信息安全研究 ›› 2017, Vol. 3 ›› Issue (5): 400-411.
朱斌
收稿日期:
2017-05-16
出版日期:
2017-05-16
发布日期:
2017-05-16
通讯作者:
朱斌
作者简介:
博士,研究员,主要研究方向为信息和网络安全、人机识别、数据和代码分析等.
Received:
2017-05-16
Online:
2017-05-16
Published:
2017-05-16
摘要: 在云计算发展趋势的引领下,越来越多的数据和应用程序(包括多媒体数据和应用程序)已被转移到云.阻碍许多人使用公共云计算的一个关键障碍是失去对云上数据的控制.通过回顾保护隐私的云计算技术(尤其在多媒体云计算领域)来打破这个障碍.这些技术在保护用户数据的同时允许云执行所需的计算.
朱斌. 保护隐私的云计算研究——聚焦多媒体应用[J]. 信息安全研究, 2017, 3(5): 400-411.
[1]方俊. 多媒体与云计算[J]. 计算机应用与软件, 2011, 28(10): 291296[2]Zhu W, Luo C, Wang J, et al. Multimedia cloud computing[J]. IEEE Signal Processing Magazine, 2011, 28(3): 5969[3]Microsoft Azure[OL]. [20170415]. https:azure.microsoft.com[4]Amazon Web Services[OL]. [20170415]. https:aws.amazon.com[5]Google Cloud[OL]. [20170415]. https:cloud.google.com[6]阿里云[OL]. [20170415]. https:cn.aliyun.com[7]TroncosoPastoriza J R, PerezGonzalez F. Secure signal processing in the cloud: Enabling technologies for privacypreserving multimedia cloud processing[J]. IEEE Signal Processing Magazine. 2013, 30(2): 2941[8]Arthur C. Naked celebrity hack: Security experts focus on iCloud backup theory[OL]. (20140901) [20170415]. https:www.theguardian.comtechnology2014sep01nakedcelebrityhackicloudbackupjenniferlawrence[9]Apple Inc. Apple media advisory: Update to celebrity photo investigation[OL]. (20140902) [20170415]. http:www.apple.comprlibrary20140902AppleMediaAdvisory.html[10]Apple Inc. iCloud security and privacy overview[OL]. [20170415]. https:support.apple.comenusHT202303[11]安防网. 监控视频被直播 个人隐私无处“藏”[OL]. [20170415]. http:security.ofweek.com201510ART510011844029013063.html[12]Schuster F, Costa M, Fournet C, et al. VC3: Trustworthy data analytics in the cloud using SGX[C] Proc of 2015 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2015: 3854[13]Anati I, Gueron S, Johnsen S, et al. Innovative technology for CPU based attestation and sealing[C] Proc of the 2nd Int Workshop on Hardware and Architectural Support for Security and Privacy. 2013[14]Ohrimenko O, Schuster F, Fournet C, et al. Oblivious multiparty machine learning on trusted processors[C] Berkeley: USENIX Association, 2016: 619636[15]Xu Y, Cui W, Peinado M. Controlledchannel attacks: Deterministic side channels for untrusted operating systems[C] Proc of 2015 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2015: 640656[16]Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978, 4(11): 169180[17]谢杏. 密码算法的同态计算[D]. 西安: 西安电子科技大学, 2014[18]Paillier P. Publickey cryptosystems based on composite degree residuosity classes[C] Proc of Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1999: 223238[19]Gentry C. Fully homomorphic encryption using ideal lattices[C] Proc of ACM Symp on Theory of Computing (SToC 2009). New York: ACM, 2009: 169178[20]Yagisawa M. Fully Homomorphic Encryption without bootstrapping[C] Proc of IACR Cryptology ePrint Archive. 2015: 474[21]FIPS 197. Announcing the Advanced Encryption Standard (AES)[OL] [20170415]. http:nvlpubs.nist.govnistpubsFIPSNIST.FIPS.197.pdf[22]Gentry C, Halevi S, Smart N P. Homomorphic evaluation of the AES circuit[C] Proc of Advances in Cryptology—CRYPTO 2012. Berlin: Springer, 2012: 850867[23]Bianchi T, Piva A, Barni M. On the implementation of the discrete Fourier transform in the encrypted domain[J]. IEEE Trans on Information Forensics and Security, 2009, 4(1): 8697[24]Bianchi T, Piva A, Barni M. Encrypted domain DCT based on homomorphic cryptosystems[J]. EURASIP Journal on Information Security, 2009, 2009(1): 716357[25]Zheng P, Huang J. Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain[J]. IEEE Trans on Image Processing, 2013, 22(6): 24552468[26]Zheng P, Huang J. WalshHadamard transform in the homomorphic encrypted domain and its application in image watermarking[C] Proc of Int Workshop on Information Hiding. Berlin: Springer, 2012: 240254[27]Chen Y C, Shiu C W, Horng G. Encrypted signalbased reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25(5): 11641170[28]Zhang X, Long J, Wang Z, et al. Lossless and reversible data hiding in encrypted images with publickey cryptography[J]. IEEE Trans on Circuits and Systems for Video Technology, 2016, 26(9): 16221631[29]Hsu C Y, Lu C S, Pei S C. Image feature extraction in encrypted domain with privacypreserving SIFT[J]. IEEE Trans on Image Processing, 2012, 21(11): 45934607[30]Bai Y, Zhuo L, Cheng B, et al. Surf feature extraction in encrypted domain[C] Proc of 2014 IEEE Int Conf on Multimedia and Expo (ICME). Piscataway, NJ: IEEE, 2014: 16[31]Erkin Z, Franz M, Guajardo J, et al. Privacypreserving face recognition[C] Proc of Int Symp on Privacy Enhancing Technologies Symposium. Berlin: Springer, 2009: 235253[32]Sadeghi A R, Schneider T, Wehrenberg I. Efficient privacypreserving face recognition[C] Proc of Int Conf on Information Security and Cryptology. Berlin: Springer, 2009: 229244[33]Bringer J, Chabanne H. An authentication protocol with encrypted biometric data[C] Proc of Int Conf on Cryptology in Africa. Berlin: Springer, 2008: 109124[34]Upmanyu M, Namboodiri A M, Srinathan K, et al. Efficient biometric verification in encrypted domain[C] Proc of Int Conf on Biometrics. Berlin: Springer, 2009: 899908[35]Failla P, Sutcu Y, Barni M. eSketch: A privacypreserving fuzzy commitment scheme for authentication using encrypted biometrics[C] Proc of the 12th ACM Workshop on Multimedia and Security. New York: ACM, 2010: 241246[36]Barni M, Bianchi T, Catalano D, et al. Privacypreserving fingercode authentication[C] Proc of the 12th ACM Workshop on Multimedia and Security. New York: ACM, 2010: 231240[37]Barni M, Failla P, Lazzeretti R, et al. Privacypreserving ECG classification with branching programs and neural networks[J]. IEEE Trans on Information Forensics and Security, 2011, 6(2): 452468[38]Sohn H, Plataniotis K N, Ro Y M. Privacypreserving watch list screening in video surveillance system[C] Proc of PacificRim Conf on Multimedia. Berlin: Springer, 2010: 622632[39]Chen Y C, Chu C T, Hwang J N, et al. A privacypreserving human tracking scheme in centralized cloud based camera networks[C] Proc of 2014 IEEE Int Conf on Communications (ICC). Piscataway, NJ: IEEE, 2014: 793798[40]Zheng P, Huang J. An efficient image homomorphic encryption scheme with small ciphertext expansion[C] Proc of the 21st ACM Int Conf on Multimedia. New York: ACM, 2013: 803812[41]Li Y, Zhou J, Li Y. Ciphertextonly attack on an image homomorphic encryption scheme with small ciphertext expansion[C] Proc of the 23rd ACM Int Conf on Multimedia. New York: ACM, 2015: 10631066[42]Bianchi T, Piva A, Barni M. Composite signal representation for fast and storageefficient processing of encrypted signals[J]. IEEE Trans on Information Forensics and Security, 2010, 5(1): 180187[43]Zhu B B. Multimedia encryption[M] Multimedia Security Technologies for Digital Rights Management, Zeng W, Yu H, Lin CY, eds. London: Elsevier, 2006: 75109[44]Agrawal P, Narayanan P J. Person deidentification in videos[J]. IEEE Trans on Circuits and Systems for Video Technology, 2011, 21(3): 299310[45]Newton E M, Sweeney L, Malin B. Preserving privacy by deidentifying face images[J]. IEEE Trans on Knowledge and Data Engineering, 2005, 17(2): 232243[46]Cucchiara R, Prati A, Vezzani R. A system for automatic face obscuration for privacy purposes[J]. Pattern Recognition Letters, 2006, 27(15): 18091815[47]Senior A, Pankanti S, Hampapur A, et al. Enabling video privacy through computer vision[J]. IEEE Security & Privacy, 2005, 3(3): 5057[48]Carrillo P, Kalva H, Magliveras S. Compression independent reversible encryption for privacy in video surveillance[J]. EURASIP Journal on Information Security, 2010, 2009(1): 429581[49]Paruchuri J, Cheung S C, Hail M. Video data hiding for managing privacy information in surveillance systems[J]. EURASIP Journal on Information Security, 2009, 2009(1): 236139[50]Cichowski J, Czyzewski A. Reversible video stream anonymization for video surveillance systems based on pixels relocation and watermarking[C] Proc of 2011 IEEE Int Conf on Computer Vision Workshops (ICCV Workshops). Piscataway, NJ: IEEE, 2011: 19711977[51]Dufaux F, Ebrahimi T. Scrambling for privacy protection in video surveillance systems[J]. IEEE Trans on Circuits and Systems for Video Technology, 2008, 18(8): 11681174[52]Dufaux F, Ebrahimi T. H.264AVC video scrambling for privacy protection[C] Proc of the 15th IEEE Int Conf on Image Processing (ICIP 2008). Piscataway, NJ: IEEE, 2008: 16881691[53]Dai F, Tong L, Zhang Y, et al. Restricted H.264AVC video coding for privacy protected video scrambling[J]. Journal of Visual Communication and Image Representation, 2011, 22(6): 479490[54]Ma X, Yang L T, Xiang Y, et al. Fully reversible privacy region protection for cloud video surveillance[J]. IEEE Trans on Cloud Computing, 2015 (99): 11[55]Ma X, Zeng W K, Yang L T, et al. Lossless ROI privacy protection of H.264AVC compressed surveillance videos[J]. IEEE Trans on Emerging Topics in Computing, 2016, 4(3): 349362[56]Upmanyu M, Namboodiri A M, Srinathan K, et al. Efficient privacy preserving video surveillance[C] Proc of the 12th 2009 IEEE Int Conf on Computer Vision. Piscataway, NJ: IEEE, 2009: 16391646[57]Du L, Li Y. Privacy preserving for human object in video surveillance via visual cryptography[C] Proc of 2014 Int Conf on Security, Pattern Analysis, and Cybernetics (SPAC). Piscataway, NJ: IEEE, 2014: 8085[58]Sohn H, Plataniotis K N, Ro Y M. Privacypreserving watch list screening in video surveillance system[C] Advances in Multimedia Information Processing—PCM 2010. Berlin: Springer, 2010: 622632[59]Chen YC, Chu CT, Hwang JN, et al. A privacypreserving human tracking scheme in centralized cloud based camera networks[C] Proc of 2014 IEEE Int Conf on Communications (ICC). Piscataway, NJ: IEEE, 2014: 793798[60]Zeng YC, Hsu CY, Luo YF, et al. Object detection in encryptionbased surveillance system[C] Proc of APSIPA. 2016: 8694[61]Chu KY, Kuo YH, Hsu W H. Realtime privacypreserving moving object detection in the cloud[C] Proc of the 21st ACM Int Conf on Multimedia. New York: ACM, 2013: 597600[62]Lin C Y, Muchtar K, Lin J Y, et al. Moving object detection in the encrypted domain[J]. Multimedia Tools and Applications, 2016: 125[63]Jin X, Guo K, Song C, et al. Private video foreground extraction through chaotic mapping based encryption in the cloud[C] Proc of Int Conf on Multimedia Modeling. Berlin: Springer, 2016: 562573[64]Zeng Y C, Hsu C T. Context intracoding scheme for securing surveillance videos and its applications[C] Proc of 2011 IEEE Int Workshop on Information Forensics and Security (WIFS). Piscataway, NJ: IEEE, 2011: 16[65]Zeng Y C, Tsai C H, Chang W T. Abnormal action warning on encryptedcoded surveillance video for home safety[C] Proc of ICME Workshops. Piscataway, NJ: IEEE, 2013: 16[66]HEVC. High efficiency video coding (HEVC) text specification draft 6, JCTVCH1003[R]. San Jose, CA, USA, ITUTISOIEC Joint Collaborative Team on Video Coding (JCTVC), 2012 [67]Shahid Z, Puech W. Visual protection of HEVC video by selective encryption of CABAC binstrings[J]. IEEE Trans on Multimedia, 2014, 16(1): 2436 |
[1] | 魏国富 石英村. 人工智能数据安全治理与技术发展概述?[J]. 信息安全研究, 2021, 7(2): 110-119. |
[2] | 赵剑 董文华 安天博 匡哲君 史丽娟 徐大伟. 面向医疗隐私保护的双区块链模型研究[J]. 信息安全研究, 2021, 7(2): 136-144. |
[3] | 赵娟娟 刘昌华. WebSocket子协议的设计与实现[J]. 信息安全研究, 2021, 7(1): 64-68. |
[4] | 仲蓓鑫 林浩 孔苏鹏 程实. 基于区块链技术的多源网络数据隐私保护方法[J]. 信息安全研究, 2021, 7(1): 86-89. |
[5] | 霍成义. 云计算中属性基加密机制研究?[J]. 信息安全研究, 2020, 6(8): 733-737. |
[6] | 张红金. 多级加密在U盘加密中的应用[J]. 信息安全研究, 2020, 6(8): 759-764. |
[7] | 李俊 柴海新. 生物特征识别隐私保护研究[J]. 信息安全研究, 2020, 6(7): 589-601. |
[8] | 蹇诗婕 卢志刚 姜波 刘玉岭 刘宝旭. 基于层次聚类方法的流量异常检测[J]. 信息安全研究, 2020, 6(6): 0-0. |
[9] | 戴纯兴 刘刚 韩春超 王传国. KVM环境下基于异常行为的恶意软件检测技术研究[J]. 信息安全研究, 2020, 6(6): 0-0. |
[10] | 安超 周纯杰. 基于控制行为模型的工控系统异常检测方法 [J]. 信息安全研究, 2020, 6(6): 0-0. |
[11] | 谭剑 王晓莉 饶伟. 铁路云数据中心的安全架构研究[J]. 信息安全研究, 2020, 6(6): 0-0. |
[12] | 刘海峰 荣晓燕 李晨旸 廖军. 一种基于安全域的云计算网络安全保障方法研究[J]. 信息安全研究, 2020, 6(4): 362-366. |
[13] | 李铭 石磊 张辉 牛文强. 基于系统调用截获的虚拟机自省技术[J]. 信息安全研究, 2020, 6(4): 367-372. |
[14] | 林嘉涛 李玉. 基于云计算的物联网安全问题探讨[J]. 信息安全研究, 2020, 6(4): 373-376. |
[15] | 荣晓燕 刘海峰 刘国伟 刘凯俊. 基于风控和合规的云计算网络安全矩阵控制研究[J]. 信息安全研究, 2020, 6(3): 266-271. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||