SECURE VIDEO TRANSCODING IN MOBILE CLOUD COMPUTING
DOI:
https://doi.org/10.47839/ijc.17.4.1142Keywords:
Video Transcoding, Fully Homomorphic Encryption, Mobile Cloud Computing, Data Security, Data Privacy.Abstract
Video Transcoding is one of the recent services available online nowadays provided by the clouds to enable a user to convert a video format from one into another in a very convenient way. To transcode a video, all of the video contents need to be uploaded to the cloud storage. However, outsourcing video contents that may contain sensitive information do not guarantee the video security and privacy as the clouds have the ability to access them. Thus, in this paper, an enhanced homomorphic encryption scheme is proposed to allow massive amount of frames to be transcoded by the cloud server in a secure manner. This scheme encrypts integers rather than individual bits so as to improve the scheme’s efficiency. With the aid of a proposed process for multiple parties to communicate securely, the efficiency of the scheme is thoroughly evaluated and compared with related works. The result shows that our scheme offers much better efficiency, which makes it more suitable for operating the video transcoding in cloud environment.References
V. Turchenko, V. Shults, I. Turchenko, R. M. Wallace, M. Sheikhalishahi, J. L. Vazquez-Poletti, and L. Grandinetti, “Spot Price prediction for cloud computing,” International Journal of Computing, vol. 12, issue 4, pp. 348–359, 2013.
F. Jokhio, A. Ashraf, S. Lafond, and J. Lilius, “A computation and storage trade-off strategy for cost-efficient video transcoding in the cloud,” Proceeedings of the 39th Euromicro Conference on Software Engineering and Advanced Applications, Sep. 2013, pp. 365-372.
Z. Kuang, S. Guo, J. Liu, and Y. Yang, “A quick-response framework for multi-user computation offloading in mobile cloud computing,” Future Generation Computer Systems, vol. 81, pp. 166–176, 2018.
S. Ko, S. Park, and H. Han, “Design analysis for real-time video transcoding on cloud systems,” Proceedings of the 28th Annual ACM Symposium on Applied Computing - SAC’13, 2013, p. 1610.
A. Ashraf, F. Jokhio, T. Deneke, S. Lafond, I. Porres, and J. Lilius, “Stream-based admission control and scheduling for video transcoding in cloud computing,” in Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, 2013, pp. 482-489.
M. Sookhak, F. R. Yu, M. Khurram, and Y. Xiang, “Attribute-based data access control in mobile cloud computing : Taxonomy and open issues,” Future Generation Computer Systems, vol. 72, pp. 273–287, 2017.
M. R. Baharon, Q. Shi, and D. Llewellyn-Jones, “A new lightweight homomorphic encryption scheme for mobile cloud computing,” 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure, 2015.
J. Qi, M. Jienfeng, and W. Fushan, “On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services,” IEEE System Journal, vol. PP, no. 99, pp. 1–4, 2016.
L. Griebel, H. Prokosch, F. Köpcke, D. Toddenroth, J. Christoph, I. Leb, I. Engel, and M. Sedlmayr, “A scoping review of cloud computing in healthcare,” BMC Medical Informatics and Decision Making, vol. 15, no. 17, pp. 1–16, 2015.
O. Zibouh, A. Dalli, and H. Drissi, “Cloud Computing security through parallelizing fully homomorphic encryption applied to multi-cloud approach,” Journal of Theoretical and Applied Information Technology, vol. 87, no. 2, pp. 300–307, 2016.
M. R. Baharon, Q. Shi, D. Llewellyn-Jones, and M. Merabti, “Secure rendering process in cloud computing,” Proceedings of the 11th Annual Conference on Privacy, Security and Trust, PST 2013, 2013, pp. 82–87.
F. Liu and H. Koenig, “A survey of video encryption algorithms,” Computers & Security, vol. 29, no. 1, pp. 3–15, Feb. 2010.
C. Gentry, A Fully Homomorphic Encryption Scheme, Ph.D. Dissertation, Stanford University, 2009.
M. Naehrig, K. Lauter, and V. Vaikuntanathan, “Can homomorphic encryption be practical?,” Proceedings of the 3rd ACM workshop on Cloud computing security workshop CCSW’11, 2011, p. 113.
A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, “A survey on homomorphic encryption schemes: theory and implementation,” Journal ACM Computing Surveys (CSUR), vol. 50, no. 6, pp. 83:2-83:33, 2017.
H. Zhou and G. Wornell, “Efficient homomorphic encryption on integer vectors and its applications,” in Information Theory and Applications Workshop (ITA), 2014, pp. 1–9.
R. Masram, V. Shahare, J. Abraham, and R. Moona, “Analysis and Comparison of symmetric key cryptographic algorithms based on various file features,” International Journal of Network Security & Its Applications (IJNSA), vol. 6, no. 4, pp. 43–52, 2014.
S. Bahrami and M. Naderi, “Encryption of multimedia content in partial encryption scheme of DCT transform coefficients using a lightweight stream algorithm,” Optik – International Journal for Light and Electron Optics, vol. 124, no. 18, pp. 3693–3700, Sep. 2013.
L. Mou, T. Huang, L. Huo, W. Li, W. Gao, and X. Chen, “A secure media streaming mechanism combining encryption, authentication, and transcoding,” Signal Processing: Image Communication, vol. 24, no. 10, pp. 825–833, Nov. 2009.
L. Xiao, O. Bastani, and I.-L. Yen, “An efficient homomorphic encryption protocol for multi-user systems,” IACR Cryptology ePrint Archive 2012, pp. 193–212, 2012.
C. Gentry and S. Halevi, “Fully homomorphic encryption without squashing using Depth-3 arithmetic circuits,” Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, Oct. 2011, pp. 107–109.
D. Boneh, “Evaluating 2-DNF Formulas on Ciphertexts,” Second Theory of Cryptography Conference, TCC 2005, Cambridge Proceedings, 2005, pp. 325–341.
M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully homomorphic encryption over the integers,” Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2010, pp. 24–43.
M. Tibouchi, “Batch fully homomorphic encryption over the integers,” Lecture Notes in Computer Science, vol. 7881, pp. 315–355, 2013.
C. P. Gupta and I. Sharma, “A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds,” Proceedings of the 4th International Conference on the Network of the Future, NoF 2013, 2013, pp. 1–4.
G. Ateniese, “Verifiable encryption of digital signatures and applications,” ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 1–20, Feb. 2004.
H. Ba, W. Heinzelman, C. A. Janssen, and J. Shi, “Mobile computing – a green computing resource,” Proceedings of the IEEE Wireless Communications and Networking Conference, WCNC, 2013, pp. 4451–4456.
H. Qi and A. Gani, “Research on mobile cloud computing : review, trend and perspectives,” Proceedings of the Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), 2012, pp. 195–202.
N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013.
M. Louk, “Homomorphic encryption in mobile multi cloud computing,” Proceedings of the International Conference on Information Networking (ICOIN), 2015, pp. 493–497.
X. Fan, J. Cao, and H. Mao, “A survey of mobile cloud computing,” ZTE Corporation, vol. 16, no. 1, pp. 393–413, 2011.
M. Sookhak, F. R. Yu, M. Khurram, and Y. Xiang, “Attribute-based data access control in mobile cloud computing : Taxonomy and open issues,” Future Generation Computer Systems, vol. 72, pp. 273–287, 2016.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.