On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

被引:36
|
作者
Xiong, Lizhi [1 ]
Shi, Yunqing [2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, 219 Ningliu Rd, Nanjing 210044, Jiangsu, Peoples R China
[2] Univ Hts Newark, New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 55卷 / 03期
基金
中国国家自然科学基金;
关键词
Cloud data security; re-encryption; reversible data hiding; cloud computing; privacy-preserving;
D O I
10.3970/cmc.2018.01791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner(,)s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding schemes are proposed for encrypted image data in cloud computing: reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain. The former is that additional bits are extracted after decryption and the latter is that extracted before decryption. Meanwhile, a combined scheme is also designed. This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing, which not only ensures multimedia data security without relying on the trustworthiness of cloud servers, but also guarantees that reversible data hiding can be operated over encrypted images at the different stages. Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme. The computation cost of the proposed scheme is acceptable and adjusts to different security levels.
引用
收藏
页码:523 / 539
页数:17
相关论文
共 50 条
  • [1] Privacy-preserving query over the encrypted image in cloud computing
    [J]. Zhu, X. (zhudongxu@vip.sina.com), 1600, Science Press (41):
  • [2] Privacy-Preserving Pattern Matching over Encrypted Genetic Data in Cloud Computing
    Wang, Bing
    Song, Wei
    Lou, Wenjing
    Hou, Y. Thomas
    [J]. IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [3] Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
    Samanthula, Bharath K.
    Jiang, Wei
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 51 - 58
  • [4] A Privacy-preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data
    Wang, Dongsheng
    Fu, Shaojing
    Xu, Ming
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 663 - 670
  • [5] Privacy-preserving multikey computing framework for encrypted data in the cloud
    Zhang, Jun
    Jiang, Zoe L.
    Li, Ping
    Yiu, Siu Ming
    [J]. INFORMATION SCIENCES, 2021, 575 : 217 - 230
  • [6] Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
    Cao, Ning
    Yang, Zhenyu
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 393 - 402
  • [7] Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing
    Song, Fuyuan
    Qin, Zheng
    Xue, Liang
    Zhang, Jixin
    Lin, Xiaodong
    Shen, Xuemin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6184 - 6198
  • [8] Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
    Hu, Shengshan
    Wang, Qian
    Wang, Jingjun
    Qin, Zhan
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2016, 25 (07) : 3411 - 3425
  • [9] Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing
    Fu, Zhangjie
    Shu, Jiangang
    Wang, Jin
    Liu, Yuling
    Lee, Sungyoung
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (03): : 453 - 460
  • [10] Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data
    Liang, Kaitai
    Huang, Xinyi
    Guo, Fuchun
    Liu, Joseph K.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2365 - 2376