Using Homomorphic Encryption in Cloud-Based Medical Image Processing: Opportunities and Challenges

Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 37)

Abstract

The modern radiologists and doctors often use imaging software for a better diagnosis, and hence, to deliver improved patient care. Obviously, since digital records contain useful biological information, they are now being massively produced. Unfortunately, the maintenance and licenses required to mange an on-premise solution is a costly and time-consuming approach. To overcome this challenge, healthcare organizations implement cloud services to process medical images with the help of remote tools and facilities. In fact, cloud computing has, since its emergence, changed the way we build and develop IT services. In this new paradigm, computational resources are accessed and downloaded as needed through the Internet. The aim of this concept is to outsource computations to an external entity in order to reduce costs. In this context, the billing system of this model is based mainly on software utilization and Service-Level Agreement (SLA) contract. Despite its promising features, the adoption of this technology in healthcare domain gives rise to different problems regarding privacy and security. In this respect, we are interested in highlighting opportunities and challenges of image processing using cloud, as well as suggestions for future developments. We are particularly focused on homomorphic encryption techniques and their applications in data processing. There are only a few studies in the literature that deal with this subject. The results of the present study reveal that homomorphic encryption is a promising technique to ensure data privacy when using cloud services. However, existing schemes still have some limitations, especially computational costs.

Keywords

Medical image Cloud computing Homomorphic encryption Security 

References

  1. 1.
    Mell, P., Grance, T.: The NIST definition of cloud computing, vol. 15, pp. 1–3. Technical report, National Institute of Standards and Technology (2009)Google Scholar
  2. 2.
    Mazhar, A., Samee, U.K., Athanasios, V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)Google Scholar
  3. 3.
    Marwan, M., Kartit, A., Ouahmane, H.: Cloud-based medical image issues. Int. J. Appl. Eng. Res. 11, 3713–3719 (2016)Google Scholar
  4. 4.
    Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2013)Google Scholar
  5. 5.
    Abbas, A., Khan, S.U.: E-health cloud: privacy concerns and mitigation strategies. In: Gkoulalas-Divanis, A., Loukides, G. (eds.) Medical Data Privacy Handbook, pp. 389–421. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-23633-9_15
  6. 6.
    Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, CLOUDCOM 2010, pp. 693–702. IEEE Computer Society, Washington, DC (2010)Google Scholar
  7. 7.
    Al Nuaimi, N., AlShamsi, A., Mohamed, N., Al-Jaroodi, J.: E-health cloud implementation issues and efforts. In: Proceedings of the International Conference on Industrial Engineering and Operations Management (IEOM), pp. 1–10 (2015)Google Scholar
  8. 8.
    Raykova, M., Zhao H., Bellovin, S.M.: Privacy enhanced access control for outsourced data sharing. In: Keromytis A.D. (ed.) Financial Cryptography and Data Security, FC 2012. LNCS, vol. 7397. Springer, Heidelberg (2012)Google Scholar
  9. 9.
    Gomathikrishnan, M., Tyagi, A.: HORNS-a homomorphic encryption scheme for cloud computing using residue number system. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2011)Google Scholar
  10. 10.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-48910-x_16
  11. 11.
    Bhabendu, K.M., Debasis, G.: Fully homomorphic encryption equating to cloud security: an approach. J. Comput. Eng. (IOSRJCE) 9, 46–50 (2013)Google Scholar
  12. 12.
    Yi, X., Paulet, R., Bertino, E.: Homomorphic Encryption and Applications. SpringerBriefs in Computer Science. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-12229-8
  13. 13.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATHGoogle Scholar
  14. 14.
    Kota, C.M., Aissi, C.: Implementation of the RSA algorithm and its cryptanalysis. In: Proceedings of the ASEE Gulf-Southwest Annual Conference. University of Louisiana at Lafayette (2002)Google Scholar
  15. 15.
    Gorti, V.S., Garimella, U.: An efficient secure message transmission in mobile ad hoc networks using enhanced homomorphic encryption scheme. Global J. Comput. Sci. Technol. Netw. Web Secur. 3, 20–33 (2013). version 1.0Google Scholar
  16. 16.
    Challa, R.K., Kakinada, J., Vijaya Kumari, G., Sunny, B.: Secure image processing using LWE based homomorphic encryption. In: Proceedings of the IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–6 (2015)Google Scholar
  17. 17.
    Gomathisankaran, M., Yuan, X., Kamongi, P.: Ensure privacy and security in the process of medical image analysis. In: Proceedings of the IEEE International Conference on Granular Computing (GrC), pp. 120–125 (2013)Google Scholar
  18. 18.
    Kanithi, S.R., Latha, A.G.: Secure image processing using discrete wavelet transform and Paillier cryptosystem. Int. J. Mag. Eng. Technol. Manag. Res. 2(10), 1270–1276 (2015)Google Scholar
  19. 19.
    Habeep, N., Dayal Raj, R.: Homomorphic encrypted domain with DWT methods. Int. J. Invent. Comput. Sci. Eng. 1(3), 2348–3431 (2014)Google Scholar
  20. 20.
    Yang, P., Gui, X., An, J., Tian, F.: An efficient secret key homomorphic encryption used in image processing service. Int. J. Secur. Commun. Netw. Hindawi, 2017, article ID 7695751, 11 p. (2017).  https://doi.org/10.1155/2017/7695751
  21. 21.
    El Makkaoui, K., Beni Hassane, A.: Challenges of using homomorphic encryption to secure cloud computing. In: Proceedings of the International Conference on Cloud Technologies and Applications (CloudTech) (2015)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.LTI Laboratory, ENSAChouaïb Doukkali UniversityEl JadidaMorocco

Personalised recommendations