Type
ArticleKAUST Department
Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) DivisionComputer Science Program
Visual Computing Center (VCC)
KAUST Grant Number
BAS/1/1680-01-01Date
2020Preprint Posting Date
2020-09-04Permanent link to this record
http://hdl.handle.net/10754/665573
Metadata
Show full item recordAbstract
Computationally demanding tasks are typically calculated in dedicated data centers, and real-time visualizations also follow this trend. Some rendering tasks, however, require the highest level of confidentiality so that no other party, besides the owner, can read or see the sensitive data. Here we present a direct volume rendering approach that performs volume rendering directly on encrypted volume data by using the homomorphic Paillier encryption algorithm. This approach ensures that the volume data by using the homomorphic Paillier encryption algorithm. This approach ensures that the volume data and rendered image are uninterpretable to the rendering server. Our volume rendering pipeline introduces novel approaches for encrypted-data compositing, interpolation, and opacity modulation, as well as simple transfer function design, where each of these routines maintains the highest level of privacy. We present performance and memory overhead analysis that is associated with our privacy-preserving scheme. Our approach is open and secure by design, as opposed to secure through obscurity. Owners of the data only have to keep their secure key confidential to guarantee the privacy of their volume data and the rendered images. Our work is, to our knowledge, the first privacy-preserving remote volume-rendering approach that does not require that any server involved be trustworthy; even in cases when the server is compromised, no sensitive data will be leaked to a foreign party.Citation
Mazza, S., Patel, D., & Viola, I. (2020). Homomorphic-Encrypted Volume Rendering. IEEE Transactions on Visualization and Computer Graphics, 1–1. doi:10.1109/tvcg.2020.3030436Sponsors
The authors wish to thank Michal Hojsk for his fruitful discussions on cryptography. The authors would like to thank Michael Cusack from Publication Services at KAUST for proofreading. The research was supported by King Abdullah University of Science and Technology (KAUST) under award number BAS/1/1680-01-01.arXiv
2009.02122Additional Links
https://ieeexplore.ieee.org/document/9222562/https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9222562
ae974a485f413a2113503eed53cd6c53
10.1109/TVCG.2020.3030436
Scopus Count
Except where otherwise noted, this item's license is described as This work is licensed under a Creative Commons Attribution 4.0 License.