Visible to the public SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing

TitleSecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing
Publication TypeJournal Article
Year of Publication2016
AuthorsQin, Zhan, Yan, Jingbo, Ren, Kui, Chen, Chang Wen, Wang, Cong
JournalACM Trans. Multimedia Comput. Commun. Appl.
Volume12
Pagination65:1–65:24
Date Publishedsep
ISSN1551-6857
KeywordsBig Data, big data security, big data security in the cloud, cloud computing, composability, Human Behavior, Image feature detection, Privacy-preserving, pubcrawl, Resiliency, SIFT
Abstract

The image and multimedia data produced by individuals and enterprises is increasing every day. Motivated by the advances in cloud computing, there is a growing need to outsource such computational intensive image feature detection tasks to cloud for its economic computing resources and on-demand ubiquitous access. However, the concerns over the effective protection of private image and multimedia data when outsourcing it to cloud platform become the major barrier that impedes the further implementation of cloud computing techniques over massive amount of image and multimedia data. To address this fundamental challenge, we study the state-of-the-art image feature detection algorithms and focus on Scalar Invariant Feature Transform (SIFT), which is one of the most important local feature detection algorithms and has been broadly employed in different areas, including object recognition, image matching, robotic mapping, and so on. We analyze and model the privacy requirements in outsourcing SIFT computation and propose Secure Scalar Invariant Feature Transform (SecSIFT), a high-performance privacy-preserving SIFT feature detection system. In contrast to previous works, the proposed design is not restricted by the efficiency limitations of current homomorphic encryption scheme. In our design, we decompose and distribute the computation procedures of the original SIFT algorithm to a set of independent, co-operative cloud servers and keep the outsourced computation procedures as simple as possible to avoid utilizing a computationally expensive homomorphic encryption scheme. The proposed SecSIFT enables implementation with practical computation and communication complexity. Extensive experimental results demonstrate that SecSIFT performs comparably to original SIFT on image benchmarks while capable of preserving the privacy in an efficient way.

URLhttp://doi.acm.org/10.1145/2978574
DOI10.1145/2978574
Citation Keyqin_secsift:_2016