skip to main content
10.1145/3009977.3010036acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvgipConference Proceedingsconference-collections
research-article

Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system

Published: 18 December 2016 Publication History

Abstract

Cloud computing paradigm is attracting individuals as well as organizations all round the globe due to its multiple facilities of powerful resources, storage hubs, computational power and cost effective solutions. However, distributed cloud data centers pose the threat of security breaches to the privacy of the data and pose high risks. A secured image data sharing scheme over cloud domain based on the Shamir's secret sharing and permutation ordered binary number system has been proposed here. It distributes the image information into multiple random shares that reveal no information and thus can be stored securely over the distributed cloud data centers. Different image operations could be applied in the encrypted domain over the cloud servers itself. This approach reduces the threat to security which is a major hindrance in utilizing the facilities of the cloud based architecture. Only the authentic owner possessing the secret keys could restore back the original image information from the random shares. Comparative results for both the plain domain as well as the encrypted domain have been presented to validate the efficiency of using the various image filtering operations like motion blur, unsharp masking, weiner, gaussian etc in the encrypted domain over cloud.

References

[1]
M. Ahmed and M. A. Hossain. Cloud computing and security issues in the cloud. International Journal of Network Security & Its Applications, 6(1):25, 2014.
[2]
S. Alharthi and P. K. Atrey. An improved scheme for secret image sharing. In Multimedia and Expo (ICME), 2010 IEEE International Conference on, pages 1661--1666, July 2010.
[3]
S. S. Alharthi and P. K. Atrey. Further improvements on secret image sharing scheme. In Proceedings of the 2Nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, MiFor '10, pages 53--58, New York, NY, USA, 2010. ACM.
[4]
M. Ali, S. U. Khan, and A. V. Vasilakos. Security in cloud computing: Opportunities and challenges. Information Sciences, 305:357 -- 383, 2015.
[5]
V. P. Binu and A. Sreekumar. Generalized secret sharing using permutation ordered binary system. CoRR, abs/1407.3609, 2014.
[6]
D. Bogdanov. Foundations and properties of shamirŠs secret sharing scheme research seminar in cryptography. University of Tartu, Institute of Computer Science May 1st, 2007.
[7]
J. Cohen Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret. In Proceedings on Advances in cryptology---CRYPTO '86, pages 251--260, London, UK, UK, 1987. Springer-Verlag.
[8]
S. M. S. N. Esfahani, Y. Luo, and S. c. S. Cheung. Privacy protected image denoising with secret shares. In 2012 19th IEEE International Conference on Image Processing, pages 253--256, Sept 2012.
[9]
A. Lathey and P. K. Atrey. Image enhancement in encrypted domain over cloud. ACM Trans. Multimedia Comput. Commun. Appl., 11(3):38:1--38:24, Feb. 2015.
[10]
M. Mignotte. How to share a secret. In Proceedings of the 1982 Conference on Cryptography, pages 371--375, Berlin, Heidelberg, 1983. Springer-Verlag.
[11]
M. Mohanty, W. T. Ooi, and P. K. Atrey. Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing. In 2013 IEEE International Conference on Multimedia and Expo (ICME), pages 1--6, July 2013.
[12]
A. Shamir. How to share a secret. Commun. ACM, 22(11):612--613, Nov. 1979.
[13]
A. Sreekumar and S. B. Sundar. An efficient secret sharing scheme for n out of n scheme using pob-number system. Hack. in 2009, page 33, 2009.
[14]
C.-C. Thien and J.-C. Lin. Secret image sharing. Computers & Graphics, 26(5):765--770, 2002.
[15]
M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar. Efficient privacy preserving video surveillance. In 2009 IEEE 12th International Conference on Computer Vision, pages 1639--1646, Sept 2009.
[16]
B. Zhao and E. J. Delp. Secret sharing in the encrypted domain with secure comparison. In Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, pages 1--5, Dec 2011.

Cited By

View all
  • (2022) SecureDLJournal of Visual Communication and Image Representation10.1016/j.jvcir.2022.10350386:COnline publication date: 1-Jul-2022
  • (2022)A self-embedding secure fragile watermarking scheme with high quality recoveryJournal of Visual Communication and Image Representation10.1016/j.jvcir.2022.103437(103437)Online publication date: Jan-2022
  • (2021)Dual Security based on Crypto Steganography Using Two Level Learning In Assist with Dual Offbeat Shielding DesignInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT12173125(541-548)Online publication date: 18-Jun-2021
  • Show More Cited By

Index Terms

  1. Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICVGIP '16: Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing
    December 2016
    743 pages
    ISBN:9781450347532
    DOI:10.1145/3009977
    © 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Sponsors

    • Google Inc.
    • QI: Qualcomm Inc.
    • Tata Consultancy Services
    • NVIDIA
    • MathWorks: The MathWorks, Inc.
    • Microsoft Research: Microsoft Research

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 December 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Shamir's secret sharing
    2. cloud computing
    3. encrypted domain
    4. permutation ordered binary number system

    Qualifiers

    • Research-article

    Conference

    ICVGIP '16
    Sponsor:
    • QI
    • MathWorks
    • Microsoft Research

    Acceptance Rates

    ICVGIP '16 Paper Acceptance Rate 95 of 286 submissions, 33%;
    Overall Acceptance Rate 95 of 286 submissions, 33%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022) SecureDLJournal of Visual Communication and Image Representation10.1016/j.jvcir.2022.10350386:COnline publication date: 1-Jul-2022
    • (2022)A self-embedding secure fragile watermarking scheme with high quality recoveryJournal of Visual Communication and Image Representation10.1016/j.jvcir.2022.103437(103437)Online publication date: Jan-2022
    • (2021)Dual Security based on Crypto Steganography Using Two Level Learning In Assist with Dual Offbeat Shielding DesignInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT12173125(541-548)Online publication date: 18-Jun-2021
    • (2021)A secure lossless recovery for medical images based on image encoding and data self-embeddingCluster Computing10.1007/s10586-021-03446-6Online publication date: 22-Oct-2021
    • (2021)Securing Biometric Data over Cloud via Shamir’s Secret SharingComputer Vision and Image Processing10.1007/978-981-16-1086-8_25(282-292)Online publication date: 26-Mar-2021
    • (2019)Lossless image hierarchical recovery based on POB Number SystemSignal Processing10.1016/j.sigpro.2019.107293(107293)Online publication date: Sep-2019
    • (2019)Protected Cloud Storage in IoT Using Two Level Learning in Assist with Dual Offbeat Shielding DesignWireless Personal Communications10.1007/s11277-019-06410-1Online publication date: 26-Apr-2019
    • (2018)Perfectly Secure Shamir's Secret Sharing Scheme for Privacy Preserving Image Processing Over CloudProceedings of the 11th Indian Conference on Computer Vision, Graphics and Image Processing10.1145/3293353.3293360(1-8)Online publication date: 18-Dec-2018
    • (2018)SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)10.1109/MIPR.2018.00085(390-395)Online publication date: Apr-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media