Pradeep Atrey's Research on

SecureCSuite: Secure Computations over Untrusted Cloud Servers


securecsuite picture

Hey, do you use cloud servers for storing and processing your data? Your data could potentially be misused.


We offer a solution that enables secure processing of encrypted data, ensuring both security and privacy.

Research Objectives
To perform .......... in encrypted form?
RO7: Collaborative and Concurrent Editing: SecureCEdit
RO6: Emailing: SecureCMail
RO5: Merging of and Searching into PDF Documents: SecureCMerge and SecureCSearch
RO4: Social networking: SecureSSocial
RO3: Quality Enhancement: SecureCEnhance
RO2: Scaling and Cropping: SecureCScale
RO1: Volume Ray-casting: SecureCVolume


RO7: SecureCEdit: Secure Collaborative and Concurrent Editing

SecureCEdit

We assert that in online editing environments, such as, Google Docs and Office 365, user data should never be exposed to the cloud in an unencrypted format. Prior research on secure collaborative editing has exhibited several limitations and lacks practicality. Therefore, in this study, we introduced a secure framework for online editing, termed SecureC2Edit. This framework operates on a structured peer-to-peer architecture, employing hybrid differential synchronization. It facilitates collaborative and simultaneous document access while ensuring data security and privacy through encryption before cloud storage.
Publications:
S. Arora and P. K. Atrey. SecureC2Edit: A framework for secure collaborative and concurrent document editing. IEEE Transactions on Dependable and Secure Computing (TDSC) (2023) (Early access available).[pdf][bibtex]
S. Arora and P. K. Atrey. Secure collaborative editing using secret sharing. IEEE Workshop on Information Forensics and Security (WIFS’21), Montpellier, France, December 2021.[pdf][bibtex]
S. Arora, G. Varshney, P. K. Atrey, and M. Mishra. SecureCEdit: An approach for secure cloud-based document editing. The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016) in conjunction with IEEE Conf. on Communications and Network Security (CNS 2016), Philadelphia, PA, USA, October 2016.[pdf][bibtex]

RO6: SecureCMail: Securing Emails from Service Providers

SecureCMail

Frequently, we transmit sensitive information like passport details, credit card data, and social security numbers via email without considering the security of email services. Although current network security measures offer reasonable protection against external threats and eavesdroppers, they do not assure that email service providers (ESPs) cannot access our email content, which might contain highly sensitive information. One potential approach to safeguard email data from ESP access involves using Pretty Good Privacy (PGP), yet PGP comes with several limitations, including issues with key storage and reliance on third-party services, resulting in practical difficulties when used. We introduced a method, called SecureCMail, designed to enhance email security against ESPs. This approach employs cryptographic secret sharing techniques to encrypt the metadata, body, and attachments of emails before transmission. Within this solution, both the email sender and recipient must possess at least two email accounts hosted on existing ESPs, a practice that has become increasingly common.
Publications:
P. Singh, S. Arora, K. Williamson, and P. K. Atrey. S3Email: A method for securing emails from service providers. The 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC’2017), Banff, Canada, October 2017. [pdf][bibtex]

Q5: SecureCMerge and SecureCSearch: Secure PDF Merging and Searching over Untrusted Servers

SecureCMerge

The act of merging multiple PDF files is a routine task frequently conducted by users, often utilizing freely accessible online tools like pdfmerge or cloud-based services such as cloudconvert. However, the reliability of these free online servers cannot always be guaranteed and may pose potential risks to the confidentiality of the PDF files. In our study, we introduced a method named SecureCMerge. This approach enables the secure merging of PDF files using free online merge sites. Furthermore, the extended SecureCSearch method facilitates efficient keyword search operations on encrypted PDF files over the cloud.
Publications:
N. Sharma, P Singh, and P. K. Atrey. SecureCMerge: Secure PDF merging over untrusted servers. The 1st IEEE International Conference on Multimedia Information Processing and Retrieval (MIPR’18), Miami, FL, USA, April 2018. [pdf][bibtex]
M. Shah, M. Mohanty, and P. K. Atrey. SecureCSearch: Secure searching in PDF over untrusted cloud servers. The 2nd IEEE International Conference on Multimedia Information Processing and Retrieval (MIPR’19), San Jose, CA, USA, March 2019. [pdf][bibtex]

RO4: SecureCSocial: Secure Cloud-based Social Network

SecureCSocial

The use of social networks has grown exponentially in recent years, and these social networks continue to have an ever-increasing impact on human lives. There are many concerns regarding the privacy of users in these environments, such as how trustworthy the social network operators are, in addition to the external adversaries. In this work, we proposed a new architecture for online social networking, based on distributed cloud-based datacenters and using secret sharing as the method of encrypting user profile data, for enhanced privacy and availability. The proposed architecture is analyzed for its security and performance along with experimental analysis.
Publications:
P. K. Atrey and K. Senevirathna. SecureCSocial: Secure cloud-based social network. World Scientific Series in Digital Forensics and Cybersecurity: Volume 1, August 2019. [pdf][bibtex]
K. Senevirathna and P. K. Atrey. A secure and privacy-aware cloud-based architecture for online social networks. The 7th Multi-Disciplinary International Workshop on Artificial Intelligence (MIWAI'2013), December 2013, Krabi, Thailand. [pdf][bibtex]

RO3: SecureCEnhance: Enhancement of Image/Video/Audio in Encrypted Domain

SecureCEnhance

Improving quality of multimedia data is paramount in many advanced tasks such as object detection and tracking and scene understanding. In this research, we used the SecureCSuite framework to enhance the quality of encrypted image, and audio data over cloud.
Demos:
- Secure Image Constrast Enhancement: [Demo Video].
- Secure Image Dehazing: [Demo Video].
Publications:
A. Yakubu, N. Maddage, and P. K. Atrey. Securing speech noise eeduction in outsourced environment. ACM Transactions on Multimedia Computing, Communication and Applications, Vol. 13, No. 4, Article 51 (2017).[pdf][bibtex]
A. Lathey and P. K. Atrey. Image enhancement in encrypted domain over cloud. ACM Trans. on Multimedia Computing, Communications and Applications, Vol. 11, No. 3, Article 38 (2015). [pdf][bibtex]
A. Lathey, P. K. Atrey, and N. Joshi. Homomorphic low pass filtering on encrypted multimedia over cloud. IEEE Int. Conf. on Semantic Computing (ICSC’13), Sep. 2013, Irvine, CA, USA. [pdf][bibtex]
A. Yakubu, N. C. Maddage, and P. K. Atrey. Audio secret management scheme using Shamir’s secret sharing. The 21st Int. Conf. on Multimedia Modeling (MMM’15), Jan. 2015, Sydney, Australia. [pdf][bibtex]
A. Yakubu, N. C. Maddage, and P. K. Atrey. Secure audio reverberation over cloud. The 10th Annual Symp. on Information Assurance in conjunction with The 18th New York State Cyber Security Conf. (ASIA’15), Albany, NY, USA, Jun. 2015. [pdf][bibtex]
A. Yakubu, N. C. Maddage, and P. K. Atrey. Encrypted domain cloud-based speech noise reduction with comb filter. The first IEEE Int. Workshop on ”Privacy Issues in Multimedia” (PIM’16) in conjunction with IEEE Int. Conf. on Multimedia and Expo (ICME’16), Seattle, WA, USA, Jul. 2016. [pdf][bibtex]

RO2: SecureCScale: Scaling and Cropping of Image/Video in Encrypted Form

SecureCScale

Resizing and cropping images or videos are prevalent functions utilized across various applications, including social media platforms and computational photography. We expanded the functionalities of the SecureCSuite framework to accommodate scaling and cropping operations on encrypted image and video data through cloud-based processing.
Demos:
- Secure Video Scaling and Cropping: Demo Video.
Publications:
M. Mohanty, W.-T. Ooi, and P. K. Atrey. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. IEEE Int. Conf. on Multimedia and Expo (ICME’13), Jul. 2013, San Jose, CA, USA.[pdf][bibtex]
K. Kansal, M. Mohanty, and P. K. Atrey. Scaling and cropping of wavelet-based compressed images in hidden domain. The 21st Int. Conf. on Multimedia Modeling (MMM’15), Jan. 2015, Sydney, Australia.[pdf][bibtex]
O.-A. Kristensen, M. Mohanty, and P. K. Atrey. Don’t See Me, Just Edit Me: Towards Secure Cloud-based Video Editing. The 11th Annual Symp. on Information Assurance in conjunction with The 19th New York State Cyber Security Conf. (ASIA’16), pp 74-78, Albany, NY, USA, Jun. 2016. [pdf][bibtex]

RO1: SecureCVolume: Secure Cloud-based Volume Ray-casting

SecureCVolume

Outsourcing the tasks of medical data visualization to cloud centers presents new security challenges. In this work, we proposed a framework for cloud-based remote medical data visualization that protects the data at the cloud centers. To achieve this, we integrated the cryptographic secret sharing with pre-classification volume ray-casting and propose a secure volume ray-casting pipeline that hides the color-coded information of the secret medical data during rendering at the data centers.
Publications:
M. Mohanty, W.T. Ooi, and P. K. Atrey. Secret sharing approach for securing cloud-based pre-classification volume ray-casting. Springer Int. J. Multimedia Tools and Applications. Vol. 75, Issue 11, pp 6207–6235 (2016). [pdf][bibtex]
M. Mohanty, P. K. Atrey, and W.-T. Ooi. Secure cloud-based medical data visualization. The ACM Int. Conf. on Multimedia (ACMMM’12), pp 1105-1108, Oct. 29-Nov. 2, 2012, Nara, Japan. [pdf][bibtex]


Last updated: July 28, 2024.