Privacy-Preserved Image Protection Supporting Different Access Rights
The boom in cloud computing and social networking has led to a large number of online users in the networks. It is necessary to use appropriate privacy protection mechanisms to prevent personal privacy leakage. In general, image privacy protection techniques proceed with the whole image. However, th...
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2022-12-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/12/23/12335 |
| _version_ | 1827643349617606656 |
|---|---|
| author | Ya-Fen Chang Wei-Liang Tai Yu-Tzu Huang |
| author_facet | Ya-Fen Chang Wei-Liang Tai Yu-Tzu Huang |
| author_sort | Ya-Fen Chang |
| collection | DOAJ |
| description | The boom in cloud computing and social networking has led to a large number of online users in the networks. It is necessary to use appropriate privacy protection mechanisms to prevent personal privacy leakage. In general, image privacy protection techniques proceed with the whole image. However, the image may contain multiple users’ information, and different people’s data may require different privacy protection. In addition, cloud servers are semi-trusted instead of trusted service providers due to unknown security vulnerabilities and the possibility of grabbing sensitive data from the cloud server. In order to provide image protection with different privacy-preserved access rights and to prevent the cloud server from retrieving sensitive information from the image, we propose a privacy-preserved scheme that supports different privacy-preserved access rights in a single image based on the difficulty of solving the factorization problem and the discrete logarithm problem. The cloud server performed the image management method without knowing the privacy information contained in the protected images. By working out the proposed scheme in detail, we experimentally validate the scheme and discuss various options of access rights in practice. |
| first_indexed | 2024-03-09T17:53:09Z |
| format | Article |
| id | doaj.art-4f27c738efd34cd49772aa46e7a968b7 |
| institution | Directory Open Access Journal |
| issn | 2076-3417 |
| language | English |
| last_indexed | 2024-03-09T17:53:09Z |
| publishDate | 2022-12-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Applied Sciences |
| spelling | doaj.art-4f27c738efd34cd49772aa46e7a968b72023-11-24T10:34:50ZengMDPI AGApplied Sciences2076-34172022-12-0112231233510.3390/app122312335Privacy-Preserved Image Protection Supporting Different Access RightsYa-Fen Chang0Wei-Liang Tai1Yu-Tzu Huang2Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404336, TaiwanBachelor Degree Program of Artificial Intelligence, National Taichung University of Science and Technology, Taichung 404336, TaiwanDepartment of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404336, TaiwanThe boom in cloud computing and social networking has led to a large number of online users in the networks. It is necessary to use appropriate privacy protection mechanisms to prevent personal privacy leakage. In general, image privacy protection techniques proceed with the whole image. However, the image may contain multiple users’ information, and different people’s data may require different privacy protection. In addition, cloud servers are semi-trusted instead of trusted service providers due to unknown security vulnerabilities and the possibility of grabbing sensitive data from the cloud server. In order to provide image protection with different privacy-preserved access rights and to prevent the cloud server from retrieving sensitive information from the image, we propose a privacy-preserved scheme that supports different privacy-preserved access rights in a single image based on the difficulty of solving the factorization problem and the discrete logarithm problem. The cloud server performed the image management method without knowing the privacy information contained in the protected images. By working out the proposed scheme in detail, we experimentally validate the scheme and discuss various options of access rights in practice.https://www.mdpi.com/2076-3417/12/23/12335privacy protectioncloud computingfactoring problemdiscrete logarithm problem |
| spellingShingle | Ya-Fen Chang Wei-Liang Tai Yu-Tzu Huang Privacy-Preserved Image Protection Supporting Different Access Rights Applied Sciences privacy protection cloud computing factoring problem discrete logarithm problem |
| title | Privacy-Preserved Image Protection Supporting Different Access Rights |
| title_full | Privacy-Preserved Image Protection Supporting Different Access Rights |
| title_fullStr | Privacy-Preserved Image Protection Supporting Different Access Rights |
| title_full_unstemmed | Privacy-Preserved Image Protection Supporting Different Access Rights |
| title_short | Privacy-Preserved Image Protection Supporting Different Access Rights |
| title_sort | privacy preserved image protection supporting different access rights |
| topic | privacy protection cloud computing factoring problem discrete logarithm problem |
| url | https://www.mdpi.com/2076-3417/12/23/12335 |
| work_keys_str_mv | AT yafenchang privacypreservedimageprotectionsupportingdifferentaccessrights AT weiliangtai privacypreservedimageprotectionsupportingdifferentaccessrights AT yutzuhuang privacypreservedimageprotectionsupportingdifferentaccessrights |