SlideShare a Scribd company logo
1 of 1
Download to read offline
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud
Abstract:
Nowadays, cloud has become a promising multimedia data processing and
sharing platform. Many institutes and companies plan to outsource and share
their large-scale video and image datasets oncloud for scientific research and
public interest. Among various video applications, the discovery of frequent visual
patterns over graphical data is an exploratory and important technique. However,
the privacy concerns over the leakage of sensitive information contained in the
videos/images impedes the further implementation. Although the frequent visual
patterns mining (FVPM) algorithm aggregates summary over individual frames
and seems not to pose privacy threat, the private information contained in
individual frames still may be leaked from the statistical result. In this paper, we
study the problem of privacy-preserving publishing of graphical data FVPM
on cloud. We propose the first differentially private frequent visual patterns
mining algorithm for graphical data, named DPcode. We propose a novel
mechanism that integrates the privacy-preserving visual word conversion with the
differentially private mechanism under the noise allocation strategy of the sparse
vector technique. The optimized algorithms properly allocate the privacy budgets
among different phases in FPM algorithm over images and reduce the
corresponding data distortion. Extensive experiments are conducted based on
datasets commonly used in visual mining algorithms. The results show that our
approach achieves high utility while satisfying a practical privacy requirement.

More Related Content

What's hot

RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...Tutors India
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saranshSaransh Agarwal
 
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...Christian Esteve Rothenberg
 
Fog Radio Access Network Research Projects Guidance
Fog Radio Access Network Research Projects  GuidanceFog Radio Access Network Research Projects  Guidance
Fog Radio Access Network Research Projects GuidanceNetwork Simulation Tools
 
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelTowards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelChristian Esteve Rothenberg
 
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
Technologies to Build Hybrid Clouds on Public-Private InfrastructuresTechnologies to Build Hybrid Clouds on Public-Private Infrastructures
Technologies to Build Hybrid Clouds on Public-Private InfrastructuresHelix Nebula The Science Cloud
 
OW2con'14 - Xlcloud, 3D rendering in the cloud
OW2con'14 - Xlcloud, 3D rendering in the cloudOW2con'14 - Xlcloud, 3D rendering in the cloud
OW2con'14 - Xlcloud, 3D rendering in the cloudOW2
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
Research Projects in Software Defined Networking Ideas
Research Projects in Software Defined Networking IdeasResearch Projects in Software Defined Networking Ideas
Research Projects in Software Defined Networking IdeasNetwork Simulation Tools
 
Dynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platformDynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platform霈萱 蔡
 
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011Smarcos Eu
 
Cloud Computing Definition
Cloud Computing DefinitionCloud Computing Definition
Cloud Computing Definitionhadifar
 
Taming limits with approximate networking
Taming limits with approximate networkingTaming limits with approximate networking
Taming limits with approximate networkingJunaid Qadir
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 

What's hot (20)

RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
RECENT PHD RESEARCH TOPIC IDEAS FOR COMPUTER SCIENCE ENGINEERING 2020 Exclusi...
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saransh
 
3TU.NIRICT
3TU.NIRICT3TU.NIRICT
3TU.NIRICT
 
Abstract
AbstractAbstract
Abstract
 
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
Deep Slicing and Loops in a Loop: Multi-Tenancy and Smart Closed-Loop Control...
 
Fog Radio Access Network Research Projects Guidance
Fog Radio Access Network Research Projects  GuidanceFog Radio Access Network Research Projects  Guidance
Fog Radio Access Network Research Projects Guidance
 
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelTowards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
 
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
Technologies to Build Hybrid Clouds on Public-Private InfrastructuresTechnologies to Build Hybrid Clouds on Public-Private Infrastructures
Technologies to Build Hybrid Clouds on Public-Private Infrastructures
 
OW2con'14 - Xlcloud, 3D rendering in the cloud
OW2con'14 - Xlcloud, 3D rendering in the cloudOW2con'14 - Xlcloud, 3D rendering in the cloud
OW2con'14 - Xlcloud, 3D rendering in the cloud
 
Cloud computing ppts
Cloud computing pptsCloud computing ppts
Cloud computing ppts
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
stefan moellmann issil2011
stefan moellmann issil2011stefan moellmann issil2011
stefan moellmann issil2011
 
Research Projects in Software Defined Networking Ideas
Research Projects in Software Defined Networking IdeasResearch Projects in Software Defined Networking Ideas
Research Projects in Software Defined Networking Ideas
 
Dynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platformDynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platform
 
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
SMARCOS POSTER ARTEMIS & ITEA co-Summit 2011
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
E. Mannens - LODGE
E. Mannens - LODGEE. Mannens - LODGE
E. Mannens - LODGE
 
Cloud Computing Definition
Cloud Computing DefinitionCloud Computing Definition
Cloud Computing Definition
 
Taming limits with approximate networking
Taming limits with approximate networkingTaming limits with approximate networking
Taming limits with approximate networking
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 

Viewers also liked

Io stack software defined object storage
Io stack software defined object storageIo stack software defined object storage
Io stack software defined object storageieeepondy
 
Facor flexible access control with outsourceable revocation in mobile clouds
Facor flexible access control with outsourceable revocation in mobile cloudsFacor flexible access control with outsourceable revocation in mobile clouds
Facor flexible access control with outsourceable revocation in mobile cloudsieeepondy
 
Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...ieeepondy
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloudieeepondy
 
Automated system change discovery and management in the cloud
Automated system change discovery and management in the cloudAutomated system change discovery and management in the cloud
Automated system change discovery and management in the cloudieeepondy
 
A study on the lower tropospheric thermal inversion over the arabian sea usin...
A study on the lower tropospheric thermal inversion over the arabian sea usin...A study on the lower tropospheric thermal inversion over the arabian sea usin...
A study on the lower tropospheric thermal inversion over the arabian sea usin...ieeepondy
 
Comments on “public integrity auditing for dynamic data sharing with multiuse...
Comments on “public integrity auditing for dynamic data sharing with multiuse...Comments on “public integrity auditing for dynamic data sharing with multiuse...
Comments on “public integrity auditing for dynamic data sharing with multiuse...ieeepondy
 
Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...ieeepondy
 
Building scalable, secure, multi tenant cloud services on ibm bluemix
Building scalable, secure, multi tenant cloud services on ibm bluemixBuilding scalable, secure, multi tenant cloud services on ibm bluemix
Building scalable, secure, multi tenant cloud services on ibm bluemixieeepondy
 
Multitenant transport networks with sdnnfv
Multitenant transport networks with sdnnfvMultitenant transport networks with sdnnfv
Multitenant transport networks with sdnnfvieeepondy
 
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Cloud performance modeling with benchmark evaluation of elastic scaling strat...Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Cloud performance modeling with benchmark evaluation of elastic scaling strat...ieeepondy
 
Industry 4.1 for wheel machining automation
Industry 4.1 for wheel machining automationIndustry 4.1 for wheel machining automation
Industry 4.1 for wheel machining automationieeepondy
 

Viewers also liked (12)

Io stack software defined object storage
Io stack software defined object storageIo stack software defined object storage
Io stack software defined object storage
 
Facor flexible access control with outsourceable revocation in mobile clouds
Facor flexible access control with outsourceable revocation in mobile cloudsFacor flexible access control with outsourceable revocation in mobile clouds
Facor flexible access control with outsourceable revocation in mobile clouds
 
Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloud
 
Automated system change discovery and management in the cloud
Automated system change discovery and management in the cloudAutomated system change discovery and management in the cloud
Automated system change discovery and management in the cloud
 
A study on the lower tropospheric thermal inversion over the arabian sea usin...
A study on the lower tropospheric thermal inversion over the arabian sea usin...A study on the lower tropospheric thermal inversion over the arabian sea usin...
A study on the lower tropospheric thermal inversion over the arabian sea usin...
 
Comments on “public integrity auditing for dynamic data sharing with multiuse...
Comments on “public integrity auditing for dynamic data sharing with multiuse...Comments on “public integrity auditing for dynamic data sharing with multiuse...
Comments on “public integrity auditing for dynamic data sharing with multiuse...
 
Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...
 
Building scalable, secure, multi tenant cloud services on ibm bluemix
Building scalable, secure, multi tenant cloud services on ibm bluemixBuilding scalable, secure, multi tenant cloud services on ibm bluemix
Building scalable, secure, multi tenant cloud services on ibm bluemix
 
Multitenant transport networks with sdnnfv
Multitenant transport networks with sdnnfvMultitenant transport networks with sdnnfv
Multitenant transport networks with sdnnfv
 
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Cloud performance modeling with benchmark evaluation of elastic scaling strat...Cloud performance modeling with benchmark evaluation of elastic scaling strat...
Cloud performance modeling with benchmark evaluation of elastic scaling strat...
 
Industry 4.1 for wheel machining automation
Industry 4.1 for wheel machining automationIndustry 4.1 for wheel machining automation
Industry 4.1 for wheel machining automation
 

Similar to D pcode privacy preserving frequent visual patterns publication on cloud

Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingKumar Goud
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
 
A deep intelligence framework for online video processing
A deep intelligence framework for online video processingA deep intelligence framework for online video processing
A deep intelligence framework for online video processingieeepondy
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionjournalBEEI
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...IRJET Journal
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection systemjpstudcorner
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 
Cloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection SystemCloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection System1crore projects
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Science international journal
Science international journalScience international journal
Science international journalSarita30844
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# ProjectsVijay Karan
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# ProjectsVijay Karan
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Editor IJMTER
 

Similar to D pcode privacy preserving frequent visual patterns publication on cloud (20)

Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
A deep intelligence framework for online video processing
A deep intelligence framework for online video processingA deep intelligence framework for online video processing
A deep intelligence framework for online video processing
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Fog computing
Fog computingFog computing
Fog computing
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
Video steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motionVideo steganography based on DCT psychovisual and object motion
Video steganography based on DCT psychovisual and object motion
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection system
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
Cloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection SystemCloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection System
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Science international journal
Science international journalScience international journal
Science international journal
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
journal in research
journal in research journal in research
journal in research
 
journal published
journal publishedjournal published
journal published
 
1.pdf
1.pdf1.pdf
1.pdf
 
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
Enhanced Dynamic Leakage Detection and Piracy Prevention in Content Delivery ...
 
Br36413417
Br36413417Br36413417
Br36413417
 

More from ieeepondy

Demand aware network function placement
Demand aware network function placementDemand aware network function placement
Demand aware network function placementieeepondy
 
Service description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forwardService description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forwardieeepondy
 
Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...ieeepondy
 
Standards for hybrid clouds
Standards for hybrid cloudsStandards for hybrid clouds
Standards for hybrid cloudsieeepondy
 
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configurationRfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configurationieeepondy
 
Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...ieeepondy
 
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...ieeepondy
 
Scalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of thingsScalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of thingsieeepondy
 
Scalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory dataScalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory dataieeepondy
 
Robust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centersRobust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centersieeepondy
 
Privacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learningPrivacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learningieeepondy
 
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...ieeepondy
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyieeepondy
 
Power optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ranPower optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ranieeepondy
 
Performance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auctionPerformance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auctionieeepondy
 
Performance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instancesPerformance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instancesieeepondy
 
Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...ieeepondy
 
Predictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacentersPredictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacentersieeepondy
 
Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...ieeepondy
 
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessorOptimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessorieeepondy
 

More from ieeepondy (20)

Demand aware network function placement
Demand aware network function placementDemand aware network function placement
Demand aware network function placement
 
Service description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forwardService description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forward
 
Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...
 
Standards for hybrid clouds
Standards for hybrid cloudsStandards for hybrid clouds
Standards for hybrid clouds
 
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configurationRfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configuration
 
Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...
 
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
 
Scalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of thingsScalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of things
 
Scalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory dataScalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory data
 
Robust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centersRobust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centers
 
Privacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learningPrivacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learning
 
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Power optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ranPower optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ran
 
Performance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auctionPerformance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auction
 
Performance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instancesPerformance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instances
 
Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...
 
Predictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacentersPredictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacenters
 
Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...Over flow multi site aware big data management for scientific workflows on cl...
Over flow multi site aware big data management for scientific workflows on cl...
 
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessorOptimizing purdue lin microphysics scheme for intel xeon phi coprocessor
Optimizing purdue lin microphysics scheme for intel xeon phi coprocessor
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

D pcode privacy preserving frequent visual patterns publication on cloud

  • 1. DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud Abstract: Nowadays, cloud has become a promising multimedia data processing and sharing platform. Many institutes and companies plan to outsource and share their large-scale video and image datasets oncloud for scientific research and public interest. Among various video applications, the discovery of frequent visual patterns over graphical data is an exploratory and important technique. However, the privacy concerns over the leakage of sensitive information contained in the videos/images impedes the further implementation. Although the frequent visual patterns mining (FVPM) algorithm aggregates summary over individual frames and seems not to pose privacy threat, the private information contained in individual frames still may be leaked from the statistical result. In this paper, we study the problem of privacy-preserving publishing of graphical data FVPM on cloud. We propose the first differentially private frequent visual patterns mining algorithm for graphical data, named DPcode. We propose a novel mechanism that integrates the privacy-preserving visual word conversion with the differentially private mechanism under the noise allocation strategy of the sparse vector technique. The optimized algorithms properly allocate the privacy budgets among different phases in FPM algorithm over images and reduce the corresponding data distortion. Extensive experiments are conducted based on datasets commonly used in visual mining algorithms. The results show that our approach achieves high utility while satisfying a practical privacy requirement.