A Cloud-User Protocol Based on Ciphertext Watermarking Technology

With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring a...

Full description

Bibliographic Details
Main Authors: Keyang Liu, Weiming Zhang, Xiaojuan Dong
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2017/4376282
id doaj-92e17ec85ca24523a519c273c4c43f0b
record_format Article
spelling doaj-92e17ec85ca24523a519c273c4c43f0b2020-11-25T02:34:43ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/43762824376282A Cloud-User Protocol Based on Ciphertext Watermarking TechnologyKeyang Liu0Weiming Zhang1Xiaojuan Dong2School of Information Science and Technology, University of Science and Technology of China, Anhui, ChinaSchool of Information Science and Technology, University of Science and Technology of China, Anhui, ChinaSchool of Information Science and Technology, University of Science and Technology of China, Anhui, ChinaWith the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.http://dx.doi.org/10.1155/2017/4376282
collection DOAJ
language English
format Article
sources DOAJ
author Keyang Liu
Weiming Zhang
Xiaojuan Dong
spellingShingle Keyang Liu
Weiming Zhang
Xiaojuan Dong
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
Security and Communication Networks
author_facet Keyang Liu
Weiming Zhang
Xiaojuan Dong
author_sort Keyang Liu
title A Cloud-User Protocol Based on Ciphertext Watermarking Technology
title_short A Cloud-User Protocol Based on Ciphertext Watermarking Technology
title_full A Cloud-User Protocol Based on Ciphertext Watermarking Technology
title_fullStr A Cloud-User Protocol Based on Ciphertext Watermarking Technology
title_full_unstemmed A Cloud-User Protocol Based on Ciphertext Watermarking Technology
title_sort cloud-user protocol based on ciphertext watermarking technology
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2017-01-01
description With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.
url http://dx.doi.org/10.1155/2017/4376282
work_keys_str_mv AT keyangliu aclouduserprotocolbasedonciphertextwatermarkingtechnology
AT weimingzhang aclouduserprotocolbasedonciphertextwatermarkingtechnology
AT xiaojuandong aclouduserprotocolbasedonciphertextwatermarkingtechnology
AT keyangliu clouduserprotocolbasedonciphertextwatermarkingtechnology
AT weimingzhang clouduserprotocolbasedonciphertextwatermarkingtechnology
AT xiaojuandong clouduserprotocolbasedonciphertextwatermarkingtechnology
_version_ 1724807098671300608