3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud

Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello

Abstract

With the evolution of cloud computing, organizations are outsourcing the storage and rendering of volume (i.e., 3D data) to cloud servers. Data confidentiality at the third-party cloud provider, however, is one of the main challenges. In this paper, we address this challenge by proposing – 3DCrypt – a modified Paillier cryptosystem scheme for multi-user settings that allows cloud datacenters to render the encrypted volume. The rendering technique we consider in this work is pre-classification volume ray-casting. 3DCrypt is such that multiple users can render volumes without sharing any encryption keys. 3DCrypt’s storage and computational overheads are approximately 66.3 MB and 27 seconds, respectively when rendering is performed on a 256 × 256 × 256 volume for a 256×256 image space.

References

  1. Ateniese, G., Fu, K., Green, M., and Hohenberger, S. (2006). Improved proxy re-encryption schemes with applications to secure distributed storage. ACM TISSEC, 9:1-30.
  2. Ayday, E., Raisaro, J. L., Hubaux, J.-P., and Rougemont, J. (2013). Protecting and evaluating genomic privacy in medical tests and personalized medicine. In ACM WPES, pages 95-106.
  3. Baharon, M., Shi, Q., Llewellyn-Jones, D., and Merabti, M. (2013). Secure rendering process in cloud computing. In PST, pages 82-87.
  4. Bresson, E., Catalano, D., and Pointcheval, D. (2003). A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, pages 37-54.
  5. Chou, J.-K. and Yang, C.-K. (2015). Obfuscated volume rendering. The Visual Computer, pages 1-12.
  6. Cuervo, E., Wolman, A., and et al., L. P. C. (2015). Kahawai: High-quality mobile gaming using GPU offload. In MobiSys, pages 121-135.
  7. Dasgupta, A. and Kosara, R. (2011). Adaptive privacypreserving visualization using parallel coordinates. IEEE TVCG, 17(12):2241-2248.
  8. Intel Inc. (2011). Experimental cloud-based ray tracing using intel mic architecture for highly parallel visual processing. Online Report.
  9. KDDI Inc. (2012). Medical real-time 3d imaging solution. Online Report.
  10. Koller, D., Turitzin, M., and et al., M. L. (2004). Protected interactive 3D graphics via remote rendering. In ACM SIGGRAPH, pages 695-703.
  11. Mohanty, M., Atrey, P. K., and Ooi, W. T. (2012). Secure cloud-based medical data visualization. In ACMMM, pages 1105-1108, Nara, Japan.
  12. Mohanty, M., Ooi, W. T., and Atrey, P. K. (2013). Secure cloud-based volume ray-casting. In IEEE CloudCom, Bristol, UK.
Download


Paper Citation


in Harvard Style

Mohanty M., Asghar M. and Russello G. (2016). 3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 283-291. DOI: 10.5220/0005966302830291


in Bibtex Style

@conference{secrypt16,
author={Manoranjan Mohanty and Muhammad Rizwan Asghar and Giovanni Russello},
title={3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={283-291},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005966302830291},
isbn={978-989-758-196-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - 3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud
SN - 978-989-758-196-0
AU - Mohanty M.
AU - Asghar M.
AU - Russello G.
PY - 2016
SP - 283
EP - 291
DO - 10.5220/0005966302830291