2017
DOI: 10.1155/2017/4376282
|View full text |Cite
|
Sign up to set email alerts
|

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Abstract: With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users' permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users' worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The citizens of the EU force many social networking websites importantly “Facebook”, “Twitter” and “YouTube” to delete the basic information of thousands of users [ 9 ]. However, consumers cannot legally confirm the erasure of data unless they trust their service providers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The citizens of the EU force many social networking websites importantly “Facebook”, “Twitter” and “YouTube” to delete the basic information of thousands of users [ 9 ]. However, consumers cannot legally confirm the erasure of data unless they trust their service providers.…”
Section: Related Workmentioning
confidence: 99%
“…The general process of watermarking takes place as follows: to embed the watermark W into the digital media DM where XDM is a watermarked digital media [ 9 ]. …”
Section: Proposed Cb-bswp Protocolmentioning
confidence: 99%
“…The encryption operation over image is also improved by applying watermarking principle. The works of Liu et al [35] have presented a security protocol that performs forwarding and retrieval of an encrypted watermarked image using hamming distance code and homomorphic encryption. The study outcome shows agreeable tolerance range but it lacks any form of comparative analysis.…”
Section: B Data Security Schemes In Cloudmentioning
confidence: 99%