Volume 5 , Issue 1 , PP: 20-32, 2021 | Cite this article as | XML | Html | PDF | Full Length Article
Khaled Riad 1
Doi: https://doi.org/10.54216/JISIoT.050103
Recently, the security of heterogeneous multimedia data becomes a very critical issue, substantially with the proliferation of multimedia data and applications. Cloud computing is the hidden back-end for storing heterogeneous multimedia data. Notwithstanding that using cloud storage is indispensable, but the remote storage servers are untrusted. Therefore, one of the most critical challenges is securing multimedia data storage and retrieval from the untrusted cloud servers. This paper applies a Shamir Secrete-Sharing scheme and integrates with cloud computing to guarantee efficiency and security for sensitive multimedia data storage and retrieval. The proposed scheme can fully support the comprehensive and multilevel security control requirements for the cloud-hosted multimedia data and applications. In addition, our scheme is also based on a source transformation that provides powerful mutual interdependence in its encrypted representation—the Share Generator slices and encrypts the multimedia data before sending it to the cloud storage. The extensive experimental evaluation on various configurations confirmed the effectiveness and efficiency of our scheme, which showed excellent performance and compatibility with several implementation strategies.
Multimedia data, Cloud security, Cryptography, Shamir Secret-Sharing, Swift
[1] D. Quick and K.-K. R. Choo, "Big forensic data management in heterogeneous distributed systems: Quick analysis of multimedia forensic data," Softw. Pract. Exper., vol. 47, no. 8, pp. 1095–1109, Aug. 2017.
[2] Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, and K. K. R. Choo, "Fuzzy identity- based data integrity auditing for reliable cloud storage systems," IEEE Transactions on Dependable and Secure Computing, pp. 1–1, 2017.
[3] Z. Liu, K.-K. R. Choo, and M. Zhao, "Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions," Computers & Security, vol. 69, pp. 97 – 113, 2017, security Data Science and Cyber Threat Management.
[4] B. Thuraisingham, "Security and privacy for multimedia database management systems," Multimedia Tools and Applications, vol. 33, no. 1, pp. 13–29, Apr 2007.
[5] B. B. Gupta, S. Yamaguchi, and D. P. Agrawal, "Advances in security and privacy of multimedia big data in mobile and cloud computing," Multimedia Tools and Applications, vol. 77, no. 7, pp. 9203–9208, Apr 2018.
[6] S. Aljawarneh, M. B. Yassein, and W. A. Talafha, "A multithreaded programming approach for multimedia big data: encryption system," Multimedia Tools and Applications, vol. 77, no. 9, pp. 10 997–11 016, May 2018.
[7] G. R. Blakley, "Safeguarding Cryptographic Keys," in AFIPS, International Workshop on, Managing Requirements Knowledge, vol. 48, 1979, pp. 313–317.
[8] A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
[9] G. R. Blakley and C. Meadows, Advances in Cryptology, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000, vol. 196, no. 0302-9743, ch. Security of Ramp Schemes, pp. 242–268.
[10] I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan], "The rise of "big data" on cloud computing: Review and open research issues," Information Systems, vol. 47, pp. 98 – 115, 2015.
[11] C. Fu, Z. Yang, X. Liu, J. Yang, A. Walid, and L. T. Yang, "Secure tensor decomposition for heterogeneous multimedia data in cloud computing," IEEE Transactions on Computational Social Systems, vol. 7, no. 1, pp. 247–260, 2020.
[12] B. Martini, P. Mori, F. Marino, A. Saracino, A. Lunardelli, A. L. Marra, F. Martinelli, and P. Castoldi, "Pushing forward security in network slicing by leveraging continuous usage control," IEEE Communications Magazine, vol. 58, no. 7, pp. 65–71, 2020.
[13] L. Chen, "Analysis of synchronized storage method for multimedia key areas based on machine learning," Multimedia Tools and Applications, May 2019.
[14] Y. Xiao, L. Zhang, and L. Hou, "Autonomous multimedia cluster computing based on cooperative cognition data behavior measurement under multi-cloud computing," Multimedia Tools and Applications, vol. 78, no. 7, pp. 8783–8797, Apr 2019.
[15] Z. Cheng, X. Chang, L. Zhu, R. C. Kanjirathinkal, and M. Kankanhalli, "Mmalfm: Explainable recommendation by leveraging reviews and images," ACM Trans. Inf. Syst., vol. 37, no. 2, pp. 16:1–16:28, Jan. 2019.
[16] K. Riad and J. Cheng, "Adaptive XACML access policies for heterogeneous distributed IoT environments," Information Sciences, vol. 548, pp. 135-152, 2021.
[17] J. Xiong, Y. Zhang, X. Li, M. Lin, Z. Yao, and G. Liu, "Rse-pow: a role symmetric encryption pow scheme with authorized deduplication for multimedia data," Mobile Networks and Applications, vol. 23, no. 3, pp. 650–663, Jun 2018.
[18] K. Riad and L. Ke, "Roughdroid: Operative scheme for functional android malware detection," Wireless Communications and Mobile Computing, vol. 2018, pp. 1–10, 2018.
[19] Y. Yang, X. Zheng, V. Chang, S. Ye, and C. Tang, "Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud," Multimedia Tools and Applications, vol. 77, no. 8, pp. 9927–9941, Apr 2018.
[20] K. Riad and Z. Yan, "Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud," International Journal of Cooperative Information Systems, vol. 26, no. 4, pp. 1–33, 2017.
[21] Q. Zhang, L. T. Yang, and Z. Chen, "Privacy preserving deep computation model on cloud for big data feature learning," IEEE Transactions on Computers, vol. 65, no. 5, pp. 1351–1362, May 2016.
[22] Z. Cheng, Y. Ding, X. He, L. Zhu, X. Song, and M. Kankanhalli, "A3ncf: An adaptive aspect attention model for rating prediction," in Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI-18. International Joint Conferences on Artificial Intelligence Organization, 7 2018, pp. 3748–3754.
[23] K. Riad, T. Huang, and L. Ke, "A dynamic and hierarchical access control for IoT in multi-authority cloud storage," Journal of Network and Computer Applications, vol. 160, pp. 102633, 2020.
[24] K. Guo, W. Pan, M. Lu, X. Zhou, and J. Ma, "An effective and economical architecture for semantic-based heterogeneous multimedia big data retrieval," Journal of Systems and Software, vol. 102, pp. 207 – 216, 2015.
[25] L. Xie, L. Zhu, and G. Chen, "Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval," Multimedia Tools and Applications, vol. 75, no. 15, pp. 9185–9204, Aug 2016.
[26] K. Riad and L. Ke, "Secure storage and retrieval of IoT data based on private information retrieval," Wireless Communications and Mobile Computing, vol. 2018, pp. 1–10, 2018.
[27] K. Guo, Z. Liang, Y. Tang, and T. Chi, "Sor: An optimized semantic ontology retrieval algorithm for heterogeneous multimedia big data," Journal of Computational Science, vol. 28, pp. 455 – 465, 2018.
[28] Z. Gao, H. Zhang, G. Xu, Y. Xue, and A. Hauptmann, "Multi-view discriminative and structured dictionary learning with group sparsity for human action recognition," Signal Process., vol. 112, no. C, pp. 83–97, Jul. 2015.
[29] K. Li, G.-J. Qi, and K. A. Hua, "Learning label preserving binary codes for multimedia retrieval: A general approach," ACM Trans. Multimedia Comput. Commun. Appl., vol. 14, no. 1, pp. 2:1–2:23, Dec. 2017.
[30] J. Yan, H. Zhang, J. Sun, Q. Wang, P. Guo, L. Meng, W. Wan, and X. Dong, "Joint graph regularization-based modality-dependent cross-media retrieval," Multimedia Tools and Applications, vol. 77, no. 3, pp. 3009–3027, Feb 2018.
[31] C.-C. Yang, T.-Y. Chang, and M.-S. Hwang, "A (t,n) multi-secret sharing scheme," Applied Mathematics and Computation, vol. 151, no. 2, pp. 483– 490, 2004.
[32] OpenStack, "http://www.openstack.org/."
[33] H. Krawczyk, Advances in Cryptology, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2001, vol. 773, no. 0302-9743, ch. Secret Sharing Made Short, pp. 136–146.