摘要
在云计算发展趋势的引领下,越来越多的数据和应用程序(包括多媒体数据和应用程序)已被转移到云.阻碍许多人使用公共云计算的一个关键障碍是失去对云上数据的控制.通过回顾保护隐私的云计算技术(尤其在多媒体云计算领域)来打破这个障碍.这些技术在保护用户数据的同时允许云执行所需的计算.
Cloud computing has been a trend that increasing data and application have been moved to cloud,including multimedia data and applications.Loss of control of the data in cloud computing is a critical hurdle for many to adopt public cloud computing.In this article,we review privacy-preserving cloud computing technologies,with a focus on multimedia cloud computing,to address the hurdle.These enabling technologies protect user data yet allow the cloud to perform desired computations.
引文
[1]方俊.多媒体与云计算[J].计算机应用与软件,2011,28(10):291-296
[2]Zhu W,Luo C,Wang J,et al.Multimedia cloud computing[J].IEEE Signal Processing Magazine,2011,28(3):59-69
[3]Microsoft Azure[OL].[2017-04-15].https://azure.microsoft.com/
[4]Amazon Web Services[OL].[2017-04-15].https://aws.amazon.com/
[5]Google Cloud[OL].[2017-04-15].https://cloud.google.com/
[6]阿里云[OL].[2017-04-15].https://cn.aliyua com/
[7]Troncoso-Pastoriza J R.Perez-Gonzalez F.Secure signal processing in the cloud:Enabling technologies for privacypreserving multimedia cloud processing[J].IEEE Signal Processing Magazine.2013,30(2):29-41
[8]Arthur C.Naked celebrity hack:Security experts focus on iCloud backup theory[OL].(2014-09-01)[2017-04-15].https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence
[9]Apple Inc.Apple media advisory:Update to celebrity photo investigation[OL].(2014-09-02)[2017-04-15].http://www.apple.com/pr/library/2014/09/02Apple-MediaAdvisory.html
[10]Apple Inc.iCloud security and privacy overview[OL].[2017-04-15].https://support apple.com/en-us/HT202303
[11]安防网.监控视频被直播个人隐私无处“藏”[OL].[2017-04-15].http://security,ofweek.com/2015-10/ART-510011-8440-29013063.html
[12]Schuster F,Costa M,Fournet C,et al.VC3:Trustworthy data analytics in the cloud using SGX[C]//Proc of 2015 IEEE Symp on Security and Privacy(SP).Piscataway,NJ:IEEE,2015:38-54
[13]Anati I,Gueron S,Johnsen S,et al.Innovative technology for CPU based attestation and sealing[C]//Proc of the 2nd Int Workshop on Hardware and Architectural Support for Security and Privacy.2013
[14]Ohrimenko O,Schuster F,Fournet C,et al.Oblivious multi-party machine learning on trusted processors[C]//Berkeley:USENIX Association,2016:619-636
[15]Xu Y,Cui W,Peinado M.Controlled-channel attacks:Deterministic side channels for untrusted operating systems[C]//Proc of 2015 IEEE Symp on Security and Privacy(SP).Piscataway,NJ:IEEE,2015:640-656
[16]Rivest R L,Adleman L,Dertouzos M L.On data banks and privacy homomorphisms[J].Foundations of Secure Computation,1978,4(11):169-180
[17]谢杏.密码算法的同态计算[D].西安:西安电子科技大学,2014
[18]Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]//Proc of Int Conf on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,1999:223-238
[19]Gentry C.Fully homomorphic encryption using ideal lattices[C]//Proc of ACM Symp on Theory of Computing(SToC 2009).New York:ACM,2009:169-178
[20]Yagisawa M.Fully Homomorphic Encryption without bootstrapping[C]//Proc of IACR Cryptology ePrint Archive.2015:474
[21]FIPS 197.Announcing the Advanced Encryption Standard(AES)[OL][2017-04-15].http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf
[22]Gentry C.Halevi S,Smart N P.Homomorphic evaluation of the AES circuit[C]//Proc of Advances in Cryptology—CRYPTO 2012.Berlin:Springer,2012,850-867
[23]Bianchi T.Piva A,Barni M.On the implementation of the discrete Fourier transform in the encrypted domain[J].IEEE Trans on Information Forensics and Security,2009,4(1):86-97
[24]Bianchi T,Piva A,Barni M.Encrypted domain DCT based on homomorphic cryptosystems[J].EURASIP Journal on Information Security,2009,2009(1):716357
[25]Zheng P,Huang J.Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain[J].IEEE Trans on Image Processing,2013,22(6):2455-2468
[26]Zheng P,Huang J.Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking[C]//Proc of Int Workshop on Information Hiding.Berlin:Springer,2012:240-254
[27]Chen Y C,Shiu C W,Horng G.Encrypted signal-based reversible data hiding with public key cryptosystem[J].Journal of Visual Communication and Image Representation,2014,25(5):1164-1170
[28]Zhang X,Long J,Wang Z,et al.Lossless and reversible data hiding in encrypted images with public-key cryptography[J].IEEE Trans on Circuits and Systems for Video Technology,2016,26(9):1622-1631
[29]Hsu C Y,Lu C S,Pei S C.Image feature extraction in encrypted domain with privacy-preserving SIFT[J].IEEE Trans on Image Processing,2012,21(11):4593-4607
[30]Bai Y,Zhuo L,Cheng B,et al.Surf feature extraction in encrypted domain[C]//Proc of 2014 IEEE Int Conf on Multimedia and Expo(ICME).Piscataway,NJ:IEEE,2014:1-6
[31]Erkin Z,Franz M,Guajardo J,et al.Privacy-preserving face recognition[C]//Proc of Int Symp on Privacy Enhancing Technologies Symposium.Berlin:Springer,2009:235-253
[32]Sadeghi A R,Schneider T,Wehrenberg I.Efficient privacy-preserving face recognition[C]//Proc of Int Conf on Information Security and Cryptology.Berlin:Springer,2009:229-244
[33]Bringer J,Chabanne H.An authentication protocol with encrypted biometric data[C]//Proc of Int Conf on Cryptology in Africa.Berlin:Springer,2008:109-124
[34]Upmanyu M,Namboodiri A M,Srinathan K,et al.Efficient biometric verification in encrypted domain[C]//Proc of Int Conf on Biometrics.Berlin:Springer,2009:899-908
[35]Failla P.Sutcu Y,Barni M.eSketch:A privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics[C]//Proc of the 12th ACM Workshop on Multimedia and Security.New York:ACM,2010:241-246
[36]Barni M,Bianchi T,Catalano D,et al.Privacy-preserving fingercode authentication[C]//Proc of the 12th ACM Workshop on Multimedia and Security.New York:ACM,2010:231-240
[37]Barni M,Failla P,Lazzeretti R,et al.Privacy-preserving ECG classification with branching programs and neural networks[J].IEEE Trans on Information Forensics and Security,2011,6(2):452-468
[38]Sohn H,Plataniotis K N,Ro Y M.Privacy-preserving watch list screening in video surveillance system[C]//Proc of Pacific-Rim Conf on Multimedia.Berlin:Springer,2010:622-632
[39]Chen Y C,Chu C T,Hwang J N,et al.A privacypreserving human tracking scheme in centralized cloud based camera networks[C]//Proc of 2014 IEEE Int Conf on Communications(ICC).Piscataway,NJ:IEEE,2014:793-798
[40]Zheng P,Huang J.An efficient image homomorphic encryption scheme with small ciphertext expansion[C]//Proc of the 21st ACM Int Conf on Multimedia.New York:ACM,2013:803-812
[41]Li Y,Zhou J,Li Y.Ciphertext-only attack on an image homomorphic encryption scheme with small ciphertext expansion[C]//Proc of the 23rd ACM Int Conf on Multimedia.New York:ACM,2015:1063-1066
[42]Bianchi T,Piva A,Barni M Composite signal representation for fast and storage-efficient processing of encrypted signals[J].IEEE Trans on Information Forensics and Security,2010,5(1):180-187
[43]Zhu B B.Multimedia encryption[M]//Multimedia Security Technologies for Digital Rights Management,ZengW,Yu H,Lin C-Y,eds.London:Elsevier,2006:75-109
[44]Agrawal P,Narayanan P J.Person de-identification in videos[J].IEEE Trans on Circuits and Systems for Video Technology,2011,21(3):299-310
[45]Newton E M,Sweeney L,Malin R Preserving privacy by de-identifying face images[J].IEEE Trans on Knowledge and Data Engineering,2005,17(2):232-243
[46]Cucchiara R,Prati A,Vezzani R.A system for automatic face obscuration for privacy purposes[J].Pattern Recognition Letters,2006,27(15):1809-1815
[47]Senior A.Pankanti S.Hampapur A,et al.Enabling video privacy through computer vision[J].IEEE Security&Privacy,2005,3(3):50-57
[48]Carrillo P,Kalva H,Magliveras S.Compression independent reversible encryption for privacy in video surveillance[J].EURASIP Journal on Information Security,2010,2009(1):429581
[49]Paruchuri J,Cheung S C,Hail M.Video data hiding for managing privacy information in surveillance systems[J].EURASIP Journal on Information Security,2009,2009(1):236139
[50]Cichowski J,Czyzewski A.Reversible video stream anonymization for video surveillance systems based on pixels relocation and watermarking[C]//Proc of 2011IEEE Int Conf on Computer Vision Workshops(ICCV Workshops).Piscataway,NJ:IEEE,2011:1971-1977
[51]Dufaux F,Ebrahimi T.Scrambling for privacy protection in video surveillance systems[J].IEEE Trans on Circuits and Systems for Video Technology,2008,18(8):1168-1174
[52]Dufaux F,Ebrahimi T.H.264/AVC video scrambling for privacy protection[C]//Proc of the 15th IEEE Int Conf on Image Processing(ICIP 2008).Piscataway,NJ:IEEE,2008:1688-1691
[53]Dai F,Tong L,Zhang Y,et al.Restricted H.264/AVC video coding for privacy protected video scrambling[J].Journal of Visual Communication and Image Representation,2011,22(6):479-490
[54]Ma X,Yang L T,Xiang Y,et al.Fully reversible privacy region protection for cloud video surveillance[J].IEEE Trans on Cloud Computing,2015(99):1-1
[55]Ma X,Zeng W K,Yang L T,et al.Lossless ROI privacy protection of H.264/AVC compressed surveillance videos[J].IEEE Trans on Emerging Topics in Computing,2016,4(3):349-362
[56]Upmanyu M,Namboodiri A M,Srinathan K,et al.Efficient privacy preserving video surveillance[C]//Proc of the 12th 2009 IEEE Int Conf on Computer Visioa Piscataway,NJ:IEEE,2009:1639-1646
[57]Du L,Li Y.Privacy preserving for human object in video surveillance via visual cryptography[C]//Proc of 2014 Int Conf on Security,Pattern Analysis,and Cybernetics(SPAC).Piscataway,NJ,IEEE,2014:80-85
[58]Sohn H,Plataniotis K N,Ro Y M.Privacy-preserving watch list screening in video surveillance system[C]//Advances in Multimedia Information Processing—PCM2010.Berlin:Springer,2010:622-632
[59]Chen Y-C,Chu C-T,Hwang J-N,et al.A privacypreserving human tracking scheme in centralized cloud based camera networks[C]//Proc of 2014 IEEE Int Conf on Communications(ICC).Piscataway,NJ:IEEE.2014:793-798
[60]Zeng Y-C,Hsu C-Y,Luo Y-F,et al.Object detection in encryption-based surveillance system[C]//Proc of APSIPA.2016:86-94
[61]Chu K-Y,Kuo Y-H,Hsu W H.Real-time privacypreserving moving object detection in the cloud[C]//Proc of the 21st ACM Int Conf on Multimedia.New York:ACM,2013:597-600
[62]Lin C Y,Muchtar K,Lin J Y,et al.Moving object detection in the encrypted domain[J].Multimedia Tools and Applications,2016:1-25
[63]Jin X,Guo K,Song C,et al.Private video foreground extraction through chaotic mapping based encryption in the cloud[C]//Proc of Int Conf on Multimedia Modeling.Berlin:Springer,2016:562-573
[64]Zeng Y C,Hsu C T.Context intra-coding scheme for securing surveillance videos and its applications[C]//Proc of 2011 IEEE Int Workshop on Information Forensics and Security(WIFS).Piscataway,NJ:IEEE,2011:1-6
[65]Zeng Y C,Tsai C H,Chang W T.Abnormal action warning on encrypted-coded surveillance video for home safety[C]//Proc of ICME Workshops.Piscataway,NJ:IEEE,2013:1-6
[66]HEVC.High efficiency video coding(HEVC)text specification draft 6,JCTVC-H1003[R].San Jose,CA,USA,ITU-T/ISO/IEC Joint Collaborative Team on Video Coding(JCT-VC),2012
[67]Shahid Z,Puech W.Visual protection of HEVC video by selective encryption of CABAC binstrings[J].IEEE Trans on Multimedia,2014,16(1):24-36
(1)第1种方法,即下文所述的保密计算,假设云计算中使用的处理器的制造商是值得信赖的.