shares of a secret secret. In Proc. on Adv. in Cryptology, pages 251--260, 1987.

Cited By

View all
  • (2021)Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation2021 IEEE 7th World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT51360.2021.9595245(524-529)Online publication date: 14-Jun-2021
  • (2021)Privacy-Protected Denoising for Signals on Graphs from Distributed Systems2021 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS51556.2021.9401233(1-5)Online publication date: May-2021
  • (2019)A Framework to Secure Medical Image Storage in Cloud Computing EnvironmentCloud Security10.4018/978-1-5225-8176-5.ch016(328-345)Online publication date: 2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM '12: Proceedings of the 20th ACM international conference on Multimedia
October 2012
1584 pages
ISBN:9781450310895
DOI:10.1145/2393347
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 3d medical data visualization
  2. cloud computing
  3. ray casting
  4. secret sharing

Qualifiers

  • Poster

Conference

MM '12
Sponsor:
MM '12: ACM Multimedia Conference
October 29 - November 2, 2012
Nara, Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation2021 IEEE 7th World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT51360.2021.9595245(524-529)Online publication date: 14-Jun-2021
  • (2021)Privacy-Protected Denoising for Signals on Graphs from Distributed Systems2021 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS51556.2021.9401233(1-5)Online publication date: May-2021
  • (2019)A Framework to Secure Medical Image Storage in Cloud Computing EnvironmentCloud Security10.4018/978-1-5225-8176-5.ch016(328-345)Online publication date: 2019
  • (2019)e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving PrivacyIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.2892448(1-1)Online publication date: 2019
  • (2019)An IoT-Based Framework of Webvr Visualization for Medical Big Data in Connected HealthIEEE Access10.1109/ACCESS.2019.29571497(173866-173874)Online publication date: 2019
  • (2019)Genetic K-Means Clustering Algorithm for Achieving Security in Medical Image Processing over CloudAdvanced Intelligent Systems for Sustainable Development (AI2SD’2018)10.1007/978-3-030-11884-6_12(140-145)Online publication date: 6-Feb-2019
  • (2018)A Framework to Secure Medical Image Storage in Cloud Computing EnvironmentJournal of Electronic Commerce in Organizations10.4018/JECO.201801010116:1(1-16)Online publication date: 1-Jan-2018
  • (2018)Security Enhancement in Healthcare Cloud using Machine LearningProcedia Computer Science10.1016/j.procs.2018.01.136127:C(388-397)Online publication date: 1-May-2018
  • (2018)Just process me, without knowing meMultimedia Tools and Applications10.1007/s11042-017-4906-477:10(12581-12605)Online publication date: 1-May-2018
  • (2018)On the Security of Medical Image Processing in Cloud EnvironmentCloud Computing and Big Data: Technologies, Applications and Security10.1007/978-3-319-97719-5_7(89-99)Online publication date: 28-Jul-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media