Privacy-Enhanced and Verifiable Compressed Sensing Reconstruction for Medical Image Processing on the Cloud

被引:4
|
作者
Sun, Xin [1 ]
Tian, Chengliang [1 ,2 ]
Tian, Weizhong [3 ]
Zhang, Yan [4 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Qingdao Univ, Business Sch, Qingdao 266071, Peoples R China
[3] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Guangdong, Peoples R China
[4] Qingdao Univ Sci & Technol, Coll Electromech Engn, Qingdao 266061, Peoples R China
关键词
Client-server system; computation outsourcing; compressed sensing reconstruction; privacy preservation; COMPUTATION; SECURITY; PROTOCOLS; SERVICE;
D O I
10.1109/ACCESS.2022.3151398
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The well-known compressed sensing reconstruction (CSR) uses the sparse characteristics of the signal to obtain discrete samples with the compression (i.e. measurement) algorithm, and then perfectly reconstructs the signal through the reconstruction algorithm. Benefiting from the storage savings, the CSR has been widely used in the field of large-scale image processing. However, the reconstruction process is computationally overloaded for resource-constrained clients. Therefore, designing a cloud-aided CSR algorithm becomes a hot topic. In this paper, we investigate the existing secure CSR algorithms within a cloud environment and propose a new privacy-enhanced and verifiable CSR outsourcing algorithm for online medical image processing services. Compared with previous work, our new design can efficiently achieve more extensive security. Precisely, (1) our algorithm realizes the privacy preservation of the original image, as well as the input/output information of the reconstruction process under the chosen-plaintext attack, (2) our design is based on a malicious cloud server model and can verify the correctness of the cloud returned result with a probability of approximating 1, and (3) our algorithm is highly efficient and can make the local client achieve decent computational savings. The main technique of our design is a combination of linear transformation, permutation and restricted random padding which is concise and high-efficiency. We analyze the above claims with rigorous theoretical arguments and comprehensive experimental analysis.
引用
收藏
页码:18134 / 18145
页数:12
相关论文
共 50 条
  • [1] Privacy-Enhanced Similarity Search Scheme for Cloud Image Databases
    Liu, Hao
    Goto, Hideaki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (12): : 3188 - 3191
  • [2] Medical Image Compressed Sensing Reconstruction
    Yan Haixia
    Liu Yanjun
    Sun Yuming
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 4835 - 4838
  • [3] Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
    Fang, Junli
    Feng, Tao
    Guo, Xian
    Ma, Rong
    Lu, Ye
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [4] Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
    Junli Fang
    Tao Feng
    Xian Guo
    Rong Ma
    Ye Lu
    [J]. Journal of Cloud Computing, 13
  • [5] PESAM: Privacy-Enhanced Segment Anything Model for Medical Image Segmentation
    Cai, Jiuyun
    Niu, Ke
    Pan, Yijie
    Tai, Wenjuan
    Han, Jiacheng
    [J]. ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT II, ICIC 2024, 2024, 14863 : 94 - 105
  • [6] Practical privacy-preserving compressed sensing image recovery in the cloud
    Kai HUANG
    Ming XU
    Shaojing FU
    Dongsheng WANG
    [J]. Science China(Information Sciences), 2017, 60 (09) : 277 - 285
  • [7] Practical privacy-preserving compressed sensing image recovery in the cloud
    Huang, Kai
    Xu, Ming
    Fu, Shaojing
    Wang, Dongsheng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (09)
  • [8] Practical privacy-preserving compressed sensing image recovery in the cloud
    Kai Huang
    Ming Xu
    Shaojing Fu
    Dongsheng Wang
    [J]. Science China Information Sciences, 2017, 60
  • [9] Privacy constraint processing in a privacy-enhanced database management system
    Thuraisingham, B
    [J]. DATA & KNOWLEDGE ENGINEERING, 2005, 55 (02) : 159 - 188
  • [10] Invertible Privacy-Preserving Adversarial Reconstruction for Image Compressed Sensing
    Xiao, Di
    Li, Yue
    Li, Min
    [J]. SENSORS, 2023, 23 (07)