skip to main content
10.1145/2405688.2405693acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

Towards privacy enhanced limited image processing in the clouds

Published: 03 December 2012 Publication History

Abstract

Image processing and storage are enormously resource intensive tasks that can benefit from cloud computing. Lack of robust mechanisms for controlling the privacy of the data outsourced to clouds is one of the concerns in using clouds for image processing. This paper presents a new image encoding scheme that enhances the privacy of the images outsourced to the clouds while allowing the clouds to perform certain forms of computations on the images. Our encoding scheme uses a chaotic map to transform the image after it is masked with an arbitrarily chosen ambient image. A simplified prototype of the image processing system was implemented and the experimental results are presented in this paper. Our prototype shows the feasibility of performing a class of image processing tasks on images encoded for privacy.

References

[1]
A. Arnol'd, V. I.; Avez. Ergodic problems of classical mechanics. Benjamin, Inc., 1968.
[2]
C. Cachin and J. Camenisch. Advances in cryptology. In EUROCRYPT, volume 3027, pages 1--638, 2004.
[3]
R. Canetti and R. R. Dakdouk. Extractable perfectly one-way functions. In ICALP, pages 449--460, 2008.
[4]
T. Gao and Z. Chen. A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372:394--400, 2008.
[5]
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In Proceedings of the 30th annual conference on Advances in cryptology(CRYPTO'10), pages 465--482, 2010.
[6]
E. Goh, H. Shacham, N. Modadugu, and D. Boneh. Sirius: Securing remote untrusted storage. In Proceedings of Network and Distributed Systems Security (NDSS) Symposium, pages 131--145, 2003.
[7]
G. R. Goodson, J. J. Wylie, G. R. Ganger, and M. K. Reiter. Efficient byzantine-tolerant erasure-coded storage. In Proceedings of the International Conference on Dependable Systems and Networks, pages 135--145, 2004.
[8]
Z. Guan, F. Huang, and W. Guan. Chaos-based image encryption algorithm. Physics Letters A, 346:153--157, 2005.
[9]
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pages 29--42, 2003.
[10]
S. Li, C. Li, G. Chen, and X. Mou. Cryptanalysis of the RCES/RSES image encryption scheme. IEEE Trans. Image Processing, 10, 2004.
[11]
W. Lu, A. L. Varna, and M. Wu. Security analysis for privacy preserving search of multimedia. In Proceeding of ICIP10, pages 2093--2096, 2010.
[12]
M. Naor and A. Shamir. Visual cryptography. In EUROCRYPT, pages 1--12, 1994.
[13]
A. Shamir. How to share a secret. Communication ACM, 22:612--613, 1979.
[14]
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the 29th conference on Information communications(INFOCOM'10), pages 534--542, 2010.
[15]
C. Zhu. A novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications, 285(1):29--37, 2012.

Cited By

View all
  • (2016)Enhancing security on cloud using additional encrypted parameter for public authentication2016 Symposium on Colossal Data Analysis and Networking (CDAN)10.1109/CDAN.2016.7570918(1-5)Online publication date: Mar-2016
  • (2013)Efficient public verifiability and data dynamics for storage security in hybrid clouds2013 4th International Conference on Computer and Communication Technology (ICCCT)10.1109/ICCCT.2013.6749598(28-33)Online publication date: Sep-2013
  • (2013)An Approach for Privacy Enhanced Pixel-Level Image Processing in Hybrid Clouds2013 22nd International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2013.6614104(1-8)Online publication date: Jul-2013
  1. Towards privacy enhanced limited image processing in the clouds

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MIDDLEWARE '12: Proceedings of the 9th Middleware Doctoral Symposium of the 13th ACM/IFIP/USENIX International Middleware Conference
    December 2012
    52 pages
    ISBN:9781450316118
    DOI:10.1145/2405688
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Professional
    • USENIX Assoc: USENIX Assoc
    • IFIP

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 December 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cloud computing
    2. cloud security
    3. privacy-aware image processing

    Qualifiers

    • Research-article

    Conference

    Middleware '12
    Sponsor:
    • USENIX Assoc
    Middleware '12: 13th International Middleware Conference
    December 3, 2012
    Quebec, Montreal, Canada

    Acceptance Rates

    Overall Acceptance Rate 203 of 948 submissions, 21%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)Enhancing security on cloud using additional encrypted parameter for public authentication2016 Symposium on Colossal Data Analysis and Networking (CDAN)10.1109/CDAN.2016.7570918(1-5)Online publication date: Mar-2016
    • (2013)Efficient public verifiability and data dynamics for storage security in hybrid clouds2013 4th International Conference on Computer and Communication Technology (ICCCT)10.1109/ICCCT.2013.6749598(28-33)Online publication date: Sep-2013
    • (2013)An Approach for Privacy Enhanced Pixel-Level Image Processing in Hybrid Clouds2013 22nd International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2013.6614104(1-8)Online publication date: Jul-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media