CryptoDSPs for Cloud Privacy
Signal processing governs almost every audiovisual stimuli that we receive from electronic sources. Recently, concerns about privacy of the processed signals (especially biomedical signals) has been raised, as it has been traditionally overlooked. This fact, together with the advent of Cloud computing and the growing tendency to outsource not only the storage but also the processing of data has created a fundamental need for privacy preserving techniques that protect signals at the Cloud.
We provide a landscape of technologies brought up by the novel discipline of Signal Processing in the Encrypted Domain (SPED), and we show their application to solve Cloud Computing privacy issues, introducing the concept of virtualized CryptoDSPs, as an architecture for implementing SPED technologies on Cloud scenarios.
KeywordsCloud Computing Discrete Cosine Transform Cloud Infrastructure Cloud Privacy Homomorphic Encryption
Unable to display preview. Download preview PDF.
- 1.The future of cloud computing. opportunities for european cloud computing beyond 2010, european Commission. Information Society and Media (January 2010)Google Scholar
- 2.Piva, A., Katzenbeisser, S. (eds.): EURASIP Journal on Information Security. Special Issue on SPED, Hindawi (December 2007)Google Scholar
- 3.Signal Processing in the EncryptEd Domain project (SPEED)Google Scholar
- 5.Troncoso-Pastoriza, J.R., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: CCS 2007, pp. 519–528. ACM Press, Alexandria (2007)Google Scholar
- 7.Healthgrid initiative, http://www.healthgrid.org
- 8.Troncoso-Pastoriza, J.R., Pérez-González, F.: Secure and Private Medical Clouds using Encrypted Processing. In: VPH Conference 2010, VPH NoE (2010)Google Scholar
- 9.Goldreich, O., Micali, S., Widgerson, A.: How to play any mental game. In: Proceedings of STOC 1987, pp. 218–229. ACM Press, New York (1987)Google Scholar
- 11.Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of STOC 2009, pp. 169–178. ACM Press, Bethesda (2009)Google Scholar
- 13.Privacy with security, DARPA ISAT Study Group (December 2002), http://www.cs.berkeley.edu/~tygar/papers/ISAT-final-briefing.pdf
- 14.Goldreich, O.: Zero-knowledge twenty years after its invention. In: Electronic Colloquium on Computational Complexity (2002)Google Scholar
- 16.Troncoso-Pastoriza, J.R., Pérez-González, F.: Secure Adaptive Filtering. In: IEEE TIFS (accepted, 2011)Google Scholar