Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing

Benefiting from cloud computing and mobile devices, a huge number of media contents such as videos are shared in mobile networks. Although scalable video coding can be utilized to provide flexible adaptation, the cloud poses a serious threat to media privacy. In this paper, we propose a privacy-preserving multi-dimensional media sharing scheme named SMACD in mobile cloud computing. Firstly, each media layer is encrypted with an access policy based on attribute-based encryption, which guarantees media confidentiality as well as fine-grained access control. Then we present a multi-level access policy construction with secret sharing scheme. It ensures that the mobile consumers who obtain a media layer at a higher access level must satisfy the access trees of its child layers at the lower access level, which is compatible with the characteristics of multi-dimensional media and also reduces the complexity of access policies. Moreover, we introduce decentralized key servers to achieve both intra-server and inter-server deduplication by associating different access policies into the same encrypted media. Finally, we conduct experimental evaluation on mobile device and cloud platform with real-world datasets. The results indicate that SMACD protects media privacy against cloud media center and unauthorized parties, while incurring less computational and storage cost.

[1]  Robert H. Deng,et al.  Flexible Access Control to JPEG 2000 Image Code-Streams , 2007, IEEE Transactions on Multimedia.

[2]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[3]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[4]  Alexandra Boldyreva,et al.  Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .

[5]  Marina Blanton,et al.  Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.

[6]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[7]  Thomas Stütz,et al.  A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Bala Srinivasan,et al.  Secure sharing and searching for real-time video data in mobile cloud , 2015, IEEE Network.

[9]  Cheng-Hsin Hsu,et al.  Flexible Broadcasting of Scalable Video Streams to Heterogeneous Mobile Devices , 2011, IEEE Transactions on Mobile Computing.

[10]  Cong Wang,et al.  Toward Encrypted Cloud Media Center With Secure Deduplication , 2017, IEEE Transactions on Multimedia.

[11]  Zhu Han,et al.  Social Learning Based Inference for Crowdsensing in Mobile Social Networks , 2018, IEEE Transactions on Mobile Computing.

[12]  Chang Wen Chen,et al.  Attribute-based multi-dimension scalable access control for social media sharing , 2016, 2016 IEEE International Conference on Multimedia and Expo (ICME).

[13]  Zhen Liu,et al.  Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.

[14]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[15]  Xiaolin Li,et al.  Hiding Media Data via Shaders: Enabling Private Sharing in the Clouds , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[16]  Richard A. Frost,et al.  A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.

[17]  Tao Mei,et al.  Who Are Your “Real” Friends: Analyzing and Distinguishing Between Offline and Online Friendships From Social Multimedia Data , 2017, IEEE Transactions on Multimedia.

[18]  Martín Abadi,et al.  Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..

[19]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[20]  Bart Preneel,et al.  Practical identity-based private sharing for online social networks , 2016, Comput. Commun..

[21]  Chang Wen Chen,et al.  Scalable Access Control For Privacy-Aware Media Sharing , 2019, IEEE Transactions on Multimedia.

[22]  Yixian Yang,et al.  Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing , 2018, IEEE Access.

[23]  Min Chen,et al.  Coping With Emerging Mobile Social Media Applications Through Dynamic Service Function Chaining , 2016, IEEE Transactions on Wireless Communications.

[24]  Robert H. Deng,et al.  Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud , 2019, IEEE Transactions on Big Data.

[25]  Robert H. Deng,et al.  Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks , 2013, IEEE Transactions on Multimedia.

[26]  Tooska Dargahi,et al.  On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.

[27]  Jianle Chen,et al.  Overview of SHVC: Scalable Extensions of the High Efficiency Video Coding Standard , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  Xiaohui Liang,et al.  Exploiting multimedia services in mobile social networks from security and privacy perspectives , 2014, IEEE Communications Magazine.

[29]  Qin Liu,et al.  Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.

[30]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[31]  Zhou Su,et al.  Edge Caching for Layered Video Contents in Mobile Social Networks , 2017, IEEE Transactions on Multimedia.

[32]  Youngjoo Shin,et al.  Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage , 2020, IEEE Transactions on Services Computing.

[33]  Robert H. Deng,et al.  No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption , 2012, Communications and Multimedia Security.

[34]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[35]  Zhiyong Xu,et al.  A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[36]  Mauro Conti,et al.  Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks , 2014, ESORICS.

[37]  Chang Wen Chen,et al.  Secure media sharing in the cloud: Two-dimensional-scalable access control and comprehensive key management , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).

[38]  Robert H. Deng,et al.  Efficient authentication and access control of scalable multimedia streams over packet-lossy networks , 2014, Secur. Commun. Networks.

[39]  Shipeng Li,et al.  An efficient key scheme for layered access control of MPEG-4 FGS video , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[40]  Gabriel-Miro Muntean,et al.  Mobile Multi-Source High Quality Multimedia Delivery Scheme , 2017, IEEE Transactions on Broadcasting.

[41]  Nenghai Yu,et al.  CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding , 2017, IEEE Transactions on Computers.

[42]  Cong Wang,et al.  You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center , 2020, IEEE Transactions on Dependable and Secure Computing.

[43]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.