Skip to main content

2016 | OriginalPaper | Buchkapitel

An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking

verfasst von : Zhangjie Fu, Xinyue Cao

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Outsourcing data storage systems reduce storage costs of IT Enterprises and maintenance for users, which have attracted much attention. It is an acceptable way to use cryptography technologies to ensure privacy preserving and access control in secure outsourcing data storage scheme. In this paper, we propose an outsourcing data storage scheme which combines digital watermarking and cryptography technology to support privacy preserving and data hiding. We use the multi-granularity encryption algorithm to preserve the privacy of outsourcing data. The RSA-based proxy re-encryption (PRE) algorithm is used to make the key transportation safe. And the decrypted data containing hiding data is approximate to the original data. Experiments show that our scheme is secure and feasible.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Drel-Khameesy, N., Rahman, H.A.: A Proposed model for enhancing data storage security in cloud computing systems. Emerg. Trends Comput. Inf. Sci. 3(6), 970–974 (2012) Drel-Khameesy, N., Rahman, H.A.: A Proposed model for enhancing data storage security in cloud computing systems. Emerg. Trends Comput. Inf. Sci. 3(6), 970–974 (2012)
2.
Zurück zum Zitat Boopathy, D., Sundaresan, M.: Data encryption frame-work model with watermarking security for data storage in public cloud model. In: IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp. 903–907 (2014) Boopathy, D., Sundaresan, M.: Data encryption frame-work model with watermarking security for data storage in public cloud model. In: IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp. 903–907 (2014)
3.
Zurück zum Zitat Zhang, X.: Reversible data hiding in encrypted image. IEEE. Sig. Process. Lett. 18(4), 255–258 (2011)CrossRef Zhang, X.: Reversible data hiding in encrypted image. IEEE. Sig. Process. Lett. 18(4), 255–258 (2011)CrossRef
4.
Zurück zum Zitat Yin, Z., Luo, B., Hong, W.: Separable and error-free reversible data hiding in encrypted image with high payload. Sci. World J. 2014(2014), 1–8 (2014). doi:10.1155/2014/604876 Yin, Z., Luo, B., Hong, W.: Separable and error-free reversible data hiding in encrypted image with high payload. Sci. World J. 2014(2014), 1–8 (2014). doi:10.​1155/​2014/​604876
5.
Zurück zum Zitat Xiong, N., Vasilakos, A.V., Yang, L.T., Song, L., Pan, Y., Kannan, R., Li, Y.: Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J. Sel. Areas Commun. 27(4), 495–509 (2009)CrossRef Xiong, N., Vasilakos, A.V., Yang, L.T., Song, L., Pan, Y., Kannan, R., Li, Y.: Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J. Sel. Areas Commun. 27(4), 495–509 (2009)CrossRef
6.
Zurück zum Zitat Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11, 2706–2716 (2016)CrossRef Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11, 2706–2716 (2016)CrossRef
7.
Zurück zum Zitat Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (TPDS) 27, 2546–2559 (2016). doi:10.1109/TPDS.2015.2506573 CrossRef Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (TPDS) 27, 2546–2559 (2016). doi:10.​1109/​TPDS.​2015.​2506573 CrossRef
8.
Zurück zum Zitat Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)CrossRef Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)CrossRef
9.
Zurück zum Zitat Cheung, W.N.: Digital image watermarking in spatial and transform domains. In: 2000 Proceedings of TENCON, pp. 374–378. IEEE (2000) Cheung, W.N.: Digital image watermarking in spatial and transform domains. In: 2000 Proceedings of TENCON, pp. 374–378. IEEE (2000)
10.
Zurück zum Zitat Wang, S.H., Lin, Y.P.: Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154–165 (2004)CrossRef Wang, S.H., Lin, Y.P.: Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154–165 (2004)CrossRef
11.
Zurück zum Zitat Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using unidirectional proxy re-encryption schemes. In: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pp. 1952–1960, 1975–1980 (2011) Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using unidirectional proxy re-encryption schemes. In: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pp. 1952–1960, 1975–1980 (2011)
Metadaten
Titel
An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking
verfasst von
Zhangjie Fu
Xinyue Cao
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-48671-0_41

Premium Partner