earticle

논문검색

Security Data Auditing based on Multifunction Digital Watermark for Multimedia File in Cloud Storage

초록

영어

Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. In cloud computing, data owners host their data on cloud servers and data consumers can access the data from cloud servers. This new paradigm of data storage service also introduces new security challenges, because data owners and data servers have different identities and different business interests. Therefore, an independent auditing service is required to make sure that the data is correctly hosted in the Cloud. However, the existing solutions are not specific to the multimedia data. Moreover copyright protection is not provided. In this paper, we define specially a provable data possession model for multimedia file, and present a framework based on digital watermarking for multimedia data storages audit service, in which we analyze the security features of audit service for multimedia data outsourcing and the corresponding properties of digital watermarking. Moreover as an example, we present a provable data possession scheme based on double function self-embedded digital watermark, which integrate image content audit service and copyright protection.

목차

Abstract
 1. Introduction
 2. Related Work
 3. Watermarking Based Security Data Auditing in Cloud Storage
  3.1. System Model
  3.2. Framework based on Digital Watermarking for Cloud Storage Auditing
 4. Self-Embedding Watermark-Based Data Auditing for Cloud Storage
  4.1. Watermark Generation and Embedding
  4.2. Copyright Protection of Cloud Image Service from Robust Watermarking
  4.3. Integrity and Authenticity Verification of Image Content
  4.4. Performance Evaluation and Security Analysis
 5. Conclusions
 Acknowledgements
 References

저자정보

  • Yongjun Ren Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, China, School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China.
  • Jian Shen Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, China, School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China.
  • Jin Wang Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, China, School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China.
  • JiangXu Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, China, School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China.
  • Liming Fang College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210044, China.

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.