KEYWORDS: Clouds, Multimedia, Computer simulations, Mobile devices, Data processing, Data modeling, Computer security, Detection and tracking algorithms, Multimedia encryption, Computing systems
Mobile devices are usually computationally restricted in carrying out complicated processing algorithms on its multimedia document. While cloud computing provides resources for customers, a major concern is the customer data's privacy and security. The information-theoretic secure (ITS) approach has some advantages over the homomorphic encryption approach. ITS is faster and requires much shorter encryption. In this paper, we proposed a framework based on the ITS paradigm using the linear secret sharing scheme for image and audio processing tasks on mobile devices. Our experiments were carried out on the Amazon EC2 commercial cloud platform with better performance than existing ones.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.