Secure and Private Outsourcing of Shape-Based Feature Extraction

Document Type

Article

Publication Date

2013

Subject: LCSH

Data privacy, Web servers--Computer programs, Cloud computing

Disciplines

Computer Engineering | Computer Sciences | Electrical and Computer Engineering

Abstract

There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data using weak devices (both computationally and storage-wise). Or a weak client wants to outsource an expensive computational task without revealing to the servers either the inputs or the computed outputs. The framework requires that the bulk of the computational burden of query-processing be placed on the remote servers, without revealing to these servers anything about the data. Most of the existing work in this area deals with non-image data that is keyword based, and the present paper is to deal with raw image data (without any keyword annotations). We demonstrate that shape-based image feature extraction, a particularly computationally intensive task, can be carried out within this framework, by presenting two schemes for doing so, and demonstrating their viability by experimentally evaluating them. Our results can be used in a number of practical situations. In one scenario the client has images and wants to securely outsource shape-based feature extraction on them, in another the server has encrypted images and the client wants a feature-extracted representation of those that are feature-rich.

Comments

Article is part of the conference proceeding, International Conference on Information and Communications Security, 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013.

DOI

10.1007/978-3-319-02726-5_7

Publisher Citation

Wang S., Nassar M., Atallah M., Malluhi Q. (2013) Secure and Private Outsourcing of Shape-Based Feature Extraction. In: Qing S., Zhou J., Liu D. (eds) Information and Communications Security. ICICS 2013. Lecture Notes in Computer Science, vol 8233. Springer, Cham. https://doi.org/10.1007/978-3-319-02726-5_7

Check your library

Share

COinS