feasibility study of searchable image encryption system of ...psrcentre.org/images/extraimages/40....

5
AbstractIn this paper, we sketch the idea of searchable image encryption system to provide the privacy and authentication on streaming service based on cloud computing. The searchable encryption system is the matrix of searchable image encryption system. By extending the streaming search from text search, the search of the streaming service is available, and supports personal privacy and authentication using DES encryption of JCE and CBIR technique. KeywordsSearchable Image Encryption System, Streaming Service, Privacy. I. INTRODUCTION IG data consists of datasets that grow so large that they become awkward to work with using on-hand database management tools in information technology. Difficulties of big data include capture, storage, search, sharing, analytics, and visualizing. This trend continues because of the benefits of working with larger and larger datasets allowing analysts to "spot business trends, prevent diseases, and combat crime." Though a moving target, current limits are on the order of tera-bytes, exa-bytes and zetta-bytes of data. Scientists regularly encounter this problem in meteorology, genomics, connectomics, complex physics simulations, biological and environmental research, Internet search, finance, and business informatics. Data sets also grow in size because they are increasingly being gathered by ubiquitous information-sensing mobile devices, aerial sensory technologies (remote sensing), software logs, cameras, microphones, Radio-frequency identification readers, and wireless sensor networks. Every day, 2.5 quintillion bytes of data are created and 90% of the data in the world today was created within the past two years. Big data requires exceptional technologies to efficiently process large quantities of data within tolerable elapsed times. Technologies being applied to big data include massively parallel processing databases, data mining grids, distributed file systems, JongGeun Jeong is with the Division of Electrical Engineering, Information Sciences & Convergence Research, National Research Foundation of Korea (NRF), South Korea (e-mail: [email protected]). ByungRae Cha is with the School of Information and Communications, Gwangju Institute of Science and Technology, South Korea (e-mail: [email protected]). Jongwon Kim is with the School of Information and Communications, Gwangju Institute of Science and Technology, South Korea (e-mail: [email protected]). distributed databases, cloud computing platforms, the Internet, and scalable storage systems. Specially, big data contains the various streaming services and multimedia. In this paper, we propose the searchable image encryption system (SIES) on streaming media of cloud computing environment to provide the privacy and authentication [1]. In searchable encryption system (SES), the subject of information referred the document. That is, the document is the information users want to hide. Hence, the user provides information on a server to retrieve documents is called a keyword. In general, the data contained in the document as a set of keywords is defined. The searchable encryption systems of personal information stored in external storage space that occur as a workaround for the many problems have been studied until now. SES of the users' encryption keys can be classified into public key and private key [2~8]. II. DESIGN OF SEIS The proposed SIES has extended the streaming media and the image keyword from the document and the keyword in cloud computing. That is, SIES has redefined instead of SES. It is able to search streaming media by image keyword from searching documentation. Additionally, the SIES can support the authentication and privacy of users as shown in Fig. 1. Fig. 1 Technical concept of SIES A. 1 st Index and Extracted Image Keyword The SIES extracts the image keyword and 1st index in Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment JongGeun Jeong, ByungRae Cha, and Jongwon Kim B International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand) 180

Upload: others

Post on 14-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Feasibility Study of Searchable Image Encryption System of ...psrcentre.org/images/extraimages/40. 1312521.pdf · D.Encryption and Decryption analysis of key image and streaming media

Abstract—In this paper, we sketch the idea of searchable image

encryption system to provide the privacy and authentication on streaming service based on cloud computing. The searchable encryption system is the matrix of searchable image encryption system. By extending the streaming search from text search, the search of the streaming service is available, and supports personal privacy and authentication using DES encryption of JCE and CBIR technique.

Keywords— Searchable Image Encryption System, Streaming Service, Privacy.

I. INTRODUCTION IG data consists of datasets that grow so large that they become awkward to work with using on-hand database

management tools in information technology. Difficulties of big data include capture, storage, search, sharing, analytics, and visualizing. This trend continues because of the benefits of working with larger and larger datasets allowing analysts to "spot business trends, prevent diseases, and combat crime." Though a moving target, current limits are on the order of tera-bytes, exa-bytes and zetta-bytes of data. Scientists regularly encounter this problem in meteorology, genomics, connectomics, complex physics simulations, biological and environmental research, Internet search, finance, and business informatics. Data sets also grow in size because they are increasingly being gathered by ubiquitous information-sensing mobile devices, aerial sensory technologies (remote sensing), software logs, cameras, microphones, Radio-frequency identification readers, and wireless sensor networks. Every day, 2.5 quintillion bytes of data are created and 90% of the data in the world today was created within the past two years. Big data requires exceptional technologies to efficiently process large quantities of data within tolerable elapsed times. Technologies being applied to big data include massively parallel processing databases, data mining grids, distributed file systems,

JongGeun Jeong is with the Division of Electrical Engineering, Information Sciences & Convergence Research, National Research Foundation of Korea (NRF), South Korea (e-mail: [email protected]).

ByungRae Cha is with the School of Information and Communications, Gwangju Institute of Science and Technology, South Korea (e-mail: [email protected]).

Jongwon Kim is with the School of Information and Communications, Gwangju Institute of Science and Technology, South Korea (e-mail: [email protected]).

distributed databases, cloud computing platforms, the Internet, and scalable storage systems. Specially, big data contains the various streaming services and multimedia. In this paper, we propose the searchable image encryption system (SIES) on streaming media of cloud computing environment to provide the privacy and authentication [1]. In searchable encryption system (SES), the subject of information referred the document. That is, the document is the information users want to hide. Hence, the user provides information on a server to retrieve documents is called a keyword. In general, the data contained in the document as a set of keywords is defined. The searchable encryption systems of personal information stored in external storage space that occur as a workaround for the many problems have been studied until now. SES of the users' encryption keys can be classified into public key and private key [2~8].

II. DESIGN OF SEIS The proposed SIES has extended the streaming media and the

image keyword from the document and the keyword in cloud computing. That is, SIES has redefined instead of SES. It is able to search streaming media by image keyword from searching documentation. Additionally, the SIES can support the authentication and privacy of users as shown in Fig. 1.

Fig. 1 Technical concept of SIES

A. 1st Index and Extracted Image Keyword The SIES extracts the image keyword and 1st index in

Feasibility Study of Searchable Image Encryption System of Streaming Service based

on Cloud Computing Environment JongGeun Jeong, ByungRae Cha, and Jongwon Kim

B

International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand)

180

Page 2: Feasibility Study of Searchable Image Encryption System of ...psrcentre.org/images/extraimages/40. 1312521.pdf · D.Encryption and Decryption analysis of key image and streaming media

steaming media by Content-based image retrieval (CBIR) technique as shown in Fig. 2. In Fig. 2, the poster cut is the collection of image keywords. The extracted images are called image keywords because each image in such an image array is referenced by one index or address of one part of streaming media. And the access control of poster cut needs user’s authentication.

Fig. 2 Process of 1st index and extracted image keyword

B. 1st and 2nd Key for Encryption and Decryption of Streaming Media

In pre-subsection, we describe the process of 1st index and image keyword extracted one part of streaming media. Fig. 3 shows the streaming media and extracted image keyword in one part of streaming media.

Fig. 3 (a) Streaming media, (b) Extracted image keyword in streaming media

Fig. 4 Encryption of streaming media and image keyword

Fig. 4 and Fig. 5 show the encryption and decryption process of streaming media by 1st key and 2nd key groups. And Fig. 8 shows the poster cut area for image keyword extraction on streaming media by CBIR technique. CBIR is the application of computer vision techniques to the image retrieval problem, that is, the problem of searching for digital images in large

databases. "Content-based" means that the search will analyze the actual contents (refer to colors, shapes, textures, or any other information) of the image rather than the metadata such as keywords, tags, and/or descriptions associated with the image.

Fig. 5 Decryption of image keyword and one part of streaming media

C. Spatial Color Index for Image Kewordy Query The image pixels can be viewed as a data set having two

dimensions viz., color and location. Considering the color and location aspects of each pixel, an image can be characterized by a set of objects of interest referred to as color clusters of all sharps. The color clusters referred to as objects, are identified, it becomes easier for global or local similarity search of images. Here, a spatial color indexing scheme for CBIR is introduced which is designed based on a color clustering technique in a two dimensional plane as shown in Fig. 6. [9]

Fig. 6 Spatial color indexing scheme for image keyword query

International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand)

181

Page 3: Feasibility Study of Searchable Image Encryption System of ...psrcentre.org/images/extraimages/40. 1312521.pdf · D.Encryption and Decryption analysis of key image and streaming media

III. SIMULATIONS

A. Post Cut Division of Streaming Media In this section, we verify the possibility of SIES through

simulations of post cut area selection and encryption of streaming media, and simulate the process of post cut by CBIR technique in aspect of RGB. The sample streaming media has 720 frames in Window 7.

Fig. 7 Sample streaming media of 720 frame in Windows 7

Fig. 8 Area analysis of Post Cut on sample streaming

Fig. 8 presents 7 areas in result of the area analysis to post

cuts. In location of matrix (1, 1) of Fig. 8, it presents the distribution of red color. It shows 7 clusters of Red color. In location of matrix (1, 2) of Fig. 8, it presents the distribution of Green color. It shows 8 clusters of Blue color. In location of matrix (2, 1) of Fig. 8, it presents the distribution of red color. It shows 6 clusters of red color. In location of matrix (2, 2) of Fig. 8 lastly, it presents the distribution of mean of RGB colors. It shows 7 clusters of RGB color accurately. And Fig. 9 presents the first and last images in 7 areas of post cuts.

Fig. 9 First and last images in 7 areas of post cuts of sample streaming

B. Extraction of Image Key We simulate the extraction of image key in 64 frames of sin

signal. Fig. 10 (a) is 62 frames of streaming media, Fig. 10 (b) is color analysis process by CBIR Technique, and Fig. 10 (c) shows the image keyword by result of color analysis process.

Fig. 10 Image keyword extraction by CBIR technique

International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand)

182

Page 4: Feasibility Study of Searchable Image Encryption System of ...psrcentre.org/images/extraimages/40. 1312521.pdf · D.Encryption and Decryption analysis of key image and streaming media

C. CBIR using Spatial Color Indexing In this subsection, we simulate the basic step of spatial color

indexing using Gogh picture. Here, the image contour is the boundary line of similar color area around. Fig. 10 presents the original color image, grey image of original color image, and optimal grey image of original color image by spatial color indexing processing. It shows 4 parts division of grey image. Fig. 11 presents the divisions of various color areas in original image by spatial color indexing. The matrix (1, 1) of Fig. 11 presents only 2 parts of original color image by spatial color indexing. And the matrix (3, 3) of Fig. 11 shows 10 parts of original image by spatial color indexing. Fig. 12 presents the comparison of file generation time and size about image contour numbers by spatial color indexing.

Fig. 2 Spatial indexing of grey image

Fig. 3 Spatial indexing of color image

Fig. 4 Comparison of (a) file generation time and (b) file size about

image contour numbers of color image

D. Encryption and Decryption analysis of key image and streaming media

SIES primarily performs the encryption and decryption function by 1st and 2nd key to support the privacy. We simulate the encryption and decryption of image keyword and streaming media. And Table 1 shows encryption and decryption time of image keyword and streaming media on Intel Core 2 Duo 2.66GHz.

Table 1 Encryption and decryption time of image keyword and streaming media

Items Enc. Time(Sec) Dec. Time(Sec)

Image

48KB(180x257) 0.282 0.297

156KB(450x643) 0.297 0.297

192KB(900x1285) 0.312 0.312

Streaming

Media

4.5MB 0.625 0.61

963MB 68.703 64.672

1.423GB 101.391 100.109

IV. CONCLUSION In this paper, we proposed and simulated the searchable

image encryption system on streaming media based on cloud

International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand)

183

Page 5: Feasibility Study of Searchable Image Encryption System of ...psrcentre.org/images/extraimages/40. 1312521.pdf · D.Encryption and Decryption analysis of key image and streaming media

computing to support users’ authentication and privacy. The image keyword is generated by extraction and division of post cut in streaming media based on cloud computing environment. It performs keyword role of image search. And the spatial color indexing supports similar images search by image keyword query. In simulation, we can verify the feasibilities of SIES by the post cut of streaming media, image keyword extraction in post cut of streaming media, image contour by spatial color indexing, and encryption of image and streaming media.

REFERENCES [1] ByungRae Cha, NamHo Kim, JaeHyun Seo and JongWon Kim, “Idea

Sketch of Searchable Image Encryption System on Streaming Media,” SCTA 2012, Aug. 2012.

[2] N. S. Jho and D. W. Hong, “Technical Trend of the Searchable Encryption System,” ETRI Journal, Vol. 23, No. 4, Aug. 2008.

[3] P. Golle, J. Staddon, and B. Waters, “Secure Conjunctive Keyword Search over Encrypted Data,” In Applied Cryptography and Network Security Conference, 2004.

[4] B. Waters, D. Balfanz, G. Durfee, and D. Smetters, “Building an Encrypted and Searchable Auditlog,”NDSS, 2004.

[5] R. Ostrovsky and W. Skeith, “Private Searching on Streaming Data,” Crypto 2005.

[6] J. Bethencourt, H. Chan, A. Perrig, E. Shi, and D. Song, “Anonymous Multi-Attribute Encryption with Range Query Conditional Decryption,” Technical Report, C.M.U. 2006.

[7] R. Ostrovsky, “Software Protection and Simulations on Oblivious RAMs,” ACM Symp. on Theory of Computing, 1990.

[8] P. Golle and R. Ostrovsky, “Software Protection and Simulation on Oblivious RAMs,” Journal of ACM, Vol.43, No.3, 1996, pp.431-473.

[9] P J Dutta, D K Bhattacharyya, M Dutta, and J K Kalita, “Spatial Color Indexing Using Data Clustering Technique,” 2004.

International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand)

184