A Cloud-User Protocol Based on Ciphertext Watermarking Technology
With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring a...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2017-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2017/4376282 |
id |
doaj-92e17ec85ca24523a519c273c4c43f0b |
---|---|
record_format |
Article |
spelling |
doaj-92e17ec85ca24523a519c273c4c43f0b2020-11-25T02:34:43ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/43762824376282A Cloud-User Protocol Based on Ciphertext Watermarking TechnologyKeyang Liu0Weiming Zhang1Xiaojuan Dong2School of Information Science and Technology, University of Science and Technology of China, Anhui, ChinaSchool of Information Science and Technology, University of Science and Technology of China, Anhui, ChinaSchool of Information Science and Technology, University of Science and Technology of China, Anhui, ChinaWith the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.http://dx.doi.org/10.1155/2017/4376282 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Keyang Liu Weiming Zhang Xiaojuan Dong |
spellingShingle |
Keyang Liu Weiming Zhang Xiaojuan Dong A Cloud-User Protocol Based on Ciphertext Watermarking Technology Security and Communication Networks |
author_facet |
Keyang Liu Weiming Zhang Xiaojuan Dong |
author_sort |
Keyang Liu |
title |
A Cloud-User Protocol Based on Ciphertext Watermarking Technology |
title_short |
A Cloud-User Protocol Based on Ciphertext Watermarking Technology |
title_full |
A Cloud-User Protocol Based on Ciphertext Watermarking Technology |
title_fullStr |
A Cloud-User Protocol Based on Ciphertext Watermarking Technology |
title_full_unstemmed |
A Cloud-User Protocol Based on Ciphertext Watermarking Technology |
title_sort |
cloud-user protocol based on ciphertext watermarking technology |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2017-01-01 |
description |
With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol. |
url |
http://dx.doi.org/10.1155/2017/4376282 |
work_keys_str_mv |
AT keyangliu aclouduserprotocolbasedonciphertextwatermarkingtechnology AT weimingzhang aclouduserprotocolbasedonciphertextwatermarkingtechnology AT xiaojuandong aclouduserprotocolbasedonciphertextwatermarkingtechnology AT keyangliu clouduserprotocolbasedonciphertextwatermarkingtechnology AT weimingzhang clouduserprotocolbasedonciphertextwatermarkingtechnology AT xiaojuandong clouduserprotocolbasedonciphertextwatermarkingtechnology |
_version_ |
1724807098671300608 |