Privacy-Preserving Multimedia Mobile Cloud Computing Using Protective Perturbation
Abstract: Mobile cloud computing has been adopted in many multimedia applications, where the resource-constrained mobile device sends multimedia data (e.g., images) to remote cloud servers to request computation-intensive multimedia services (e.g., image recognition). While significantly improving the performance of the mobile applications, the cloud-based mechanism often causes privacy concerns as the multimedia data and services are offloaded from the trusted user device to untrusted cloud servers. Several recent studies have proposed perturbation-based privacy preserving mechanisms, which obfuscate the offloaded multimedia data to eliminate privacy exposures without affecting the functionality of the remote multimedia services. However, the existing privacy protection approaches require the deployment of computation-intensive perturbation generation on the resource-constrained mobile devices. Also, the obfuscated images are typically not compliant with the standard image compression algorithms and suffer from significant bandwidth consumption. In this paper, we develop a novel privacy-preserving multimedia mobile cloud computing framework, namely $PMC2$, to address the resource and bandwidth challenges. $PMC2$ employs secure confidential computing in the cloud to deploy the perturbation generator, which addresses the resource challenge while maintaining the privacy. Furthermore, we develop a neural compressor specifically trained to compress the perturbed images in order to address the bandwidth challenge. We implement $PMC2$ in an end-to-end mobile cloud computing system, based on which our evaluations demonstrate superior latency, power efficiency, and bandwidth consumption achieved by $PMC2$ while maintaining high accuracy in the target multimedia service.
- 2016. GDPR. Intersof Consulting. https://gdpr-info.eu.
- 2020. 40+ Alarming Cloud Security Statistics for 2023. https://www.strongdm.com/blog/cloud-security-statistics.
- 2020. The Importance of Privacy—Both Psychological and Legal. https://www.psychologytoday.com/us/blog/emotional-nourishment/202007/the-importance-privacy-both-psychological-and-legal.
- 2021. HIPAA. US Department of Health and Human Services. https://www.hhs.gov/hipaa/index.html.
- 2021. Intel Software Guard Extensions (SGX). https://software.intel.com/content/www/us/en/develop/topics/software-guard-extensions.html.
- 2023. AMD Secure Encrypted Virtualization. In AMD. https://www.amd.com/en/processors/amd-secure-encrypted-virtualization.
- 2023. Attestation with AMD SEV-SNP. https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snp-attestation.html.
- 2023. Azure confidential computing. In Microsoft. https://azure.microsoft.com/en-us/solutions/confidential-compute/.
- 2023. Confidential Computing - Google Cloud. In Google. https://cloud.google.com/confidential-computing.
- 2023. Confidential computing: an AWS perspective. In Amazon. https://aws.amazon.com/blogs/security/confidential-computing-an-aws-perspective/.
- 2023. Confidential computing on IBM Cloud. In IBM. https://www.ibm.com/cloud/confidential-computing.
- 2023. Confidential Containers. https://github.com/confidential-containers.
- 2023. High Voltage Power Monitor. https://www.msoon.com/high-voltage-power-monitor.
- 2023. Intel Trust Domain Extensions. In Intel. https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.html.
- 2023. Kubernetes. https://kubernetes.io/.
- 2023. libjpeg-turbo. https://libjpeg-turbo.org/.
- 2023. Photoprism. https://www.photoprism.app/.
- 2023. ReduceLROnPlateau. https://pytorch.org/docs/stable/generated/ torch.optim.lr_scheduler.ReduceLROnPlateau.html.
- 2023. Trusted Network. https://www.sciencedirect.com/topics/computer-science/trusted-network.
- 2023. Vultr. https://www.vultr.com.
- ” I am uncomfortable sharing what I can’t see”: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In 29th USENIX Security Symposium (USENIX Security 20). 1929–1948.
- Nebula: Reliable low-latency video transmission for mobile cloud gaming. In ACM Web Conference 2022. 3407–3417.
- Density modeling of images using a generalized normalization transformation. arXiv (2015).
- Variational image compression with a scale hyperprior. arXiv (2018).
- CompressAI: a PyTorch library and evaluation platform for end-to-end compression research. arXiv preprint arXiv:2011.03029 (2020).
- Recent advances and challenges in human-centric multimedia mobile cloud computing. In International Conference on Computing, Networking and Communications (ICNC). 242–246.
- Ankur Chattopadhayay and Isha Rijal. 2023. Towards Inclusive Privacy Consenting for GDPR Compliance in Visual Surveillance: A Survey Study. In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC). 1287–1293.
- Smart in-car camera system using mobile cloud computing framework for deep learning. Vehicular Communications 10 (2017), 84–90.
- Alex Clark. 2015. Pillow (PIL Fork) Documentation. https://buildmedia.readthedocs.org/media/pdf/pillow/latest/pillow.pdf
- A survey on mobile edge computing for video streaming: Opportunities and challenges. IEEE Access (2022).
- Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv (2014).
- Learning multiple layers of features from tiny images. (2009).
- Visual privacy protection methods: A survey. Expert Systems with Applications 42, 9 (2015), 4177–4195.
- Scott Pletcher. 2023. Visual Privacy: Current and Emerging Regulations Around Unconsented Video Analytics in Retail. arXiv preprint arXiv:2302.12935 (2023).
- Learning to anonymize faces for privacy preserving action detection. In European conference on computer vision (ECCV). 620–636.
- Privacy concerns for visual assistance technologies. ACM Transactions on Accessible Computing (TACCESS) 15, 2 (2022), 1–43.
- Natural and effective obfuscation by head inpainting. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 5050–5059.
- Capia: Cloud assisted privacy-preserving image annotation. In 2017 IEEE Conference on Communications and Network Security (CNS). 1–9.
- Shaoxuan Wang and Sujit Dey. 2013. Adaptive mobile cloud computing to enable rich mobile multimedia applications. IEEE Transactions on Multimedia 15, 4 (2013), 870–883.
- PECAM: privacy-enhanced video streaming and analytics via securely-reversible transformation. In Annual International Conference on Mobile Computing and Networking. 229–241.
- Yi Xu and Shiwen Mao. 2013. A survey of mobile cloud computing for rich media applications. IEEE Wireless Communications 20, 3 (2013), 46–53.
- An introduction to neural data compression. Foundations and Trends® in Computer Graphics and Vision 15, 2 (2023), 113–200.
- Visual privacy protection in mobile image recognition using protective perturbation. In ACM Multimedia Systems Conference (MMSys). 164–176.
- Visual Content Privacy Protection: A Survey. arXiv preprint arXiv:2303.16552 (2023).
- Trine: Cloud-edge-device cooperated real-time video analysis for household applications. IEEE Transactions on Mobile Computing (2022).
- Deepfakes for Medical Video De-Identification: Privacy Protection and Diagnostic Information Preservation. In AAAI/ACM Conference on AI, Ethics, and Society (AIES). 414–420.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.