Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (1): 12-17.doi: 10.11959/j.issn.2096-109x.2016.00020

• Comprehensive Reviews • Previous Articles     Next Articles

Privacy-preserving image processing in cloud computing

Kui REN   

  1. Computer Science and Engineering, State University of New York at Buffalo, Buffalo 14260, United States
  • Revised:2016-01-08 Online:2016-01-01 Published:2016-02-16

Abstract:

Enjoying the rapid growth of image data and cloud computing platforms, various image processing ap-plications have emerged and flourished in recent years. Meanwhile, the privacy concerns over the abuse of sensitive information contained in outsourced data also arise in public. In fact, once uploaded to the cloud, the security of us-ers’ private information purely depends on the reliability of the cloud service providers (CSP). To solve this problem, the security requirements and technical challenges lain in privacy-preserving image processing based on different cloud computing architectures were studied, and several solutions to protect the security of outsourced data while enabling functionality of image processing applications were proposed. Several state-of-the-art techniques for secure image processing were introduced and analyzed, including homomorphic encryption (HE) scheme, secure multiparty computation (SMC) protocol, and differential privacy (DP).

Key words: cloud computing, image process, security, cryptography, privacy preservation

CLC Number: 

No Suggested Reading articles found!