SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud

The wide attacking surface of the public cloud poses threats to the security of sensitive information such as medical information stored at these distributed cloud data centers. Obscuring this information using traditional encryption schemes would limit the processing capabilities in encrypted domain that are provided via various cloud services. Moreover, it is vital to address the issue of rightful ownership so that the person to which the medical information belongs to can be determined. To address these issues, Chinese Remainder Theorem (CRT) based secret sharing scheme has been employed to divide the medical images into multiple random looking shares which are information theoretically secure and reveal no information about the images. Based on a secret key, some of these encrypted shares are embedded with the secret owner specific information in the encrypted domain itself prior to outsourcing. To prove rightful ownership at the receiver end, this secret information can be extracted either directly from the shares stored at the cloud data centers or obtained after recovery of the medical information at the authentic entity end which possesses the secret keys. The robustness of the scheme against different attack scenarios while stored at the cloud,,,, data centers in encrypted domain has been tested to validate the efficacy of the proposed scheme.

[1]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[2]  Suneeta Agarwal,et al.  A self recoverable dual watermarking scheme for copyright protection and integrity verification , 2017, Multimedia Tools and Applications.

[3]  Pradeep K. Atrey,et al.  Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[4]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[5]  Balasubramanian Raman,et al.  Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system , 2016, ICVGIP '16.

[6]  Ying Luo,et al.  Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.

[7]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.

[9]  Jianting Guo,et al.  Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..

[10]  Uwe Schwiegelshohn,et al.  Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..

[11]  Manoj Misra,et al.  Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system , 2017, Multimedia Tools and Applications.

[12]  Vincenzo Piuri,et al.  A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[13]  Pradeep K. Atrey,et al.  Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System , 2017, ACM Trans. Multim. Comput. Commun. Appl..

[14]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Mauro Barni,et al.  Encrypted Domain DCT Based on Homomorphic Cryptosystems , 2009, EURASIP J. Inf. Secur..

[16]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[17]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[18]  Balasubramanian Raman,et al.  Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[20]  Balasubramanian Raman,et al.  Reversible data hiding based on Shamir's secret sharing for color images over cloud , 2018, Inf. Sci..