Abstract
Outsourcing data storage systems reduce storage costs of IT Enterprises and maintenance for users, which have attracted much attention. It is an acceptable way to use cryptography technologies to ensure privacy preserving and access control in secure outsourcing data storage scheme. In this paper, we propose an outsourcing data storage scheme which combines digital watermarking and cryptography technology to support privacy preserving and data hiding. We use the multi-granularity encryption algorithm to preserve the privacy of outsourcing data. The RSA-based proxy re-encryption (PRE) algorithm is used to make the key transportation safe. And the decrypted data containing hiding data is approximate to the original data. Experiments show that our scheme is secure and feasible.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Drel-Khameesy, N., Rahman, H.A.: A Proposed model for enhancing data storage security in cloud computing systems. Emerg. Trends Comput. Inf. Sci. 3(6), 970–974 (2012)
Boopathy, D., Sundaresan, M.: Data encryption frame-work model with watermarking security for data storage in public cloud model. In: IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp. 903–907 (2014)
Zhang, X.: Reversible data hiding in encrypted image. IEEE. Sig. Process. Lett. 18(4), 255–258 (2011)
Yin, Z., Luo, B., Hong, W.: Separable and error-free reversible data hiding in encrypted image with high payload. Sci. World J. 2014(2014), 1–8 (2014). doi:10.1155/2014/604876
Xiong, N., Vasilakos, A.V., Yang, L.T., Song, L., Pan, Y., Kannan, R., Li, Y.: Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J. Sel. Areas Commun. 27(4), 495–509 (2009)
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11, 2706–2716 (2016)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (TPDS) 27, 2546–2559 (2016). doi:10.1109/TPDS.2015.2506573
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)
Cheung, W.N.: Digital image watermarking in spatial and transform domains. In: 2000 Proceedings of TENCON, pp. 374–378. IEEE (2000)
Wang, S.H., Lin, Y.P.: Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154–165 (2004)
Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using unidirectional proxy re-encryption schemes. In: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pp. 1952–1960, 1975–1980 (2011)
Acknowledgments
This work is supported by the NSFC (U1536206, 61232016, U1405254, 61373133, 61502242), BK20150925, and PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Fu, Z., Cao, X. (2016). An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-48671-0_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48670-3
Online ISBN: 978-3-319-48671-0
eBook Packages: Computer ScienceComputer Science (R0)