Abstract
Multimedia data, ranging from text, audio, video to animation, undergoes intellectual property protection or has high sensitivity. To deal with privacy leakage during multimedia sharing and dissemination, it is crucial to trace the origin and transformation history of multimedia data, which is called multimedia provenance. In this paper, we construct a multimedia access control system with secure provenance in fog-cloud computing networks, which is designed based on attribute based encryption (ABE) and zero of knowledge technologies. The proposed scheme realizes confidentiality of multimedia big data that is outsourced to the cloud, anonymity of data provider, fine-grained access control of encrypted data, irrefutable of the provenance data, and traceability of data provider. We utilize the fog server to reduce user’s decryption burden and transfer partial decryption tasks. The suggested system is formally proved indistinguishable against chosen plaintext attack (IND-CPA). The simulation and experimental results indicate that our system has low communication overhead and low computation cost.
Similar content being viewed by others
References
Beimel A (1996) Secure Schemes for Secret Sharing and Key Distribution PhD thesis. Israel Institute of Technology, Technion
Chang V (2015) Towards a Big Data system disaster recovery in a Private Cloud [J]. Ad Hoc Netw 35:65–82
Duncan B, Whittington M, Chang V (2017) Enterprise security and privacy: why adding IoT and big data makes it so much more difficult[C]. In: 2017 International Conference on Engineering and Technology (ICET). IEEE, pp 1–7
Hallman R, Rohloff K, Chang V (2017) Workshop on multimedia privacy and Security[C]. In: Proceedings of the ACM SIGSAC conference on computer and communications security. ACM, pp 2645–2646
Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimed Tool Appl 77(4):4477–90
Hu L, Li Y, Li T, Li H, Chu J (2016) The efficiency improved scheme for secure access control of digital video distribution. Multimed Tool Appl 75(20):12645–62
Hurrah NN et al (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Future Generation Comput Syst 94:654–673
Jamil F, Khan A (2018) Etc. Secure provenance using an authenticated data structure approach. Comput Secur 73:34–56
Kuo CT, Chi PW, Chang V et al (2018) SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service[J]. Future Generation Comput Syst 86:1424–1436
Li J, Chen X, Huang Q, Wong D (2014) Digital provenance: enabling secure data forensics in cloud computing. Futur Gener Comput Syst 37:259–266
Li Y, Gai K, Ming Z, Zhao H, Qiu M (2016) Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Transactions on Multimedia Computing Communications, and Applications (TOMM) 12(4s):67
Liang X, Shetty SS, Tosh D, Njilla L, Kamhoua CA, Kwiat K (2019) Provchain: Blockchain-based cloud data provenance. Blockchain for Distributed Systems Security, 67–94
Lynn B The Stanford Pairing Based Crypto Library. [Online]. Available: http://crypto.stanford.edu/pbc
Ma S, Zhang T, Wu A, Zhao X (2019) Lightweight and privacy-preserving data aggregation for mobile multimedia security. IEEE Access 7:114131–40
Qin Z et al (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Comput 5.2:48–57
Rani M, Mary Shanthi G, Germine M, Euphrasia KR (2016) Multilevel multimedia security by integrating visual cryptography and steganography techniques. Computational intelligence, cyber security and computational models. Springer, Singapore, pp 403–412
Ren J et al (2019) Striped-texture image segmentation with application to multimedia security. Multimed Tool Appl 78.19:26965–26978
Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: ACM SIGSAC conference on Computer and communications security (CCS). ACM, pp 463–474
Sarkar S, Chatterjee S, Misra S (2015) Assessment of the suitability of fog computing in the context of internet of things. IEEE Trans Cloud Comput 6(1):46–59
Sultana S, Ghinita G, Bertino E, Shehab M (2013) A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 12(3):256–69
Sultana S, Shehab M, Bertino E (2012) Secure provenance transmission for streaming data. IEEE Trans Knowl Data Eng 25(8):1890–903
Wang C, Hussain SR, Bertino E (2015) Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans Parallel Distributed Syst 27 (2):405–418
Xia Y et al (2017) Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans Intell Trans Syst 18.10:2629–2641
Xu K, Xiong H, Wu C, Stefan D, Yao D (2012) Data-provenance verification for secure hosts. IEEE Trans Dependable Secure Comput 9(2):173–83
Yang Y, Liu X, Deng R (2017) Multi-user multi-keyword rank search over encrypted data in arbitrary language[J]. IEEE Trans Dependable Secure Comput
Yang Y, Liu X, Deng RH, Li Y (2017) Lightweight sharable and traceable secure mobile health system. IEEE Trans Dependable Secure Comput, 20
Yang Y, Liu X, Deng RH, Weng J (2017) Flexible wildcard searchable encryption system. IEEE Trans Services Comput
Yang Y, Liu X, Zheng X, Rong C, Guo W (2018) Efficient traceable authorization search system for secure cloud storage. IEEE Trans Cloud Comput, 29
Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inform Sci 479:567–592
Yang Y, Zheng X, Rong C et al (2018) Efficient regular language search for secure cloud Storage[J]. IEEE Trans Cloud Comput
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms, systems, and applications. Springer, pp 685–695
Acknowledgments
This work is supported by National Natural Science Foundation of China (No. 61872091); Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201721); Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection (No. 2017B030301004-13); Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) (No. MJUKF-IPIC201908).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yang, Y., Liu, X., Guo, W. et al. Multimedia access control with secure provenance in fog-cloud computing networks. Multimed Tools Appl 79, 10701–10716 (2020). https://doi.org/10.1007/s11042-020-08703-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08703-1