Perfectly Secure Shamir's Secret Sharing Scheme for Privacy Preserving Image Processing Over Cloud

被引:0
|
作者
Sadhya, Debanjan [1 ]
Agarwal, Akshay [2 ]
Raman, Balasubramanian [1 ]
机构
[1] Indian Inst Technol Roorkee, Roorkee, Uttar Pradesh, India
[2] Manipal Inst Technol, Manipal, India
关键词
Cloud Computing; Shamir's Secret Sharing; Perfect Secrecy; Encrypted Domain;
D O I
10.1145/3293353.3293360
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a highly prospective paradigm in which computational resources from third parties are used for processing outsourced data. Nonetheless, the distributed architecture of this concept poses many security and privacy threats for the data owners. Shamir's secret sharing is an effective technique for distributing and processing secret images over the encrypted domain. However, it has got some critical limitations primarily due to the presence of correlated information between the image pixels. Our study addresses this problem by proposing a perfectly secure Shamir's secret sharing scheme for images. Our work builds upon the formal notion of perfect secrecy for encoding the Shamir's shares in a particular manner such that they (i.e. encoded shares) do not reveal any additional information about the original image. Importantly, we have provided both theoretical and empirical validation of our proposed approach. We have also performed several image filtering operations on the stored shares and found the resulting PSNR and NCC values to be similar in the plain and encrypted domains. Hence our work provides a privacy-preserving and secure framework for working with images over a cloud-based architecture.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [2] An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs
    Qi, Jiayu
    Gao, Tianhan
    Zhao, Cong
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2023, 2023, 177 : 138 - 148
  • [3] Collusion resistant secret sharing scheme for secure data storage and processing over cloud
    Lakshmi, V.S.
    Deepthi, S.
    Deepthi, P.P.
    Journal of Information Security and Applications, 2021, 60
  • [4] A Privacy-Preserving Asynchronous Averaging Algorithm based on Shamir's Secret Sharing
    Li, Qiongxiu
    Christensen, Mads Graesboll
    2019 27TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2019,
  • [5] Secure image secret sharing over distributed cloud network
    Wu, Xiaotian
    Yang, Ching-Nung
    Li, Jian-Ming
    SIGNAL PROCESSING, 2021, 178
  • [6] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [7] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [8] Medical image security and EPR hiding using Shamir's secret sharing scheme
    Ulutas, Mustafa
    Ulutas, Guzin
    Nabiyev, Vasif V.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (03) : 341 - 353
  • [9] Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir's secret sharing scheme
    Chahar, Harendra
    Keshavamurthy, B. N.
    Modi, Chirag
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (12): : 1997 - 2007
  • [10] Participants Increasing for Shamir's Polynomial-based Secret Image Sharing Scheme
    Ding, Wanmeng
    Liu, Kesheng
    Liu, Lintao
    Yan, Xuehu
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 32 - 36