Survey on Feature Extraction Techniques for Outsourced Encrypted Multimedia Content Data Analysis

Authors

  • Pranjali M Marne  Department of Computer Network, Sinhgad College of Engineering, Savitribai Phule, Pune University, Pune, 411041, Maharashtra, India.
  • Prof. P.M.Kamde  Department of Computer Network, Sinhgad College of Engineering, Savitribai Phule, Pune University, Pune, 411041, Maharashtra, India.

Keywords:

Personal multimedia data, Outsourced Multimedia data, Cloud computing.

Abstract

Currently, most data owners are interested in outsourcing their large amount of personal multimedia data in the cloud. In such cases, sometimes these outsourced multimedia data may disclose the private information of the owner of the information. Therefore, there is a need for a strong protocol. Currently, most of the techniques have been developed to support the efficient and safe extraction of functions over the outsourced multimedia data. These surveys also make comparative analysis of such techniques, which represents the advantages and limitations. Also after analyzing the techniques, the authors provide a general framework of the system that will be better than the proposed system.

References

  1. Hu S, Wang Q, Wang J, Qin Z, Ren K. SecSIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data," in IEEE Transactions on Image Processing, vol. 25, no. 7, pp. 3411-3425, July 2016.
  2. Q. Wang, S. Hu, K. Ren, J. Wang, Z. Wang, and M. Du,
  3. "Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data,- in Proc. of INFOCOM'16, Accepted to appear, 2016.
  4. K. Ren, C. Wang, and Q. Wang, "Security challenges for the public cloud,- IEEE Internet Computing, vol. 16, no.1, pp. 69–73, 2012.
  5. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement,- IEEE Transactions on Parallel and Distributed Systems, 2015, DOI: 10.1109/TPDS.2015.2506573
  6. Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,- IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2015.
  7. S. Salinas, C. Luo, X. Chen, and P. Li, "Efficient secure outsourcing of large-scale linear systems of equations,- in Proc. of INFOCOM'15.IEEE, 2015, pp. 1035–1043.
  8. L. Weng, L. Amsaleg, A. Morton, and S. Marchand Maillet, "A privacy-preserving framework for large-scale content-based information retrieval,- IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 152–167, 2015.
  9. C.-Y. Hsu, C.-S. Lu, and S.-C. Pei, "Image feature extraction in encrypted domain with privacy-preserving sift,- IEEE Transactions on Image Processing, vol. 21, no. 11, pp. 4593–4607, 2012.
  10. Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-lwe and security for key dependent messages,- in Proc. Of CRYPTO'11. Springer, 2011, pp. 505–524
  11. Z. Ren, L. Wang, Q. Wang and M. Xu, "Dynamic proofs of retrievability for coded cloud storage systems", IEEE Trans. Services Computing, vol. PP, no. 99, pp. 1, Sep. 2015.
  12. Y. Elmehdwi, B. K. Samanthula and W. Jiang, "Secure k-nearest neighbor query over encrypted data in outsourced environments", Proc. IEEE ICDE, pp. 664-675.
  13. M. Osadchy, B. Pinkas, A. Jarrous and B. Moskovich, "SCiFI-A system for secure face identification", Proc. IEEE S&P, pp. 239-254.
  14. L. Zhang, T. Jung, C. Liu, X. Ding, X.-Y. Li and Y. Liu, "POP: Privacy-preserving outsourced photo sharing and searching for mobile devices", Proc. IEEE ICDCS, pp. 308-317.
  15. L. Zhang, T. Jung, P. Feng, K. Liu, X.-Y. Li and Y. Liu, "PIC: Enable large-scale privacy preserving content-based image search on cloud", Proc. IEEE ICPP, pp. 949-958.
  16. C.-Y. Hsu, C.-S. Lu and S. Pei, "Image feature extraction in encrypted domain with privacy-preserving SIFT", IEEE Trans. Image Process., vol. 21, no. 11, pp. 4593-4607, Nov. 2012.
  17. http://www.webopedia.com/TERM/C/cloud_computing.html
  18. M. I. M. Almanea, "A Survey and Evaluation of the Existing Tools that Support Adoption of Cloud Computing and Selection of Trustworthy and Transparent Cloud Providers," Intelligent Networking and Collaborative Systems (INCoS), 2014 International Conference on, Salerno, 2014, pp. 628-634.
  19. M.K. Khan and Q. Malluhi, "Establishing trust in cloud computing", IT Professional, vol. 12, no. 5, pp. 20-27, 2010.
  20. M.R. Savola, A. Juhola and I. Uusitalo, "Towards wider cloud service applicability by security privacy and trust measurements", 4th International Conference on Application of Information and Communication Technologies, 2010. Lambo, Why You Need A Cloud Rating System, 2013.
  21. S. Gagnono, V. Nabelsi, K. Passerini and K. Calisi, "The next web apps architecture: Challenges for saas vendors", IT Professional, vol. 13, no. 5, pp. 44-50, 201
  22. W. Pauley, "Cloud provider transparency: An empirical evaluation", IEEE Security and Privacy, vol. 8, no. 6, pp. 32-39, 2010.
  23. K.S. Garg, S. Versteeg and R. Buyya, A Framework for Ranking of Cloud Computing Services, 2012.

Remember the Windows XP operating system? You can work with it online at GeekPrank.com and trick your friends.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Pranjali M Marne, Prof. P.M.Kamde, " Survey on Feature Extraction Techniques for Outsourced Encrypted Multimedia Content Data Analysis, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.254-260, March-April-2018.