Downloads: 131 | Views: 279
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.4 / 10
A Secure Third Party Image Reconstruction System in Cloud
Shinde Nitanjali U., Borole M.V.
Abstract: Large-scale image datasets being exponentially generated nowadays. In conjunction with such knowledge explosion is that the aggressive trend to outsource the image management systems to the cloud for its luxuriant computing resources and edges. However, the way to shield the sensitive knowledge whereas enabling outsourced image services becomes a serious concern. To deal with these challenges, we have a tendency to propose OIRS, a unique outsourced image recovery service design that exploits totally different domain technologies and takes security, efficiency, and style complexness into thought from the terribly starting of the service flow. Specifically, OIRS is based on the compressed sensing (CS) framework that is understood for its simplicity of unifying the normal sampling and compression for image acquisition. Data owners solely have to be compelled to outsource compressed image samples to cloud for reduced storage overhead. Besides, in OIRS, Data users will harness the cloud to firmly reconstruct images while not revealing data from either the compressed image samples or the underlying image content. we have a tendency to begin with the OIRS framrwork for distributed image dataset, that is that the typical application state for compressed sensing, then show its natural extension to the final data for tradeoffs between robustness and accuracy. we have a tendency to completely analyse the privacy-protection of OIRS and conduct in depth experiments to demonstrate the system effectiveness and robustness. For completeness, we have a tendency to conjointly discuss the expected performance acceleration of OIRS through hardware built-in system framework.
Keywords: Compressed sensing, security and privacy, cloud computing, image reconstruction
Edition: Volume 4 Issue 1, January 2015
Pages: 394 - 397
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 1007 - 1011Cloud Computing in Science and Technology: A Review
Rupinder Kaur
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 11 Issue 9, September 2022
Pages: 837 - 842An Optimized IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing Using Deep Learning
Bharathi K.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023
Pages: 273 - 278Genetic based Task Scheduling Algorithms in Cloud Computing Environment
Dr. R. Kavitha, Kale Jyoti S.