2022
DOI: 10.1007/s11042-022-12550-7
|View full text |Cite
|
Sign up to set email alerts
|

A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving

Abstract: Nowadays, cloud computing provides a platform infrastructure for the secure dealing of digital data, but privacy and copy control are the two important issues in it over a network. Cloud data is available to the end user and requires enormous security and privacy techniques to protect the data. Moreover, the access control mechanism with encryption-based technique protects the digital rights for participants in a transaction, but they do not protect the media from being illegally redistributed and do not restr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 48 publications
0
11
0
Order By: Relevance
“…The main goal of this research was to maximize early disease detection and minimize the diagnosis error and better prognosis [17]. Kumar et al gave many solutions for detecting the object from the images using machine learning algorithms [18][19][20][21]. Figure 1 demonstrates the structure of the basic smart healthcare system [16].…”
Section: Iot-based Smart Healthcare Systemmentioning
confidence: 99%
“…The main goal of this research was to maximize early disease detection and minimize the diagnosis error and better prognosis [17]. Kumar et al gave many solutions for detecting the object from the images using machine learning algorithms [18][19][20][21]. Figure 1 demonstrates the structure of the basic smart healthcare system [16].…”
Section: Iot-based Smart Healthcare Systemmentioning
confidence: 99%
“…Failing to use the optimization strategy which may enhance the classification accuracy is considered a drawback of the system. Kumar et al have given many solutions for detecting the object from the images using machine learning algorithms [24][25][26][27].…”
Section: Motivationmentioning
confidence: 99%
“…Personal data theft may occur when these security challenges are not addressed and when data becomes vulnerable to third parties it gets complicated as they can perform unauthorized activities on data. Therefore, a profound security system should be developed for decentralized communication devices among IoT devices and the cloud [ 88 ]. Quality of services (QoS): this is the foremost paradigm while addressing the overall performance outcome of integrated networks.…”
Section: Smart Healthcare Applications and Challengesmentioning
confidence: 99%