Tradeoff between energy savings and privacy protection in computation offloading

Offloading can save energy on mobile systems for computation-intensive applications. The mobile systems send programs and data to grid-powered servers where computation is performed. Offloading, however, causes privacy concerns because sensitive data may be sent to servers. This paper investigates how to protect privacy in computation offloading. We use steganography to hide data before sending them to servers. This paper evaluates the tradeoff between energy savings and privacy protection for content-based image retrieval with different steganographic techniques. We implement these methods on a PDA and compare their energy consumption, performance, and effectiveness of protecting privacy.

[1]  David Salesin,et al.  Fast multiresolution image querying , 1995, SIGGRAPH.

[2]  Zhiyuan Li,et al.  Adaptive computation offloading for energy conservation on battery-powered systems , 2007, 2007 International Conference on Parallel and Distributed Systems.

[3]  Sushil Jajodia,et al.  Preserving confidentiality of security policies in data outsourcing , 2008, WPES '08.

[4]  Yung-Hsiang Lu,et al.  Ranking servers based on energy savings for computation offloading , 2009, ISLPED.

[5]  Xinpeng Zhang,et al.  Steganography with Least Histogram Abnormality , 2003, MMM-ACNS.

[6]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[7]  Cheng Wang,et al.  Computation offloading to save energy on handheld devices: a partition scheme , 2001, CASES '01.

[8]  James Ze Wang,et al.  Image retrieval: Ideas, influences, and trends of the new age , 2008, CSUR.

[9]  Massoud Pedram,et al.  Extending the lifetime of a network of battery-powered mobile devices by remote processing: a Markovian decision-based approach , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).

[10]  Yung-Hsiang Lu,et al.  Energy efficient content-based image retrieval for mobile systems , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[11]  Heung-Kyu Lee,et al.  Multi Bit Plane Image Steganography , 2006, IWDW.

[12]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[13]  William Ella Detecting steganography on a large scale , 2008, ACM Crossroads.

[14]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[15]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[16]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[17]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[18]  Chandra Krintz,et al.  Using bandwidth data to make computation offloading decisions , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.