Efficient Privacy-preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain


Signal Processing in an encrypted domain is a potential tool that could protect sensitive signals from untrusted cloud servers and unauthorized users in a delegated computing setting. This would be accomplished without compromising the accuracy of large-scale signal analyzing and processing. The majority of the currently available methods encrypt each signal in a large bundle using Paillier's public key additively homomorphic encryption. This results in significant computational costs being incurred at local devices, which frequently have limited resources, while only guaranteeing the privacy of signal inputs. This paper proposes an efficient privacy-preserving outsourced discrete wavelet transform scheme (PPDWT), consisting of PPDWT-1 and PPDWT-2, that does not leverage public key (fully) homomorphic encryption in order to address these limitations. PPDWT stands for privacy-preserving outsourced discrete wavelet transform. Specifically, PPDWT-1 is proposed to achieve signal input privacy against the collusion between the honest-but-curious cloud and unauthorized users, and PPDWT-2 is proposed to protect both signal input privacy and coefficient privacy against collusion attacks. Both of these protections are provided by the PPDWT-1 and PPDWT-2 proposals. In order to encrypt batch signals, both constructions make use of the offline execution of any one-way trapdoor permutation only once. This makes it possible for Signal Processing to take place within the encrypted domain. Only users who have been granted permission can successfully decipher the results of the discrete wavelet transform using our method. Our method only incurs O(1) computational complexity, which is independent to the size of the signal inputs |l|, in contrast to the O(|l|) computational complexity on the user's end in existing state-of-the-art public key homomorphic encryption-based techniques. In the encrypted domain, we also discuss the expanding factor, the upper bound, and various extensions to the privacy-preserving discrete cosine/fourier transform. In conclusion, the universal composability (UC) model has provided a formal demonstration that our proposed PPDWT is secure. Case studies are then utilized in our analysis of the proposed methodology in order to demonstrate the methodology's viability and efficacy.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : TARA: An Efficient Random Access Mechanism for NB-IoT by Exploiting TA Value Difference in Collided Preambles ABSTRACT: The 3rd Generation Partnership Project (3GPP) has specified the narrowband Internet of Things
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering ABSTRACT: A wide variety of big data applications generate an enormous amount of streaming data that is high-dimensional, real-time, and constantly
PROJECT TITLE : Efficient Shapelet Discovery for Time Series Classification ABSTRACT: Recently, it was discovered that time-series shapelets, which are discriminative subsequences, are effective for the classification of time
PROJECT TITLE : Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage ABSTRACT: A significant number of clients currently store multiple copies of their data on a variety of cloud servers. This helps

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry