4.7 Article

A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud

Journal

INFORMATION SCIENCES
Volume 387, Issue -, Pages 132-145

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2016.09.045

Keywords

Compressive sensing; Cloud security; Privacy preserving; Image storage; Watermark detection in the encrypted domain

Funding

  1. National Natural Science Foundation of China [61272043, 61472464, 61502399, 61572089]
  2. Natural Science Foundation of Chongqing Science and Technology Commission [cstc2012jjA40017, cstc2013jcyjA40017, cstc2013jjB40009, cstc2015jcyjA40039]
  3. Chongqing Graduate Student Research Innovation Projects [CYB14002]
  4. Chongqing Higher Education Reform Projects [153012]
  5. Fundamental Research Funds for the Central Universities [106112013CDJZR180005, 106112014CDJZR185501]

Ask authors/readers for more resources

The theory of Compressive Sensing (CS) enables the compact storage of image datasets which are exponentially generated today. In this application, the high computational complexity CS reconstruction process is considered to be outsourced to the cloud for its abundant computing and storage resources. Although it is promising, how to protect data privacy and simultaneously maintain management of the image remains challenging. To address the challenge, we propose a novel outsourced image reconstruction and identity authentication service in cloud, which integrates the techniques of signal processing in the CS domain and computation outsourcing. In our system, the image CS samples are out sourced to cloud for reduced storage. For privacy, the scheme ensures the cloud to securely reconstruct image without revealing the underlying content. For management, whether the cloud determines to supply the reconstruction service is depending on the identity authentication result. Theoretical analysis and empirical evaluations show a satisfactory security performance and low computational complexity of the proposed system. Besides, experimental results also confirm the feasibility of identity authentication in the CS domain. (C) 2016 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available