Lightweight Selective Encryption for Social Data Protection Based on EBCOT Coding

Online social media today has a large number of users and has become a huge platform to collect and share the social data generated by the end users. In addition, based on the development of social applications, the social sensing system has been greatly developed to generate, transmit, and store, which is helping the prosperous of the social computing systems. However, the violation of the security of end users’ social data stored and shared through the social computing system becomes a serious and urgent issue. The data protection on social media platforms is very different compared with the scenario of the traditional encryption algorithms, and most of the existing schemes are not suitable for data protection in the current social sensing and data-sharing system. In this article, we present a novel design based on the agnostic selective encryption concept to efficiently protect the social data based on the embedded block coding with optimized truncation system. By selectively encrypting only a small portion of the bitstreams in the middle layer of this coding system, a high level of protection and efficiency can both be achieved. We also experiment with our method on four common social data formats, and the security analysis tests are performed to verify the high protection level of our method.

[1]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[2]  Ahmad Almogren,et al.  An efficient approach of improving privacy and security in online social networks , 2018, Concurr. Comput. Pract. Exp..

[3]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[4]  Thomas Stütz,et al.  Format-compliant jpeg2000 encryption with combined packet header and packet body protection , 2007, MM&Sec.

[5]  Meikang Qiu,et al.  Enabling real-time information service on telehealth system over cloud-based big data platform , 2017, J. Syst. Archit..

[6]  Marco Baldi,et al.  Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[7]  Petr Holub,et al.  GPU-Based Sample-Parallel Context Modeling for EBCOT in JPEG2000 , 2010, MEMICS.

[8]  Touradj Ebrahimi,et al.  The JPEG 2000 still image compression standard , 2001, IEEE Signal Process. Mag..

[9]  Keith W. Ross,et al.  Estimating age privacy leakage in online social networks , 2012, 2012 Proceedings IEEE INFOCOM.

[10]  Meikang Qiu,et al.  Feedback Dynamic Algorithms for Preemptable Job Scheduling in Cloud Systems , 2010 .

[11]  Robert H. Deng,et al.  Compliant encryption of JPEG2000 codestreams , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[12]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[13]  Paul Voigt,et al.  The Eu General Data Protection Regulation (Gdpr): A Practical Guide , 2017 .

[14]  François-Xavier Standaert,et al.  Mutual Information Analysis: How, When and Why? , 2009, CHES.

[15]  Fang Liu,et al.  Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce , 2015, CODASPY.

[16]  Keke Gai,et al.  Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things , 2018, IEEE Internet of Things Journal.

[17]  Thomas Shrimpton,et al.  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.

[18]  Alptekin Temizel,et al.  Optimized GPU Implementation of JPEG 2000 for Satellite Image Decompression , 2018, 2018 IEEE International Conference on Computational Science and Engineering (CSE).

[19]  Mohammed Ghanbari,et al.  Scope of validity of PSNR in image/video quality assessment , 2008 .

[20]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[21]  Jun Zhang,et al.  A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection , 2015, IEEE Transactions on Computational Social Systems.

[22]  Jens H. Krüger,et al.  GPGPU: general purpose computation on graphics hardware , 2004, SIGGRAPH '04.

[23]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[24]  Ping-Sing Tsai,et al.  JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures , 2004 .

[25]  Claudio Soriente,et al.  Securing Cloud Data Under Key Exposure , 2019, IEEE Transactions on Cloud Computing.

[26]  Christophe De Vleeschouwer,et al.  Secure and Low Cost Selective Encryption for JPEG2000 , 2008, 2008 Tenth IEEE International Symposium on Multimedia.

[27]  Laurence T. Yang,et al.  Trace malicious source to guarantee cyber security for mass monitor critical infrastructure , 2018, J. Comput. Syst. Sci..

[28]  Jon M. Kleinberg,et al.  Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook , 2013, CSCW.

[29]  Muhammad Al-Qurishi,et al.  A prediction system of Sybil attack in social network using deep-regression model , 2017, Future Gener. Comput. Syst..

[30]  Mianxiong Dong,et al.  FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[31]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[32]  Andreas Uhl,et al.  Selective encryption of wavelet-packet encoded image data: efficiency and security , 2003, Multimedia Systems.

[33]  Zhihui Lu,et al.  All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives , 2019, Inf. Sci..

[34]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..

[35]  Tao Xiang,et al.  Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks , 2014, Signal Process. Image Commun..

[36]  Laurence T. Yang,et al.  Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme , 2018, IEEE Transactions on Cloud Computing.

[37]  Meikang Qiu,et al.  A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT , 2021, IEEE Transactions on Cloud Computing.

[38]  Zafar Shahid,et al.  Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings , 2014, IEEE Transactions on Multimedia.

[39]  Naixue Xiong,et al.  Construction Low Complexity and Low Delay CDS for Big Data Code Dissemination , 2018, Complex..

[40]  Jeffrey S. Vetter,et al.  A Survey of Methods for Analyzing and Improving GPU Energy Efficiency , 2014, ACM Comput. Surv..

[41]  Thomas Stütz,et al.  On Format-Compliant Iterative Encryption of JPEG2000 , 2006, Eighth IEEE International Symposium on Multimedia (ISM'06).