SlideShare a Scribd company logo
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud
Abstract:
Nowadays, cloud has become a promising multimedia data processing and
sharing platform. Many institutes and companies plan to outsource and share
their large-scale video and image datasets oncloud for scientific research and
public interest. Among various video applications, the discovery of frequent visual
patterns over graphical data is an exploratory and important technique. However,
the privacy concerns over the leakage of sensitive information contained in the
videos/images impedes the further implementation. Although the frequent visual
patterns mining (FVPM) algorithm aggregates summary over individual frames
and seems not to pose privacy threat, the private information contained in
individual frames still may be leaked from the statistical result. In this paper, we
study the problem of privacy-preserving publishing of graphical data FVPM
on cloud. We propose the first differentially private frequent visual patterns
mining algorithm for graphical data, named DPcode. We propose a novel
mechanism that integrates the privacy-preserving visual word conversion with the
differentially private mechanism under the noise allocation strategy of the sparse
vector technique. The optimized algorithms properly allocate the privacy budgets
among different phases in FPM algorithm over images and reduce the
corresponding data distortion. Extensive experiments are conducted based on
datasets commonly used in visual mining algorithms. The results show that our
approach achieves high utility while satisfying a practical privacy requirement.

More Related Content

DOCX
Fire col a collaborative protection network
PDF
Karel de Vriendt
PPTX
PhD Projects in Fog Computing Research Ideas
PDF
PPTX
Wireless Communication Research Projects Assistance
PPT
Io t technologies_ppt-2
PPTX
Grid computing
PPTX
Information system support in construction industry with semantic web techno...
Fire col a collaborative protection network
Karel de Vriendt
PhD Projects in Fog Computing Research Ideas
Wireless Communication Research Projects Assistance
Io t technologies_ppt-2
Grid computing
Information system support in construction industry with semantic web techno...

What's hot (20)

PDF
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
PPTX
Cloud Computing introduction by saransh
PPT
3TU.NIRICT
DOCX
Abstract
PDF
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
PPTX
Fog Radio Access Network Research Projects Guidance
PDF
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
PPTX
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
PDF
OW2con'14 - Xlcloud, 3D rendering in the cloud
 
PPT
Cloud computing ppts
PDF
zenoh -- the ZEro Network OverHead protocol
PPTX
stefan moellmann issil2011
PPTX
Research Projects in Software Defined Networking Ideas
PPTX
Dynamic module deployment in a fog computing platform
PDF
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
PPTX
Cloud computing
PPTX
E. Mannens - LODGE
PPTX
Cloud Computing Definition
PPTX
Taming limits with approximate networking
PPTX
Research, the Cloud, and the IRB
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
Cloud Computing introduction by saransh
3TU.NIRICT
Abstract
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Fog Radio Access Network Research Projects Guidance
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
OW2con'14 - Xlcloud, 3D rendering in the cloud
 
Cloud computing ppts
zenoh -- the ZEro Network OverHead protocol
stefan moellmann issil2011
Research Projects in Software Defined Networking Ideas
Dynamic module deployment in a fog computing platform
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
Cloud computing
E. Mannens - LODGE
Cloud Computing Definition
Taming limits with approximate networking
Research, the Cloud, and the IRB
Ad

Viewers also liked (12)

PDF
Io stack software defined object storage
PDF
Facor flexible access control with outsourceable revocation in mobile clouds
PDF
Reliable and confidential cloud storage with efficient data forwarding functi...
PDF
Managing sensitive applications in the public cloud
PDF
Automated system change discovery and management in the cloud
PDF
A study on the lower tropospheric thermal inversion over the arabian sea usin...
PDF
Comments on “public integrity auditing for dynamic data sharing with multiuse...
PDF
Spatial related traffic sign inspection for inventory purposes using mobile l...
PDF
Building scalable, secure, multi tenant cloud services on ibm bluemix
PDF
Multitenant transport networks with sdnnfv
PDF
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
PDF
Industry 4.1 for wheel machining automation
Io stack software defined object storage
Facor flexible access control with outsourceable revocation in mobile clouds
Reliable and confidential cloud storage with efficient data forwarding functi...
Managing sensitive applications in the public cloud
Automated system change discovery and management in the cloud
A study on the lower tropospheric thermal inversion over the arabian sea usin...
Comments on “public integrity auditing for dynamic data sharing with multiuse...
Spatial related traffic sign inspection for inventory purposes using mobile l...
Building scalable, secure, multi tenant cloud services on ibm bluemix
Multitenant transport networks with sdnnfv
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Industry 4.1 for wheel machining automation
Ad

Similar to D pcode privacy preserving frequent visual patterns publication on cloud (11)

PDF
Effieient Algorithms to Find Frequent Itemset using Data Mining
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
A scalabl e and cost effective framework for privacy preservation over big d...
PDF
Ijcatr04051015
PDF
Privacy preserving clustering on centralized data through scaling transf
PDF
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
PDF
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
PPTX
Proximity aware local-recoding anonymization with map reduce for scalable big...
PDF
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
PDF
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
PDF
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION
Effieient Algorithms to Find Frequent Itemset using Data Mining
International Journal of Engineering Research and Development (IJERD)
A scalabl e and cost effective framework for privacy preservation over big d...
Ijcatr04051015
Privacy preserving clustering on centralized data through scaling transf
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Proximity aware local-recoding anonymization with map reduce for scalable big...
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
PRIVACY PRESERVING CLUSTERING IN DATA MINING USING VQ CODE BOOK GENERATION

More from ieeepondy (20)

PDF
Demand aware network function placement
PDF
Service description in the nfv revolution trends, challenges and a way forward
PDF
Secure optimization computation outsourcing in cloud computing a case study o...
PDF
Standards for hybrid clouds
PDF
Rfhoc a random forest approach to auto-tuning hadoop's configuration
PDF
Resource and instance hour minimization for deadline constrained dag applicat...
PDF
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
PDF
Scalable cloud–sensor architecture for the internet of things
PDF
Scalable algorithms for nearest neighbor joins on big trajectory data
PDF
Robust workload and energy management for sustainable data centers
PDF
Privacy preserving deep computation model on cloud for big data feature learning
PDF
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
PDF
Protection of big data privacy
PDF
Power optimization with bler constraint for wireless fronthauls in c ran
PDF
Performance aware cloud resource allocation via fitness-enabled auction
PDF
Performance limitations of a text search application running in cloud instances
PDF
Performance analysis and optimal cooperative cluster size for randomly distri...
PDF
Predictive control for energy aware consolidation in cloud datacenters
PDF
Over flow multi site aware big data management for scientific workflows on cl...
PDF
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Demand aware network function placement
Service description in the nfv revolution trends, challenges and a way forward
Secure optimization computation outsourcing in cloud computing a case study o...
Standards for hybrid clouds
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Resource and instance hour minimization for deadline constrained dag applicat...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Scalable cloud–sensor architecture for the internet of things
Scalable algorithms for nearest neighbor joins on big trajectory data
Robust workload and energy management for sustainable data centers
Privacy preserving deep computation model on cloud for big data feature learning
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Protection of big data privacy
Power optimization with bler constraint for wireless fronthauls in c ran
Performance aware cloud resource allocation via fitness-enabled auction
Performance limitations of a text search application running in cloud instances
Performance analysis and optimal cooperative cluster size for randomly distri...
Predictive control for energy aware consolidation in cloud datacenters
Over flow multi site aware big data management for scientific workflows on cl...
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Complications of Minimal Access Surgery at WLH
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Lesson notes of climatology university.
PPTX
Cell Types and Its function , kingdom of life
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Trump Administration's workforce development strategy
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
GDM (1) (1).pptx small presentation for students
Microbial disease of the cardiovascular and lymphatic systems
Complications of Minimal Access Surgery at WLH
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Lesson notes of climatology university.
Cell Types and Its function , kingdom of life
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
VCE English Exam - Section C Student Revision Booklet
Anesthesia in Laparoscopic Surgery in India
O7-L3 Supply Chain Operations - ICLT Program
A systematic review of self-coping strategies used by university students to ...
Supply Chain Operations Speaking Notes -ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
Trump Administration's workforce development strategy
Microbial diseases, their pathogenesis and prophylaxis
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
GDM (1) (1).pptx small presentation for students

D pcode privacy preserving frequent visual patterns publication on cloud

  • 1. DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud Abstract: Nowadays, cloud has become a promising multimedia data processing and sharing platform. Many institutes and companies plan to outsource and share their large-scale video and image datasets oncloud for scientific research and public interest. Among various video applications, the discovery of frequent visual patterns over graphical data is an exploratory and important technique. However, the privacy concerns over the leakage of sensitive information contained in the videos/images impedes the further implementation. Although the frequent visual patterns mining (FVPM) algorithm aggregates summary over individual frames and seems not to pose privacy threat, the private information contained in individual frames still may be leaked from the statistical result. In this paper, we study the problem of privacy-preserving publishing of graphical data FVPM on cloud. We propose the first differentially private frequent visual patterns mining algorithm for graphical data, named DPcode. We propose a novel mechanism that integrates the privacy-preserving visual word conversion with the differentially private mechanism under the noise allocation strategy of the sparse vector technique. The optimized algorithms properly allocate the privacy budgets among different phases in FPM algorithm over images and reduce the corresponding data distortion. Extensive experiments are conducted based on datasets commonly used in visual mining algorithms. The results show that our approach achieves high utility while satisfying a practical privacy requirement.