Privacy-Preserving Outsourcing of Medical Image Data using SIFT Descriptor
Keywords:
Image matching, SIFT, DoGAbstract
Outsourcing huge amount of personal multimedia data in these days become a challenging task for the data owners which is greatly motivated by the advances in cloud computing by using its several resources for cost saving and flexibility. despite these facts, outsourcing of multimedia data may leak the data owner’s private information, such as the personal identity, locations, or even financial profiles.in this paper, we present an effective and practical privacy-preserving computation outsourcing protocol for persuading scale-invariant feature transform (SIFT) over huge encrypted image data. We first explain the previous solutions to this problem which is either efficiency or security issues, and no one can well maintain the important functionality of the original SIFT in terms of distinctiveness and robustness. Next, we present a new scheme that achieves practicality requirements along with the maintenance of its key functionality, by first splitting the original image data and designing two novel efficient protocols for secure calculations like multiplication and comparison, then carefully distributing the feature extracted onto two independent cloud servers. Which results into practically secure solution and outperforms the state-of-the-art, with the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, and an addition of noise and change in 3D viewpoint and illumination. To deal with the privacy of important medical multimedia data we took brain tumor as our case study. The Brain Tumor is affecting many people worldwide. It is not only limited to the old age people but also detected in the early age. The encrypted images are stored in the cloud. From the encrypted images we will check for brain tumor using OpenCV and preserve this information by getting revealed using our proposed method.
References
Q. Wang, S. Hu, K. Ren, J. Wang, Z. Wang, and M. Du, “Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data,” in Proc. INFOCOM, 2016, pp. 1170–1178.
K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Comput., vol. 16, no. 1, pp. 69–73, Jan. 2012.
Z. Ren, L. Wang, Q. Wang, and M. Xu, “Dynamic proofs of retrievability for coded cloud storage systems,” IEEE Trans. Services Computing, vol. PP, no. 99, P. 1, Sep. 2015, doi: 10.1109/TSC.2015.2481880.
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Trans. Parallel Distrib. Syst., vol. PP, no. 99, P. 1, Dec. 2015, doi: 10.1109/TPDS.2015.2506573.
Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multikeyword ranked search scheme over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016.
L. Weng, L. Amsaleg, A. Morton, and S. Marchand-Maillet, “A privacy-preserving framework for large-scale content-based information retrieval,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 152–167, Jan. 2015.
P. Paillier and D. Pointcheval, “Efficient public-key cryptosystems provably secure against active adversaries,” in Proc. ASIACRYPT, 1999, pp. 165–179.
M. Schneider and T. Schneider, “Notes on non-interactive secure comparison in ‘image feature extraction in the encrypted domain with privacy-preserving SIFT,”’ in Proc. IH&MMSec, 2014, pp. 135–140
Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, “Towards efficient privacy-preserving image feature extraction in cloud computing,” in Proc. ACM MM, 2014, pp. 497–506.
A. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill, “Order-preserving symmetric encryption,” in Advances in Cryptology—EUROCRYPT. Cologne, Germany: Springer, 2009, pp. 224–241.
S. Wang, M. Nassar, M. Atallah, and Q. Malluhi, “Secure and private outsourcing of shape-based feature extraction,” in Proc. ICICS, 2013, pp. 90–99
Zeng, Hong, and Aiguo Song. "Optimizing Single-Trial EEG Classification by Stationary Matrix Logistic Regression in Brain-Computer Interface." (2015)
S. Salinas, C. Luo, X. Chen, and P. Li, “Efficient secure outsourcing of large-scale linear systems of equations,” in Proc. IEEE INFOCOM, Apr./May 2015, pp. 1035–1043.
S. Hohenberger and A. Lysyanskaya, “How to securely outsource cryptographic computations,” in Theory of Cryptography. Cambridge, MA, USA: Springer, 2005, pp. 264–282
S. Hohenberger and A. Lysyanskaya, “How to securely outsource cryptographic computations,” in Theory of Cryptography. Cambridge, MA, USA: Springer, 2005, pp. 264–282
L. Weng, L. Amsaleg, A. Morton, and S. Marchand-Maillet, “A privacy-preserving framework for large-scale content-based information retrieval,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 152–167, Jan. 2015.
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, “SCiFI— A system for secure face identification,” in Proc. IEEE S&P, May 2010, pp. 239–254.
Q. Wang, S. Hu, K. Ren, M. He, M. Du, and Z. Wang, “CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud,” in Computer Security—ESORICS. Vienna, Austria: Springer, 2015, pp. 186–205.
Z. Brakerski and V. Vaikuntanathan, “Fully homomorphic encryption from ring-LWE and security for key dependent messages,” in Advances in Cryptology—CRYPTO. Santa Barbara, CA, USA: Springer, 2011, pp. 505–524.
N. P. Smart and F. Vercauteren, “Fully homomorphic SIMD operations,” Designs, Codes Cryptogr., vol. 71, no. 1, pp. 57–81, 2014.
I. Damgård, V. Pastro, N. Smart, and S. Zakarias, “Multiparty computation from somewhat homomorphic encryption,” in Advances in Cryptology—CRYPTO. Santa Barbara, CA, USA: Springer, 2012, pp. 643–662.
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, “On private scalar product computation for privacy-preserving data mining,” in Information Security and Cryptology—ICISC. Seoul, South Korea: Springer, 2005, pp. 104–120.
Y. Qi and M. J. Atallah, “Efficient privacy-preserving k-nearest neighbor search,” in Proc. IEEE ICDCS, Jun. 2008, pp. 311–319.
Y. Ke and R. Sukthankar, “PCA-SIFT: A more distinctive representation for local image descriptors,” in Proc. IEEE CVPR, vol. 2. Jun./Jul. 2004, pp. II-506–II-513.
J. Philbin, O. Chum, M. Isard, J. Sivic, and A. Zisserman, “Object retrieval with large vocabularies and fast spatial matching,” in Proc. IEEE CVPR, Jun. 2007, pp. 1–8.
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, “On private scalar product computation for privacy-preserving data mining,” in Information Security and Cryptology—ICISC. Seoul, South Korea: Springer, 2005, pp. 104–120.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.