메뉴 건너뛰기




Volumn 387, Issue , 2017, Pages 132-145

A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud

Author keywords

Cloud security; Compressive sensing; Image storage; Privacy preserving; Watermark detection in the encrypted domain

Indexed keywords

AUTHENTICATION; COMPUTATIONAL COMPLEXITY; DATA PRIVACY; DIGITAL STORAGE; IMAGE PROCESSING; IMAGE RECONSTRUCTION; OPTICAL IMAGE STORAGE; OUTSOURCING; SIGNAL PROCESSING; SIGNAL RECONSTRUCTION;

EID: 84995810068     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2016.09.045     Document Type: Article
Times cited : (53)

References (34)
  • 2
    • 84924368818 scopus 로고    scopus 로고
    • Security in cloud computing: opportunities and challenges
    • [2] Ali, M., Khan, S.U., Vasilakos, A.V., Security in cloud computing: opportunities and challenges. Inf. Sci. 305 (2015), 357–383.
    • (2015) Inf. Sci. , vol.305 , pp. 357-383
    • Ali, M.1    Khan, S.U.2    Vasilakos, A.V.3
  • 3
    • 78650609369 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • [3] Archer, J., Boehm, A., Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance 2 (2009), 1–76.
    • (2009) Cloud Security Alliance , vol.2 , pp. 1-76
    • Archer, J.1    Boehm, A.2
  • 4
    • 42649140570 scopus 로고    scopus 로고
    • The restricted isometry property and its implications for compressed sensing
    • [4] Candès, E.J., The restricted isometry property and its implications for compressed sensing. Comptes Rendus Mathematique 346:9 (2008), 589–592.
    • (2008) Comptes Rendus Mathematique , vol.346 , Issue.9 , pp. 589-592
    • Candès, E.J.1
  • 5
    • 31744440684 scopus 로고    scopus 로고
    • Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information
    • [5] Candès, E.J., Romberg, J., Tao, T., Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52:2 (2006), 489–509.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.2 , pp. 489-509
    • Candès, E.J.1    Romberg, J.2    Tao, T.3
  • 6
    • 29144439194 scopus 로고    scopus 로고
    • Decoding by linear programming
    • [6] Candes, E.J., Tao, T., Decoding by linear programming. IEEE Trans. Inf. Theory 51:12 (2005), 4203–4215.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.12 , pp. 4203-4215
    • Candes, E.J.1    Tao, T.2
  • 8
    • 84891322736 scopus 로고    scopus 로고
    • Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    • [8] Chen, F., Xiang, T., Yang, Y., Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74:3 (2014), 2141–2151.
    • (2014) J. Parallel Distrib. Comput. , vol.74 , Issue.3 , pp. 2141-2151
    • Chen, F.1    Xiang, T.2    Yang, Y.3
  • 11
    • 33645712892 scopus 로고    scopus 로고
    • Compressed sensing
    • [11] Donoho, D.L., Compressed sensing. IEEE Trans. Inf. Theory 52:4 (2006), 1289–1306.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1289-1306
    • Donoho, D.L.1
  • 12
    • 84894900961 scopus 로고    scopus 로고
    • Dividing secrets to secure data outsourcing
    • [12] Emekci, F., Methwally, A., Agrawal, D., El Abbadi, A., Dividing secrets to secure data outsourcing. Inf. Sci. 263 (2014), 198–210.
    • (2014) Inf. Sci. , vol.263 , pp. 198-210
    • Emekci, F.1    Methwally, A.2    Agrawal, D.3    El Abbadi, A.4
  • 13
    • 84955409381 scopus 로고    scopus 로고
    • Introducing the counter mode of operation to compressed sensing based encryption
    • [13] Fay, R., Introducing the counter mode of operation to compressed sensing based encryption. Inf. Process. Lett. 116:4 (2016), 279–283.
    • (2016) Inf. Process. Lett. , vol.116 , Issue.4 , pp. 279-283
    • Fay, R.1
  • 14
    • 0032089417 scopus 로고    scopus 로고
    • Symmetric ciphers based on two-dimensional chaotic maps
    • [14] Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8:06 (1998), 1259–1284.
    • (1998) Int. J. Bifurcation Chaos , vol.8 , Issue.6 , pp. 1259-1284
    • Fridrich, J.1
  • 15
    • 0004127488 scopus 로고    scopus 로고
    • Computers and Intractability
    • wh freeman
    • [15] Garey, M.R., Johnson, D.S., Computers and Intractability. vol. 29, 2002, wh freeman.
    • (2002) , vol.29
    • Garey, M.R.1    Johnson, D.S.2
  • 16
    • 84902436467 scopus 로고    scopus 로고
    • Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
    • [16] Lei, X., Liao, X., Huang, T., Heriniaina, F., Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280 (2014), 205–217.
    • (2014) Inf. Sci. , vol.280 , pp. 205-217
    • Lei, X.1    Liao, X.2    Huang, T.3    Heriniaina, F.4
  • 17
    • 84919819478 scopus 로고    scopus 로고
    • Outsourcing large matrix inversion computation to a public cloud
    • 1–1
    • [17] Lei, X., Liao, X., Huang, T., Li, H., Hu, C., Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput., 1(1), 2013 1–1.
    • (2013) IEEE Trans. Cloud Comput. , vol.1 , Issue.1
    • Lei, X.1    Liao, X.2    Huang, T.3    Li, H.4    Hu, C.5
  • 18
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • [18] Liu, K., Kargupta, H., Ryan, J., Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18:1 (2006), 92–106.
    • (2006) IEEE Trans. Knowl. Data Eng. , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 19
    • 84889103004 scopus 로고    scopus 로고
    • Architecture and protocol for intercloud communication
    • [19] Lloret, J., Garcia, M., Tomas, J., Rodrigues, J.J., Architecture and protocol for intercloud communication. Inf. Sci. 258 (2014), 434–451.
    • (2014) Inf. Sci. , vol.258 , pp. 434-451
    • Lloret, J.1    Garcia, M.2    Tomas, J.3    Rodrigues, J.J.4
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer
    • [22] Paillier, P., Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology EUROCRYPT 99, 1999, Springer, 223–238.
    • (1999) Advances in Cryptology EUROCRYPT 99 , pp. 223-238
    • Paillier, P.1
  • 26
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • IEEE
    • [26] Wang, C., Ren, K., Wang, J., Secure and practical outsourcing of linear programming in cloud computing. 2011 Proceedings IEEE, INFOCOM, 2011, IEEE, 820–828.
    • (2011) 2011 Proceedings IEEE, INFOCOM , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 27
    • 84961746418 scopus 로고    scopus 로고
    • Privacy-assured outsourcing of image reconstruction service in cloud
    • [27] Wang, C., Zhang, B., Ren, K., Roveda, J.M., Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1:1 (2013), 166–177.
    • (2013) IEEE Trans. Emerg. Top. Comput. , vol.1 , Issue.1 , pp. 166-177
    • Wang, C.1    Zhang, B.2    Ren, K.3    Roveda, J.M.4
  • 29
    • 84937458648 scopus 로고    scopus 로고
    • Compressive sensing based secure multiparty privacy preserving framework for collaborative data-mining and signal processing
    • IEEE
    • [29] Wang, Q., Zeng, W., Tian, J., Compressive sensing based secure multiparty privacy preserving framework for collaborative data-mining and signal processing. 2014 IEEE International Conference on Multimedia and Expo (ICME), 2014, IEEE, 1–6.
    • (2014) 2014 IEEE International Conference on Multimedia and Expo (ICME) , pp. 1-6
    • Wang, Q.1    Zeng, W.2    Tian, J.3
  • 30
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • [30] Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V., Security and privacy for storage and computation in cloud computing. Inf. Sci. 258 (2014), 371–386.
    • (2014) Inf. Sci. , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 31
    • 0001476552 scopus 로고    scopus 로고
    • A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images
    • [31] Zeng, W., Liu, B., A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Trans. Image Process. 8:11 (1999), 1534–1548.
    • (1999) IEEE Trans. Image Process. , vol.8 , Issue.11 , pp. 1534-1548
    • Zeng, W.1    Liu, B.2
  • 32
    • 84906655458 scopus 로고    scopus 로고
    • Efficient computation outsourcing for inverting a class of homomorphic functions
    • [32] Zhang, F., Ma, X., Liu, S., Efficient computation outsourcing for inverting a class of homomorphic functions. Inf. Sci. 286 (2014), 19–28.
    • (2014) Inf. Sci. , vol.286 , pp. 19-28
    • Zhang, F.1    Ma, X.2    Liu, S.3
  • 34
    • 84979799708 scopus 로고    scopus 로고
    • A review of compressive sensing in information security field
    • 1–1.
    • [34] Zhang, Y., Zhang, L.Y., Zhou, J., Liu, L., Chen, F., He, X., A review of compressive sensing in information security field. IEEE Access, PP(99), 2016 1–1.
    • (2016) IEEE Access , vol.PP , Issue.99
    • Zhang, Y.1    Zhang, L.Y.2    Zhou, J.3    Liu, L.4    Chen, F.5    He, X.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.