Perfectly Secure Shamir's Secret Sharing Scheme for Privacy Preserving Image Processing Over Cloud

被引:0
|
作者
Sadhya, Debanjan [1 ]
Agarwal, Akshay [2 ]
Raman, Balasubramanian [1 ]
机构
[1] Indian Inst Technol Roorkee, Roorkee, Uttar Pradesh, India
[2] Manipal Inst Technol, Manipal, India
关键词
Cloud Computing; Shamir's Secret Sharing; Perfect Secrecy; Encrypted Domain;
D O I
10.1145/3293353.3293360
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a highly prospective paradigm in which computational resources from third parties are used for processing outsourced data. Nonetheless, the distributed architecture of this concept poses many security and privacy threats for the data owners. Shamir's secret sharing is an effective technique for distributing and processing secret images over the encrypted domain. However, it has got some critical limitations primarily due to the presence of correlated information between the image pixels. Our study addresses this problem by proposing a perfectly secure Shamir's secret sharing scheme for images. Our work builds upon the formal notion of perfect secrecy for encoding the Shamir's shares in a particular manner such that they (i.e. encoded shares) do not reveal any additional information about the original image. Importantly, we have provided both theoretical and empirical validation of our proposed approach. We have also performed several image filtering operations on the stored shares and found the resulting PSNR and NCC values to be similar in the plain and encrypted domains. Hence our work provides a privacy-preserving and secure framework for working with images over a cloud-based architecture.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] A privacy preserving federated learning scheme using homomorphic encryption and secret sharing
    Shi, Zhaosen
    Yang, Zeyu
    Hassan, Alzubair
    Li, Fagen
    Ding, Xuyang
    TELECOMMUNICATION SYSTEMS, 2023, 82 (03) : 419 - 433
  • [42] Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services
    Ohigashi, Toshihiro
    Nishimura, Kouji
    Aibara, Reiji
    Yoshida, Kouta
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 78 - 83
  • [43] A privacy preserving federated learning scheme using homomorphic encryption and secret sharing
    Zhaosen Shi
    Zeyu Yang
    Alzubair Hassan
    Fagen Li
    Xuyang Ding
    Telecommunication Systems, 2023, 82 : 419 - 433
  • [44] POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing
    Tianpeng Deng
    Xuan Li
    Jinbo Xiong
    Ying Wu
    Multimedia Tools and Applications, 2022, 81 : 3693 - 3714
  • [45] POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing
    Deng, Tianpeng
    Li, Xuan
    Xiong, Jinbo
    Wu, Ying
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (03) : 3693 - 3714
  • [46] Secure data deduplication using secret sharing schemes over cloud
    Singh, Priyanka
    Agarwal, Nishant
    Raman, Balasubramanian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 156 - 167
  • [47] Highly efficient and secure multi-secret image sharing scheme
    Chen, Chien-Chang
    Wu, Wei-Jie
    Chen, Jun-Long
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (12) : 7113 - 7128
  • [48] Highly efficient and secure multi-secret image sharing scheme
    Chien-Chang Chen
    Wei-Jie Wu
    Jun-Long Chen
    Multimedia Tools and Applications, 2016, 75 : 7113 - 7128
  • [49] Enhanced semantic visual secret sharing scheme for the secure image communication
    Blesswin, John A.
    Raj, Christhu
    Sukumaran, Rajeev
    Mary, Selva G.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 17057 - 17079
  • [50] A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node-Edge-Cloud Collaborative Computation
    Zheng, Kaifa
    Ding, Caiyang
    Wang, Jinchen
    ELECTRONICS, 2023, 12 (12)