SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud

被引:37
|
作者
Wang, Qian [1 ]
Wang, Jingjun [1 ]
Hu, Shengshan [1 ]
Zou, Qin [1 ]
Ren, Kui [2 ,3 ]
机构
[1] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan, Peoples R China
[2] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[3] Jinan Univ, Coll Informat Sci & Technol, Jinan, Peoples R China
基金
美国国家科学基金会;
关键词
HOG; Privacy preservation; Outsourcing Computation; Cloud computing;
D O I
10.1145/2897845.2897861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Abundant multimedia data generated in our daily life has intrigued a variety of very important and useful real-world applications such as object detection and recognition etc. Accompany with these applications, many popular feature descriptors have been developed, e.g., SIFT, SURF and HOG. Manipulating massive multimedia data locally, however, is a storage and computation intensive task, especially for resource-constrained clients. In this work, we focus on exploring how to securely outsource the famous feature extraction algorithm-Histogram of Oriented Gradients (HOG) to untrusted cloud servers, without revealing the data owner's private information. For the first time, we investigate this secure outsourcing computation problem under two different models and accordingly propose two novel privacy-preserving HOG outsourcing protocols, by efficiently encrypting image data by somewhat homomorphic encryption (SHE) integrated with single-instruction multiple-data (SIMD), designing a new batched secure comparison protocol, and carefully redesigning every step of HOG to adapt it to the ciphertext domain. Explicit Security and effectiveness analysis are presented to show that our protocols are practically-secure and can approximate well the performance of the original HOG executed in the plaintext domain. Our extensive experimental evaluations further demonstrate that our solutions achieve high efficiency and perform comparably to the original HOG when being applied to human detection.
引用
收藏
页码:257 / 268
页数:12
相关论文
共 50 条
  • [1] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [2] Outsourcing Privacy-Preserving Social Networks to a Cloud
    Wang, Guojun
    Liu, Qin
    Li, Feng
    Yang, Shuhui
    Wu, Jie
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2886 - 2894
  • [3] Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Schoenmakers, Berry
    Veeningen, Meilof
    de Vreede, Niels
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 346 - 366
  • [4] Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud
    Fu, Shaojing
    Yu, Yunpeng
    Xu, Ming
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 3 - 15
  • [5] Privacy-preserving logistic regression outsourcing in cloud computing
    Zhu, Xu Dong
    Li, Hui
    Li, Feng Hua
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 144 - 150
  • [6] Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain
    Zhang, Yonghong
    Zheng, Peijia
    Luo, Weiqi
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 389 - 396
  • [7] Privacy-preserving outsourcing of image feature extraction in cloud computing
    Ping Li
    Tong Li
    Zheng-An Yao
    Chun-Ming Tang
    Jin Li
    Soft Computing, 2017, 21 : 4349 - 4359
  • [8] CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
    Wang, Qian
    Hu, Shengshan
    Ren, Kui
    He, Meiqi
    Du, Minxin
    Wang, Zhibo
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 186 - 205
  • [9] Privacy-preserving outsourcing of image feature extraction in cloud computing
    Li, Ping
    Li, Tong
    Yao, Zheng-An
    Tang, Chun-Ming
    Li, Jin
    SOFT COMPUTING, 2017, 21 (15) : 4349 - 4359
  • [10] Privacy-Preserving Cloud Computation of Algebraic Riccati Equations
    Malladi, Surya
    Monshizadeh, Nima
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 223 - 228