Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016 (2016), Article ID 3219042, 7 pages
http://dx.doi.org/10.1155/2016/3219042
Research Article

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing

1School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
2Jiangsu Engineering Centre of Network Monitor, Nanjing University of Information Science and Technology, Nanjing 210044, China

Received 9 December 2015; Revised 6 March 2016; Accepted 12 April 2016

Academic Editor: Isao Echizen

Copyright © 2016 Xinyue Cao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” in Proceedings of the IEEE INFOCOM, pp. 829–837, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2015. View at Publisher · View at Google Scholar
  3. Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98B, no. 1, pp. 190–200, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web-Internet & Web Information Systems, vol. 15, no. 4, pp. 409–428, 2012. View at Google Scholar
  5. N. Singh and S. Singh, “The amalgamation of digital watermarking & cloud watermarking for security enhancement in cloud computing,” International Journal of Computer Science and Mobile Computing, vol. 2, no. 4, pp. 333–339, 2013. View at Google Scholar
  6. D. Boopathy and M. Sundaresan, “Data encryption framework model with watermark security for data storage in public cloud model,” in Proceedings of the 8th International Conference on Computing for Sustainable Global Development (INDIACom '14), pp. 903–907, New Delhi, India, March 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Wang and S. Lian, “On multiwatermarking in cloud environment,” Concurrency Computation Practice and Experience, vol. 24, no. 17, pp. 2151–2164, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Ren, J. Shen, J. Wang, J. Xu, and L. Fang, “Security data auditing based on multifunction digital watermark for multimedia file in cloud storage,” International Journal of Multimedia and Ubiquitous Engineering, vol. 9, no. 9, pp. 231–240, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. Z. Yin, B. Luo, and W. Hong, “Separable and error-free reversible data hiding in encrypted image with high payload,” The Scientific World Journal, vol. 2014, Article ID 604876, 8 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. N. Thiranant, M. Sain, and H. J. Lee, “A design of security framework for data privacy in e-health system using web service,” in Proceedings of the 16th International Conference on Advanced Communication Technology (ICACT '14), pp. 40–43, PyeongChang, South Korea, February 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. R. L. de Souza, H. V. Netto, L. C. Lung et al., “SSICC: sharing sensitive information in a cloud-of-clouds,” in Proceedings of the 9th International Conference on Systems (ICONS '14), pp. 185–191, Nice, France, February 2014.
  12. G. Ateniese, R. Burns, R. Curtmola et al., “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–610, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Juels and B. S. Kaliski Jr., “Pors: proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 584–597, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. R. Sravan Kumar and A. Saxena, “Data integrity proofs in cloud storage,” in Proceedings of the 3rd International Conference on Communication Systems and Networks (COMSNETS '11), pp. 1–4, Bangalore, India, January 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,” IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 9, pp. 1432–1437, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. R. Lu, X. Lin, X. Liang, and X. Shen, “Secure provenance: the essential of bread and butter of data forensics in cloud computing,” in Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS '10), pp. 282–292, Beijing, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. W. N. Cheung, “Digital image watermarking in spatial and transform domains,” in Proceedings (TENCON '00), vol. 3, pp. 374–378, IEEE, Kuala Lumpur, Malaysia, 2000.
  18. S.-H. Wang and Y.-P. Lin, “Wavelet tree quantization for copyright protection watermarking,” IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 154–165, 2004. View at Publisher · View at Google Scholar · View at Scopus
  19. X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255–258, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826–832, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. C.-L. Hsu, M.-R. Lee, and C.-H. Su, “The role of privacy protection in healthcare information systems adoption,” Journal of Medical Systems, vol. 37, no. 5, article 9966, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Haas, S. Wohlgemuth, I. Echizen, N. Sonehara, and G. Müller, “Aspects of privacy for electronic health records,” International Journal of Medical Informatics, vol. 80, no. 2, pp. e26–e31, 2011. View at Publisher · View at Google Scholar · View at Scopus