Issue No.01 - June (2013 vol.1)
Janet M. Roveda , Department of Electrical and Computer Engineering, University of Arizona at Tucson, Tucson, AZ, USA
Large-scale image data sets are being exponentially generated today. Along with such data explosion is the fast-growing trend to outsource the image management systems to the cloud for its abundant computing resources and benefits. How to protect the sensitive data while enabling outsourced image services, however, becomes a major concern. To address these challenges, we propose outsourced image recovery service (OIRS), a novel outsourced image recovery service architecture, which exploits different domain technologies and takes security, efficiency, and design complexity into consideration from the very beginning of the service flow. Specifically, we choose to design OIRS under the compressed sensing framework, which is known for its simplicity of unifying the traditional sampling and compression for image acquisition. Data owners only need to outsource compressed image samples to cloud for reduced storage overhead. In addition, in OIRS, data users can harness the cloud to securely reconstruct images without revealing information from either the compressed image samples or the underlying image content. We start with the OIRS design for sparse data, which is the typical application scenario for compressed sensing, and then show its natural extension to the general data for meaningful tradeoffs between efficiency and accuracy. We thoroughly analyze the privacy-protection of OIRS and conduct extensive experiments to demonstrate the system effectiveness and efficiency. For completeness, we also discuss the expected performance speedup of OIRS through hardware built-in system design.
Image reconstruction, Image coding, Compressed sensing, Outsourcing, Cryptography, Context awareness, Network security,image reconstruction, Compressed sensing, security and privacy, cloud computing
Janet M. Roveda, "Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud", IEEE Transactions on Emerging Topics in Computing, vol.1, no. 1, pp. 166-177, June 2013, doi:10.1109/TETC.2013.2273797