Homomorphic-Encrypted Volume Rendering

09/04/2020
by   Sebastian Mazza, et al.
0

Computationally demanding tasks are typically calculated in dedicated data centers, and real-time visualizations also follow this trend. Some rendering tasks, however, require the highest level of confidentiality so that no other party, besides the owner, can read or see the sensitive data. Here we present a direct volume rendering approach that performs volume rendering directly on encrypted volume data by using the homomorphic Paillier encryption algorithm. This approach ensures that the volume data and rendered image are uninterpretable to the rendering server. Our volume rendering pipeline introduces novel approaches for encrypted-data compositing, interpolation, and opacity modulation, as well as simple transfer function design, where each of these routines maintains the highest level of privacy. We present performance and memory overhead analysis that is associated with our privacy-preserving scheme. Our approach is open and secure by design, as opposed to secure through obscurity. Owners of the data only have to keep their secure key confidential to guarantee the privacy of their volume data and the rendered images. Our work is, to our knowledge, the first privacy-preserving remote volume-rendering approach that does not require that any server involved be trustworthy; even in cases when the server is compromised, no sensitive data will be leaked to a foreign party.

READ FULL TEXT

page 1

page 2

page 4

page 6

page 7

research
10/22/2014

The physics of volume rendering

Radiation transfer is an important topic in several physical disciplines...
research
01/14/2021

Reliability Check via Weight Similarity in Privacy-Preserving Multi-Party Machine Learning

Multi-party machine learning is a paradigm in which multiple participant...
research
04/15/2019

CryptoNN: Training Neural Networks over Encrypted Data

Emerging neural networks based machine learning techniques such as deep ...
research
07/08/2019

Privacy-Preserving Speaker Recognition with Cohort Score Normalisation

In many voice biometrics applications there is a requirement to preserve...
research
04/09/2019

Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment

There is an urgent demand for privacy-preserving techniques capable of s...
research
06/07/2018

Secure Multilayer Perceptron Based On Homomorphic Encryption

In this work, we propose an outsourced Secure Multilayer Perceptron (SML...
research
06/14/2023

Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext

Using the computational resources of an untrusted third party to crack a...

Please sign up or login with your details

Forgot password? Click here to reset