Table of Contents Author Guidelines Submit a Manuscript
International Journal of Digital Multimedia Broadcasting
Volume 2016 (2016), Article ID 8789397, 6 pages
http://dx.doi.org/10.1155/2016/8789397
Research Article

Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

1School of Electrical & Electronics Engineering, SASTRA University, Thanjavur 613401, India
2Global Cloud Center of Excellence, IBM India, Bangalore 560045, India

Received 30 October 2015; Revised 19 February 2016; Accepted 8 March 2016

Academic Editor: Yifeng He

Copyright © 2016 Nithya Chidambaram et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R.-K. Sheu, S.-M. Yuan, W.-T. Lo, and C.-I. Ku, “Design and implementation of file deduplication framework on HDFS,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 561340, 11 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Sun, J. Zhang, Y. Xiong, and G. Zhu, “Data security and privacy in cloud computing,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 190903, 9 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Iyer, “Cyber security for smart grid, cryptography, and privacy,” International Journal of Digital Multimedia Broadcasting, vol. 2011, Article ID 372020, 8 pages, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. S. B. Park, “Security requirements for multimedia archives,” Advances in Multimedia, vol. 2015, Article ID 956416, 5 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Balasubramaniam and V. Kavitha, “A survey on data encryption tecniques in cloud computing,” Asian Journal of Information Technology, vol. 13, no. 9, pp. 494–505, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. C.-L. Chen, T.-T. Yang, and T.-F. Shih, “A secure medical data exchange protocol based on cloud environment,” Journal of Medical Systems, vol. 38, no. 9, article 112, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583–592, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. N. Gonzalez, C. Miers, F. Redígolo et al., “A quantitative analysis of current security concerns and solutions for cloud computing,” Journal of Cloud Computing, vol. 1, no. 1, pp. 1–18, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. P. Guo, L. Su, L. Ning, and G. Dan, “Hybrid encryption algorithms in cloud computing,” Information Technology Journal, vol. 12, no. 14, pp. 3015–3019, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Han, W. Susilo, and Y. Mu, “Identity-based data storage in cloud computing,” Future Generation Computer Systems, vol. 29, no. 3, pp. 673–681, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Li, J. Li, Z. Liu, and C. Jia, “Enabling efficient and secure data sharing in cloud computing,” Concurrency Computation Practice and Experience, vol. 26, no. 5, pp. 1052–1066, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. S. K. Sood, “A combined approach to ensure data security in cloud computing,” Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Tan, L. Tan, X. Li, and Y. Jia, “An efficient method for checking the integrity of data in the cloud,” China Communications, vol. 11, no. 9, pp. 68–81, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, 2nd edition, 2001.