+ All Categories
Home > Documents > 12R01D5826.ppt

12R01D5826.ppt

Date post: 25-Dec-2015
Category:
Upload: nikitha
View: 213 times
Download: 0 times
Share this document with a friend
Popular Tags:
18
Secure Signal Processing in the Cloud Under the Guidence of Mr.J.Sudhakar Technical seminar By N.Mamatha (12RO1D5826) [Enabling technologies for privacy-preserving multimedia cloud processing]
Transcript
Page 1: 12R01D5826.ppt

Secure Signal Processing in the Cloud

Under the Guidence of

Mr.J.Sudhakar

Technical seminar

By

N.Mamatha

(12RO1D5826)

[Enabling technologies for privacy-preserving multimedia cloud processing]

Page 2: 12R01D5826.ppt

•From a technological point of view, there are currently some challenges that multimedia clouds still need to tackle to be fully operational.

•The most important issues that can hold back the widespread adoption of the cloud, and of any outsourcing scenario in general, are actually security and privacy.

•Both concepts are very close to each other in the cloud as there can be no privacy without security.

•Privacy is a more specific requirement, and it is related only to sensitive data and/or processes.

INTRODUCTIONINTRODUCTION

Page 3: 12R01D5826.ppt

CLOUD AND PRACTICAL SCENARIOS

•Cloud computing comprises the provision of computing and storage services to users through the Internet

•A public cloud provides determined services to individuals and organizations

•cloud services are presented in three layers

1. Infrastructure as a service (IaaS)

2. Platform as a service (PaaS)

3. Software as a service (SaaS)

Page 4: 12R01D5826.ppt

Infrastructure as a service (IaaS): The lower architectural layer, representing the raw cloud hardware resources.

Platform as a service (PaaS): The second layer, usually providing an application server and a database in which the customer can develop and run his/her own applications.

Software as a service (SaaS): This is the most extended use of the cloud as such, where a series of applications are provided to the final user.

Service Layers in cloud Service Layers in cloud

Page 5: 12R01D5826.ppt

•At any of these three layers of service provision, there are three essential functionalities that summarize the purpose of a cloud: storage, transmission, and computation

Page 6: 12R01D5826.ppt

Functional roles played by the stakeholders of a cloud system from a privacy aware perspective::

■ Cloud infrastructure: All the storage and processing outsourced to the cloud takes place at the cloud infrastructure.

■ Software/application provider: Software developers that produce applications run on top of the cloud infrastructure/ platform and are offered as a SaaS to end users.

■ Payment provider: Party in charge of billing for the consumed cloud resources

■ Customers/end users: Parties that contract and make use of a service on the cloud infrastructure

Page 7: 12R01D5826.ppt

Exemplifying scenarios of signal processing applications showcasing the privacy problem in the cloud:

1. Outsourced biometric recognition: In a biometric recognition system, some biometric information is contrasted against the templates stored in a database.

2. e-Health: e-Health is the paradigmatic scenario where sensitive signals are involved, and the need for privacy is always present there.

3. Outsourced adaptive or collaborative filtering: Filtering itself is an essential block of signal processing, present in any system we can think of, from voice processing in a smartphone to complex volume rendering in the production of asynthetic three-dimensional movie.

Page 8: 12R01D5826.ppt
Page 9: 12R01D5826.ppt

FORMALIZING THE PRIVACY FORMALIZING THE PRIVACY PROBLEM:PROBLEM:Any party that participates in a secure protocol interchanges and obtains a series of intermediate messages until the protocol finalizes and the result is provided to the appropriate parties.

The set of all these messages conforms the transcript of the protocol, and the untrusted parties may use it for dishonest purposes.

Semihonest parties follow the predetermined protocol without any deviation

Malicious parties will deviate from the protocol and may introduce fake data

Typically, privacy-preserving protocols tackle the semihonest case and present further extensions for dealing with the more realistic malicious case.

Page 10: 12R01D5826.ppt

MEASURING PRIVACYMEASURING PRIVACY

Once the adversary model is defined- a proper privacy framework should clearly establish means to quantitatively measure the privacy, or,conversely, the private information leakage.

The evaluation of the leakage that a given protocol produces determines its suitability for a set of privacy requirements.

The typical cryptographic measures for security and secrecy usually rely on complexity theory and hardness assumptions.

signal processing measures for the conveyed information in a signal are based on fundamental information-theoretic magnitudes.

Page 11: 12R01D5826.ppt

PRIVACY TOOLS FROM SPEDPRIVACY TOOLS FROM SPED

Homomorphic processing

Searchable encryption and private information retrieval(PIR)

Secure multiparty computation (SMC) and garbled circuits(GCs)

Secure (approximate) interactive protocols

Page 12: 12R01D5826.ppt

Practical limitations of privacy Practical limitations of privacy toolstools

The restrictions and peculiarities of a cloud scenario essentially limit two parameters:

•The bandwidth of the customercloud link, which cannot be continuously active, and

• The computational overhead for the customer.

Page 13: 12R01D5826.ppt

MAPPING COMPLEX TO REAL SOLUTIONSMAPPING COMPLEX TO REAL SOLUTIONS

There are many challenges that SPED must face to provide efficient privacy-preserving solutions in a cloud scenario.

Specifically, several tradeoffs have to be optimized :

For a given privacy-preserving solution, a balance must be found among the following four magnitudes:

Computational load, Communication(bandwidth and interaction rounds), Accuracy (error propagation),and Privacy level (differential privacy).

Page 14: 12R01D5826.ppt

Ideally, a privacy-preserving e-Health cloudified scenario should conformto the generic architecture depicted in Figure as follows

Fig: Generic architecture for a SPED-privacy protected health cloud.

Page 15: 12R01D5826.ppt

CONCLUSION

•Throughout this we have motivated the need for privacy when outsourcing processes to cloud environments

•The first and most fundamental issue deals with the definition and quantification of privacy in the cloud.

•The range of cloud applications is rich and varied, from very simple spreadsheet applications to the rendering of synthetic video scenes or finding the solution to complex optimization problems.

Page 16: 12R01D5826.ppt

ReferencesReferences

[1] W. Zhu, C. Luo, J. Wang, and S. Li, “Multimedia cloud computing,” IEEE SignalProcess. Mag., vol. 28, no. 3, pp. 59–69, May 2011.[2] M. Jensen, J. O. Schwenk, N. Gruschka, and L. L. Iacono, “On technicalsecurity issues in cloud computing,” in Proc. IEEE Int. Conf. Cloud Computing,Bangalore, India, Sept. 2009, pp. 109–116.[3] J. R. Troncoso-Pastoriza and F. Pérez-González, “CryptoDSPs for cloudprivacy,” in Proc. CISE 2010, Hong Kong, China, LNCS 6724.[4] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: ABerkeley view of cloud computing,” EECS Dept., Univ. California, Berkeley, Tech.Rep. UCB/EECS-2009-28, Feb. 2009.[5] M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, “Scifi: A system forsecure face identification,” in Proc. 2010 IEEE Symp. Security and Privacy (SP),Oakland, CA, pp. 239–254.

Page 17: 12R01D5826.ppt
Page 18: 12R01D5826.ppt

Recommended