scispace - formally typeset
Journal ArticleDOI

Secure signal processing in the cloud: enabling technologies for privacy-preserving multimedia cloud processing

TLDR
The cloud is a very appealing concept both for the providers and for the users, who can avoid the initial investment on resources by outsourcing their processes and data to a cloud.
Abstract
In recent years, the paradigm of cloud computing has gained an increasing interest from the academic community as well as from the commercial point of view. The cloud is a very appealing concept both for the providers (who can benefit from hiring out their extra computation and storage resources) and for the users (who can avoid the initial investment on resources by outsourcing their processes and data to a cloud).

read more

Citations
More filters
Journal ArticleDOI

Multi-biometric template protection based on Homomorphic Encryption

TL;DR: A general framework for multi-biometric template protection based on homomorphic probabilistic encryption, where only encrypted data is handled, showing that all requirements described in the ISO/IEC 24745 standard on biometric data protection are met with no accuracy degradation.
Journal ArticleDOI

Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories

TL;DR: This paper proposes a secure framework for outsourced privacy-preserving storage and retrieval in large shared image repositories based on IES-CBIR, a novel Image Encryption Scheme that exhibits Content-Based Image Retrieval properties.
Journal ArticleDOI

Exploiting multimedia services in mobile social networks from security and privacy perspectives

TL;DR: This article investigates the security and privacy issues of multimedia services by studying a newly emerging multimedia-oriented mobile social network (MMSN), which helps users receive multimedia services not only from their online social communities but also from their social friends in the vicinity.
Journal ArticleDOI

Fully Private Noninteractive Face Verification

TL;DR: This work presents a private face verification system that can be executed in the server without interaction, working with encrypted feature vectors for both the templates and the probe face, and opens the door to completely private and noninteractive outsourcing of face verification.
Posted Content

Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version).

TL;DR: In this article, a secure framework for outsourced privacy-preserving storage and retrieval in large image repositories is proposed based on IES-CBIR, a novel Image Encryption Scheme that displays Content-Based Image Retrieval properties.
References
More filters
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal Article

Above the Clouds: A Berkeley View of Cloud Computing

TL;DR: This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Book ChapterDOI

Differential privacy

TL;DR: In this article, the authors give a general impossibility result showing that a formalization of Dalenius' goal along the lines of semantic security cannot be achieved, and suggest a new measure, differential privacy, which, intuitively, captures the increased risk to one's privacy incurred by participating in a database.
Proceedings ArticleDOI

Leveled) fully homomorphic encryption without bootstrapping

TL;DR: A novel approach to fully homomorphic encryption (FHE) that dramatically improves performance and bases security on weaker assumptions, using some new techniques recently introduced by Brakerski and Vaikuntanathan (FOCS 2011).