Secure Signal Processing in The Cloud: (Enabling Technologies For Privacy-Preserving Multimedia Cloud Processing)
Secure Signal Processing in The Cloud: (Enabling Technologies For Privacy-Preserving Multimedia Cloud Processing)
Secure Signal Processing in The Cloud: (Enabling Technologies For Privacy-Preserving Multimedia Cloud Processing)
Cloud
[Enabling technologies for privacy-preserving multimedia cloud processing]
INTRODUCTION
From a technological point of view, there are
currently some challenges that multimedia clouds
still need to tackle to be fully operational.
The most important issues that can hold back the
widespread adoption of the cloud, and of any
outsourcing scenario in general, are actually security
and privacy.
Both concepts are very close to each other in the
cloud as there can be no privacy without security.
Privacy is a more specific requirement, and it is
related only to sensitive data and/or processes.
2.
3.
MEASURING PRIVACY
Once the adversary model is defined- a proper privacy
framework should clearly establish means to quantitatively
measure the privacy, or,
conversely, the private information leakage.
The evaluation of the leakage that a given protocol produces
determines its suitability for a set of privacy requirements.
The typical cryptographic measures for security and secrecy
usually rely on complexity theory and hardness assumptions.
signal processing measures for the conveyed information in a
signal are based on fundamental information-theoretic
magnitudes.
Computational load,
Communication(bandwidth and interaction rounds),
Accuracy (error propagation),and
Privacy level (differential privacy).
CONCLUSION
Throughout this we have motivated the need for privacy
when outsourcing processes to cloud environments
The first and most fundamental issue deals with the
definition and quantification of privacy in the cloud.
The range of cloud applications is rich and varied, from very
simple spreadsheet applications to the rendering of
synthetic video scenes or finding the solution to complex
optimization problems.
References
[1] W. Zhu, C. Luo, J. Wang, and S. Li, Multimedia cloud
computing, IEEE Signal
Process. Mag., vol. 28, no. 3, pp. 5969, May 2011.
[2] M. Jensen, J. O. Schwenk, N. Gruschka, and L. L. Iacono,
On technical
security issues in cloud computing, in Proc. IEEE Int. Conf.
Cloud Computing,
Bangalore, India, Sept. 2009, pp. 109116.
[3] J. R. Troncoso-Pastoriza and F. Prez-Gonzlez, CryptoDSPs
for cloud
privacy, in Proc. CISE 2010, Hong Kong, China, LNCS 6724.
[4] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A.
Konwinski,
G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia,
Above the clouds: A
Berkeley view of cloud computing, EECS Dept., Univ.
California, Berkeley, Tech.
Rep. UCB/EECS-2009-28, Feb. 2009.
[5] M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, Scifi:
A system for