Abstract
With the significant improvements in mobile digital devices and wireless networking technologies, we have witnessed the explosion of multimedia data. Because it is dynamic, vast in volume, and heterogeneous, this data not only evokes various novel data-driven services and applications, but also brings considerable security threats. In this article, the authors focus on privacy leakage issues in multimedia systems and study how to maximize the total privacy weights and upgrade the security level given predefined time and resource constraints. To this end, they propose a selective privacy-preserving method that adaptively allocates encryption resources according to the privacy weight and execution time of each data package. That is, it selects the encryption method with the appropriate complexity and security level for each multimedia data package. It first divides the data randomly into two parts, then performs XOR operations and generates cipher keys in different cloud storages to prevent users' original information from being attacked by untrusted cloud operators. Extensive simulation results have demonstrated the advantages and superiority of the proposed method over previous schemes. This article is part of a special issue on cybersecurity.
| Original language | English |
|---|---|
| Article number | 8100672 |
| Pages (from-to) | 14-25 |
| Number of pages | 12 |
| Journal | IEEE Multimedia |
| Volume | 24 |
| Issue number | 4 |
| DOIs | |
| Publication status | Published - 1 Oct 2017 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
Keywords
- big data
- cybercrime
- data analysis
- multimedia data
- privacy weights
- resource constraints
- security
- security levels
- time constraints
ASJC Scopus subject areas
- Software
- Signal Processing
- Media Technology
- Hardware and Architecture
- Computer Science Applications
Fingerprint
Dive into the research topics of 'A selective privacy-preserving approach for multimedia data'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver