Hiding Media Data via Shaders: Enabling Private Sharing in the Clouds

被引:2
|
作者
Liu, Kaikai [1 ]
Li, Min [1 ]
Li, Xiaolin [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
关键词
Privacy; Cloud; Media Data; Encryption; Format-Compliant; Chaotic Mapping;
D O I
10.1109/CLOUD.2015.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of Cloud and Social Networks, mobile devices exhibit much more powerful abilities for big media data storage and sharing. However, many users are still reluctant to share/store their data via clouds due to the potential leakage of confidential or private information. Although some cloud services provide storage encryption and access protection, privacy risks are still high since the protection is not always adequately conducted from end-to-end. Most customers are aware of the danger of letting data control out of their hands, e.g., storing them to YouTube, Flickr, Facebook, Google+. Because of substantial practical and business needs, existing cloud services are restricted to the desired formats, e.g., video and photo, without allowing arbitrary encrypted data. In this paper, we propose a format-compliant end-to-end privacy-preserving scheme for media sharing/storage issues with considerations for big data, clouds, and mobility. To realize efficient encryption for big media data, we jointly achieve format-compliant, compression-independent and correlation-preserving via multi-channel chained solutions under the guideline of Markov cipher. The encryption and decryption process is integrated into an image/video filter via GPU Shader for display-to-display full encryption. The proposed scheme makes big media data sharing/storage safer and easier in the clouds.
引用
收藏
页码:122 / 129
页数:8
相关论文
共 50 条
  • [1] Understanding Data Sharing in Private Personal Clouds
    Gracia-Tinedo, Raul
    Garcia-Lopez, Pedro
    Gomez, Alberto
    Illana, Anastasio
    [J]. PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 392 - 399
  • [2] Media compression via data hiding
    Zhu, B
    Tewfik, AH
    [J]. THIRTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 1998, : 647 - 651
  • [3] Cpds: Enabling Compressed and Private Data Sharing for Industrial Internet of Things Over Blockchain
    Qi, Saiyu
    Lu, Youshui
    Zheng, Yuanqing
    Li, Yumo
    Chen, Xiaofeng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) : 2376 - 2387
  • [4] Data Sharing via Differentially Private Coupled Matrix Factorization
    Ermis, Beyza
    Cemgil, A. Taylan
    [J]. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2020, 14 (03)
  • [5] Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems
    Zhiqiang Wang
    Wenjing Gao
    Ming Yang
    Rong Hao
    [J]. Cluster Computing, 2023, 26 : 3839 - 3854
  • [6] Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems
    Wang, Zhiqiang
    Gao, Wenjing
    Yang, Ming
    Hao, Rong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3839 - 3854
  • [7] Enabling Secure VM-vTPM Migration in Private Clouds
    Danev, Boris
    Masti, Ramya Jayaram
    Karame, Ghassan O.
    Capkun, Srdjan
    [J]. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 187 - 196
  • [8] A reversible data hiding scheme for sharing medical data
    Singh, Upasana
    Singh, V. B.
    [J]. BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2023, 85
  • [9] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [10] Efficient Block wise Data Hiding for Securely Digital Image Sharing by Diverse Image Media
    Udmale, Ashwini M.
    Nimbekar, S. B.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 133 - 137