2021 IEEE International Conference on Acoustics, Speech and Signal Processing

6-11 June 2021 • Toronto, Ontario, Canada

Extracting Knowledge from Information

2021 IEEE International Conference on Acoustics, Speech and Signal Processing

6-11 June 2021 • Toronto, Ontario, Canada

Extracting Knowledge from Information

Technical Program

Paper Detail

Paper IDIFS-5.6
Paper Title LOW COMPLEXITY SECURE P-TENSOR PRODUCT COMPRESSED SENSING RECONSTRUCTION OUTSOURCING AND IDENTITY AUTHENTICATION IN CLOUD
Authors Mengdi Wang, Di Xiao, Jia Liang, Chongqing University, China
SessionIFS-5: Privacy and Information Security
LocationGather.Town
Session Time:Thursday, 10 June, 15:30 - 16:15
Presentation Time:Thursday, 10 June, 15:30 - 16:15
Presentation Poster
Topic Information Forensics and Security: [CIT] Communication And Information Theoretic Security
IEEE Xplore Open Preview  Click here to view in IEEE Xplore
Virtual Presentation  Click here to watch in the Virtual Conference
Abstract Although P-tensor product compressed sensing (PTP-CS) breaks the strict dimension matching restriction between measurement matrix and signal in multiplication, it still faces the huge resource consumption problems of the frequent update and transmission of measurement matrix and signal reconstruction. Accordingly, we design a public measurement matrix and utilize the cloud to solve the PTP-CS reconstruction (PTP-CSR) task under privacy protection. Specifically, we propose a low complexity and secure PTP-CSR outsourcing model to protect the signal privacy, and further introduce user authentication and data verification services. In our model, the client samples the signal based on PTP-CS and uploads the encrypted measurement to the cloud. The cloud further encrypts the data asymmetrically for storage security and user management. After receiving the request, the cloud authenticates the user's identity. Once successful, the cloud processes the encrypted PTP-CSR task and returns result to users. More importantly, we provide result verification approach for users. Our experimental results demonstrate the privacy protection of the signal and the effectiveness of the proposed model.