SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud

被引:37
|
作者
Wang, Qian [1 ]
Wang, Jingjun [1 ]
Hu, Shengshan [1 ]
Zou, Qin [1 ]
Ren, Kui [2 ,3 ]
机构
[1] Wuhan Univ, Sch Comp Sci, State Key Lab Software Engn, Wuhan, Peoples R China
[2] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
[3] Jinan Univ, Coll Informat Sci & Technol, Jinan, Peoples R China
基金
美国国家科学基金会;
关键词
HOG; Privacy preservation; Outsourcing Computation; Cloud computing;
D O I
10.1145/2897845.2897861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Abundant multimedia data generated in our daily life has intrigued a variety of very important and useful real-world applications such as object detection and recognition etc. Accompany with these applications, many popular feature descriptors have been developed, e.g., SIFT, SURF and HOG. Manipulating massive multimedia data locally, however, is a storage and computation intensive task, especially for resource-constrained clients. In this work, we focus on exploring how to securely outsource the famous feature extraction algorithm-Histogram of Oriented Gradients (HOG) to untrusted cloud servers, without revealing the data owner's private information. For the first time, we investigate this secure outsourcing computation problem under two different models and accordingly propose two novel privacy-preserving HOG outsourcing protocols, by efficiently encrypting image data by somewhat homomorphic encryption (SHE) integrated with single-instruction multiple-data (SIMD), designing a new batched secure comparison protocol, and carefully redesigning every step of HOG to adapt it to the ciphertext domain. Explicit Security and effectiveness analysis are presented to show that our protocols are practically-secure and can approximate well the performance of the original HOG executed in the plaintext domain. Our extensive experimental evaluations further demonstrate that our solutions achieve high efficiency and perform comparably to the original HOG when being applied to human detection.
引用
收藏
页码:257 / 268
页数:12
相关论文
共 50 条
  • [31] Privacy-Preserving Social Media Data Outsourcing
    Zhang, Jinxue
    Sun, Jingchao
    Zhang, Rui
    Zhang, Yanchao
    Hu, Xia
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1106 - 1114
  • [32] Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
    Dongmei Li
    Xiaolei Dong
    Zhenfu Cao
    Haijiang Wang
    Science China Information Sciences, 2018, 61
  • [33] Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
    Dongmei LI
    Xiaolei DONG
    Zhenfu CAO
    Haijiang WANG
    ScienceChina(InformationSciences), 2018, 61 (03) : 148 - 156
  • [34] SecDM: privacy-preserving data outsourcing framework with differential privacy
    Dagher, Gaby G.
    Fung, Benjamin C. M.
    Mohammed, Noman
    Clark, Jeremy
    KNOWLEDGE AND INFORMATION SYSTEMS, 2020, 62 (05) : 1923 - 1960
  • [35] Privacy-Preserving Computation: Doomed to Succeed
    Campbell, Mark
    COMPUTER, 2022, 55 (08) : 95 - 99
  • [36] Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server
    Zhao, Ling
    Zhang, Mingwu
    Shen, Hua
    Zhang, Yudi
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (02): : 826 - 845
  • [37] Privacy-Preserving Shortest Path Computation
    Wu, David J.
    Zimmerman, Joe
    Planul, Jeremy
    Mitchell, John C.
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [38] Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing
    Zhao, Pu
    Yu, Jia
    Zhang, Hanlin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (03) : 635 - 650
  • [39] Privacy-Preserving HMM Forward Computation
    Ziegeldorf, Jan Henrik
    Metzke, Jan
    Rueth, Jan
    Henze, Martin
    Wehrle, Klaus
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 83 - 94
  • [40] Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks
    Zhang, Jun
    Hu, Shiqing
    Jiang, Zoe Lin
    IEEE ACCESS, 2020, 8 (08): : 111889 - 111898