Survey on Feature Extraction Techniques for Outsourced Encrypted Multimedia Content Data Analysis

Authors(2) :-Pranjali M Marne, Prof. P.M.Kamde

Currently, most data owners are interested in outsourcing their large amount of personal multimedia data in the cloud. In such cases, sometimes these outsourced multimedia data may disclose the private information of the owner of the information. Therefore, there is a need for a strong protocol. Currently, most of the techniques have been developed to support the efficient and safe extraction of functions over the outsourced multimedia data. These surveys also make comparative analysis of such techniques, which represents the advantages and limitations. Also after analyzing the techniques, the authors provide a general framework of the system that will be better than the proposed system.

Authors and Affiliations

Pranjali M Marne
Department of Computer Network, Sinhgad College of Engineering, Savitribai Phule, Pune University, Pune, 411041, Maharashtra, India.
Prof. P.M.Kamde
Department of Computer Network, Sinhgad College of Engineering, Savitribai Phule, Pune University, Pune, 411041, Maharashtra, India.

Personal multimedia data, Outsourced Multimedia data, Cloud computing.

  1. Hu S, Wang Q, Wang J, Qin Z, Ren K. SecSIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data," in IEEE Transactions on Image Processing, vol. 25, no. 7, pp. 3411-3425, July 2016.
  2. Q. Wang, S. Hu, K. Ren, J. Wang, Z. Wang, and M. Du,
  3. "Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data,- in Proc. of INFOCOM'16, Accepted to appear, 2016.
  4. K. Ren, C. Wang, and Q. Wang, "Security challenges for the public cloud,- IEEE Internet Computing, vol. 16, no.1, pp. 69–73, 2012.
  5. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement,- IEEE Transactions on Parallel and Distributed Systems, 2015, DOI: 10.1109/TPDS.2015.2506573
  6. Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,- IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2015.
  7. S. Salinas, C. Luo, X. Chen, and P. Li, "Efficient secure outsourcing of large-scale linear systems of equations,- in Proc. of INFOCOM'15.IEEE, 2015, pp. 1035–1043.
  8. L. Weng, L. Amsaleg, A. Morton, and S. Marchand Maillet, "A privacy-preserving framework for large-scale content-based information retrieval,- IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 152–167, 2015.
  9. C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, "Image feature extraction in encrypted domain with privacy-preserving sift,- IEEE Transactions on Image Processing, vol. 21, no. 11, pp. 4593–4607, 2012.
  10. Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-lwe and security for key dependent messages,- in Proc. Of CRYPTO'11. Springer, 2011, pp. 505–524
  11. Z. Ren, L. Wang, Q. Wang and M. Xu, "Dynamic proofs of retrievability for coded cloud storage systems", IEEE Trans. Services Computing, vol. PP, no. 99, pp. 1, Sep. 2015.
  12. Y. Elmehdwi, B. K. Samanthula and W. Jiang, "Secure k-nearest neighbor query over encrypted data in outsourced environments", Proc. IEEE ICDE, pp. 664-675.
  13. M. Osadchy, B. Pinkas, A. Jarrous and B. Moskovich, "SCiFI-A system for secure face identification", Proc. IEEE S&P, pp. 239-254.
  14. L. Zhang, T. Jung, C. Liu, X. Ding, X.-Y. Li and Y. Liu, "POP: Privacy-preserving outsourced photo sharing and searching for mobile devices", Proc. IEEE ICDCS, pp. 308-317.
  15. L. Zhang, T. Jung, P. Feng, K. Liu, X.-Y. Li and Y. Liu, "PIC: Enable large-scale privacy preserving content-based image search on cloud", Proc. IEEE ICPP, pp. 949-958.
  16. C.-Y. Hsu, C.-S. Lu and S. Pei, "Image feature extraction in encrypted domain with privacy-preserving SIFT", IEEE Trans. Image Process., vol. 21, no. 11, pp. 4593-4607, Nov. 2012.
  17. http://www.webopedia.com/TERM/C/cloud_computing.html
  18. M. I. M. Almanea, "A Survey and Evaluation of the Existing Tools that Support Adoption of Cloud Computing and Selection of Trustworthy and Transparent Cloud Providers," Intelligent Networking and Collaborative Systems (INCoS), 2014 International Conference on, Salerno, 2014, pp. 628-634.
  19. M.K. Khan and Q. Malluhi, "Establishing trust in cloud computing", IT Professional, vol. 12, no. 5, pp. 20-27, 2010.
  20. M.R. Savola, A. Juhola and I. Uusitalo, "Towards wider cloud service applicability by security privacy and trust measurements", 4th International Conference on Application of Information and Communication Technologies, 2010. Lambo, Why You Need A Cloud Rating System, 2013.
  21. S. Gagnono, V. Nabelsi, K. Passerini and K. Calisi, "The next web apps architecture: Challenges for saas vendors", IT Professional, vol. 13, no. 5, pp. 44-50, 201
  22. W. Pauley, "Cloud provider transparency: An empirical evaluation", IEEE Security and Privacy, vol. 8, no. 6, pp. 32-39, 2010.
  23. K.S. Garg, S. Versteeg and R. Buyya, A Framework for Ranking of Cloud Computing Services, 2012.

Remember the Windows XP operating system? You can work with it online at GeekPrank.com and trick your friends.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 254-260
Manuscript Number : CSEIT1833254
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Pranjali M Marne, Prof. P.M.Kamde, "Survey on Feature Extraction Techniques for Outsourced Encrypted Multimedia Content Data Analysis", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.254-260, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT1833254

Article Preview

Follow Us

Contact Us