On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

被引:36
|
作者
Xiong, Lizhi [1 ]
Shi, Yunqing [2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, 219 Ningliu Rd, Nanjing 210044, Jiangsu, Peoples R China
[2] Univ Hts Newark, New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 55卷 / 03期
基金
中国国家自然科学基金;
关键词
Cloud data security; re-encryption; reversible data hiding; cloud computing; privacy-preserving;
D O I
10.3970/cmc.2018.01791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner(,)s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding schemes are proposed for encrypted image data in cloud computing: reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain. The former is that additional bits are extracted after decryption and the latter is that extracted before decryption. Meanwhile, a combined scheme is also designed. This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing, which not only ensures multimedia data security without relying on the trustworthiness of cloud servers, but also guarantees that reversible data hiding can be operated over encrypted images at the different stages. Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme. The computation cost of the proposed scheme is acceptable and adjusts to different security levels.
引用
收藏
页码:523 / 539
页数:17
相关论文
共 50 条
  • [21] Privacy-Preserving Multi-Keyword Search over the Encrypted Data for Multiple Users in Cloud Computing
    Ranjan, Khirendra Alok
    Pasupulati, Syam Kumar
    Ramaligam, Subramanian
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 1079 - 1084
  • [22] An Efficient Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Data in Cloud Computing
    Ahmad, Shadab
    Kurnar, Pasupuleti Syam
    [J]. 2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [23] Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3167 - 3177
  • [24] A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing
    Wang, Xin
    Yang, Bo
    Xia, Zhe
    Zhao, Yanqi
    Yu, Huifang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [25] A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing
    Shen, Jian
    Yang, Huijie
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2198 - 2210
  • [26] Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data
    Yang, Yutao
    Miao, Yinbin
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    [J]. 2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 392 - 402
  • [27] Privacy-Preserving Ranked Fuzzy Keyword Search over Encrypted Cloud Data
    Xu, Qunqun
    Shen, Hong
    Sang, Yingpeng
    Tian, Hui
    [J]. 2013 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2013, : 239 - 245
  • [28] Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment
    Feng, Jun
    Yang, Laurence T.
    Zhu, Qing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 857 - 868
  • [29] Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud
    Yang, Dan
    Chen, Yu-Chi
    Ye, Shaozhen
    Tso, Raylin
    [J]. IEEE ACCESS, 2018, 6 : 63624 - 63634
  • [30] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414