Skip to main content

An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Included in the following conference series:

  • 1473 Accesses

Abstract

Outsourcing data storage systems reduce storage costs of IT Enterprises and maintenance for users, which have attracted much attention. It is an acceptable way to use cryptography technologies to ensure privacy preserving and access control in secure outsourcing data storage scheme. In this paper, we propose an outsourcing data storage scheme which combines digital watermarking and cryptography technology to support privacy preserving and data hiding. We use the multi-granularity encryption algorithm to preserve the privacy of outsourcing data. The RSA-based proxy re-encryption (PRE) algorithm is used to make the key transportation safe. And the decrypted data containing hiding data is approximate to the original data. Experiments show that our scheme is secure and feasible.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Drel-Khameesy, N., Rahman, H.A.: A Proposed model for enhancing data storage security in cloud computing systems. Emerg. Trends Comput. Inf. Sci. 3(6), 970–974 (2012)

    Google Scholar 

  2. Boopathy, D., Sundaresan, M.: Data encryption frame-work model with watermarking security for data storage in public cloud model. In: IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp. 903–907 (2014)

    Google Scholar 

  3. Zhang, X.: Reversible data hiding in encrypted image. IEEE. Sig. Process. Lett. 18(4), 255–258 (2011)

    Article  Google Scholar 

  4. Yin, Z., Luo, B., Hong, W.: Separable and error-free reversible data hiding in encrypted image with high payload. Sci. World J. 2014(2014), 1–8 (2014). doi:10.1155/2014/604876

    Google Scholar 

  5. Xiong, N., Vasilakos, A.V., Yang, L.T., Song, L., Pan, Y., Kannan, R., Li, Y.: Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J. Sel. Areas Commun. 27(4), 495–509 (2009)

    Article  Google Scholar 

  6. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11, 2706–2716 (2016)

    Article  Google Scholar 

  7. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (TPDS) 27, 2546–2559 (2016). doi:10.1109/TPDS.2015.2506573

    Article  Google Scholar 

  8. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)

    Article  Google Scholar 

  9. Cheung, W.N.: Digital image watermarking in spatial and transform domains. In: 2000 Proceedings of TENCON, pp. 374–378. IEEE (2000)

    Google Scholar 

  10. Wang, S.H., Lin, Y.P.: Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13(2), 154–165 (2004)

    Article  Google Scholar 

  11. Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using unidirectional proxy re-encryption schemes. In: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pp. 1952–1960, 1975–1980 (2011)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the NSFC (U1536206, 61232016, U1405254, 61373133, 61502242), BK20150925, and PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhangjie Fu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Fu, Z., Cao, X. (2016). An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics