Skip to main content
Log in

Multimedia access control with secure provenance in fog-cloud computing networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Multimedia data, ranging from text, audio, video to animation, undergoes intellectual property protection or has high sensitivity. To deal with privacy leakage during multimedia sharing and dissemination, it is crucial to trace the origin and transformation history of multimedia data, which is called multimedia provenance. In this paper, we construct a multimedia access control system with secure provenance in fog-cloud computing networks, which is designed based on attribute based encryption (ABE) and zero of knowledge technologies. The proposed scheme realizes confidentiality of multimedia big data that is outsourced to the cloud, anonymity of data provider, fine-grained access control of encrypted data, irrefutable of the provenance data, and traceability of data provider. We utilize the fog server to reduce user’s decryption burden and transfer partial decryption tasks. The suggested system is formally proved indistinguishable against chosen plaintext attack (IND-CPA). The simulation and experimental results indicate that our system has low communication overhead and low computation cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Beimel A (1996) Secure Schemes for Secret Sharing and Key Distribution PhD thesis. Israel Institute of Technology, Technion

    Google Scholar 

  2. Chang V (2015) Towards a Big Data system disaster recovery in a Private Cloud [J]. Ad Hoc Netw 35:65–82

    Article  Google Scholar 

  3. Duncan B, Whittington M, Chang V (2017) Enterprise security and privacy: why adding IoT and big data makes it so much more difficult[C]. In: 2017 International Conference on Engineering and Technology (ICET). IEEE, pp 1–7

  4. Hallman R, Rohloff K, Chang V (2017) Workshop on multimedia privacy and Security[C]. In: Proceedings of the ACM SIGSAC conference on computer and communications security. ACM, pp 2645–2646

  5. Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimed Tool Appl 77(4):4477–90

    Article  MathSciNet  Google Scholar 

  6. Hu L, Li Y, Li T, Li H, Chu J (2016) The efficiency improved scheme for secure access control of digital video distribution. Multimed Tool Appl 75(20):12645–62

    Article  Google Scholar 

  7. Hurrah NN et al (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Future Generation Comput Syst 94:654–673

    Article  Google Scholar 

  8. Jamil F, Khan A (2018) Etc. Secure provenance using an authenticated data structure approach. Comput Secur 73:34–56

    Article  Google Scholar 

  9. Kuo CT, Chi PW, Chang V et al (2018) SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service[J]. Future Generation Comput Syst 86:1424–1436

    Article  Google Scholar 

  10. Li J, Chen X, Huang Q, Wong D (2014) Digital provenance: enabling secure data forensics in cloud computing. Futur Gener Comput Syst 37:259–266

    Article  Google Scholar 

  11. Li Y, Gai K, Ming Z, Zhao H, Qiu M (2016) Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Transactions on Multimedia Computing Communications, and Applications (TOMM) 12(4s):67

    Google Scholar 

  12. Liang X, Shetty SS, Tosh D, Njilla L, Kamhoua CA, Kwiat K (2019) Provchain: Blockchain-based cloud data provenance. Blockchain for Distributed Systems Security, 67–94

  13. Lynn B The Stanford Pairing Based Crypto Library. [Online]. Available: http://crypto.stanford.edu/pbc

  14. Ma S, Zhang T, Wu A, Zhao X (2019) Lightweight and privacy-preserving data aggregation for mobile multimedia security. IEEE Access 7:114131–40

    Article  Google Scholar 

  15. Qin Z et al (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Comput 5.2:48–57

    Article  Google Scholar 

  16. Rani M, Mary Shanthi G, Germine M, Euphrasia KR (2016) Multilevel multimedia security by integrating visual cryptography and steganography techniques. Computational intelligence, cyber security and computational models. Springer, Singapore, pp 403–412

    Book  Google Scholar 

  17. Ren J et al (2019) Striped-texture image segmentation with application to multimedia security. Multimed Tool Appl 78.19:26965–26978

    Article  Google Scholar 

  18. Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: ACM SIGSAC conference on Computer and communications security (CCS). ACM, pp 463–474

  19. Sarkar S, Chatterjee S, Misra S (2015) Assessment of the suitability of fog computing in the context of internet of things. IEEE Trans Cloud Comput 6(1):46–59

    Article  Google Scholar 

  20. Sultana S, Ghinita G, Bertino E, Shehab M (2013) A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 12(3):256–69

    Article  Google Scholar 

  21. Sultana S, Shehab M, Bertino E (2012) Secure provenance transmission for streaming data. IEEE Trans Knowl Data Eng 25(8):1890–903

    Article  Google Scholar 

  22. Wang C, Hussain SR, Bertino E (2015) Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans Parallel Distributed Syst 27 (2):405–418

    Article  Google Scholar 

  23. Xia Y et al (2017) Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans Intell Trans Syst 18.10:2629–2641

    Article  Google Scholar 

  24. Xu K, Xiong H, Wu C, Stefan D, Yao D (2012) Data-provenance verification for secure hosts. IEEE Trans Dependable Secure Comput 9(2):173–83

    Article  Google Scholar 

  25. Yang Y, Liu X, Deng R (2017) Multi-user multi-keyword rank search over encrypted data in arbitrary language[J]. IEEE Trans Dependable Secure Comput

  26. Yang Y, Liu X, Deng RH, Li Y (2017) Lightweight sharable and traceable secure mobile health system. IEEE Trans Dependable Secure Comput, 20

  27. Yang Y, Liu X, Deng RH, Weng J (2017) Flexible wildcard searchable encryption system. IEEE Trans Services Comput

  28. Yang Y, Liu X, Zheng X, Rong C, Guo W (2018) Efficient traceable authorization search system for secure cloud storage. IEEE Trans Cloud Comput, 29

  29. Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inform Sci 479:567–592

    Article  Google Scholar 

  30. Yang Y, Zheng X, Rong C et al (2018) Efficient regular language search for secure cloud Storage[J]. IEEE Trans Cloud Comput

  31. Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms, systems, and applications. Springer, pp 685–695

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (No. 61872091); Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201721); Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection (No. 2017B030301004-13); Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) (No. MJUKF-IPIC201908).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenzhong Guo.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, Y., Liu, X., Guo, W. et al. Multimedia access control with secure provenance in fog-cloud computing networks. Multimed Tools Appl 79, 10701–10716 (2020). https://doi.org/10.1007/s11042-020-08703-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08703-1

Keywords

Navigation