SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud

被引:37
|
作者
Wang, Qian [1 ]
Wang, Jingjun [1 ]
Hu, Shengshan [1 ]
Zou, Qin [1 ]
Ren, Kui [2 ,3 ]
机构
[1] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan, Peoples R China
[2] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[3] Jinan Univ, Coll Informat Sci & Technol, Jinan, Peoples R China
基金
美国国家科学基金会;
关键词
HOG; Privacy preservation; Outsourcing Computation; Cloud computing;
D O I
10.1145/2897845.2897861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Abundant multimedia data generated in our daily life has intrigued a variety of very important and useful real-world applications such as object detection and recognition etc. Accompany with these applications, many popular feature descriptors have been developed, e.g., SIFT, SURF and HOG. Manipulating massive multimedia data locally, however, is a storage and computation intensive task, especially for resource-constrained clients. In this work, we focus on exploring how to securely outsource the famous feature extraction algorithm-Histogram of Oriented Gradients (HOG) to untrusted cloud servers, without revealing the data owner's private information. For the first time, we investigate this secure outsourcing computation problem under two different models and accordingly propose two novel privacy-preserving HOG outsourcing protocols, by efficiently encrypting image data by somewhat homomorphic encryption (SHE) integrated with single-instruction multiple-data (SIMD), designing a new batched secure comparison protocol, and carefully redesigning every step of HOG to adapt it to the ciphertext domain. Explicit Security and effectiveness analysis are presented to show that our protocols are practically-secure and can approximate well the performance of the original HOG executed in the plaintext domain. Our extensive experimental evaluations further demonstrate that our solutions achieve high efficiency and perform comparably to the original HOG when being applied to human detection.
引用
收藏
页码:257 / 268
页数:12
相关论文
共 50 条
  • [21] Lightning-fast and privacy-preserving outsourced computation in the cloud
    Ximeng Liu
    Robert H. Deng
    Pengfei Wu
    Yang Yang
    Cybersecurity, 3
  • [22] Lightning-fast and privacy-preserving outsourced computation in the cloud
    Liu, Ximeng
    Deng, Robert H.
    Wu, Pengfei
    Yang, Yang
    CYBERSECURITY, 2020, 3 (01)
  • [23] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588
  • [24] Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit
    Li, Jialin
    Lu, Penghao
    Lin, Xuemin
    IEEE ACCESS, 2022, 10 : 39407 - 39423
  • [25] Privacy-preserving computation on grid
    School of Electronic and Information, Wuhan University, Wuhan 430079, China
    不详
    Huazhong Ligong Daxue Xuebao, 2008, 1 (52-54):
  • [26] Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud
    Xie, Dawei
    Yang, Haining
    Qin, Jing
    Ma, Jixin
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (04) : 14 - 27
  • [27] On Privacy-preserving Cloud Auction
    Chen, Zhili
    Chen, Lin
    Huang, Liusheng
    Zhong, Hong
    PROCEEDINGS OF 2016 IEEE 35TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2016, : 279 - 288
  • [28] Private Image Computation: the Case of Cloud based Privacy-preserving SIFT
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 179 - 180
  • [29] Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
    Li, Dongmei
    Dong, Xiaolei
    Cao, Zhenfu
    Wang, Haijiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [30] Fast privacy-preserving network function outsourcing
    Asghar, Hassan Jameel
    De Cristofaro, Emiliano
    Jourjon, Guillaume
    Kaafar, Mohammed Ali
    Mathy, Laurent
    Melis, Luca
    Russell, Craig
    Yu, Mang
    COMPUTER NETWORKS, 2019, 163