Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
- 90 Downloads
Recently, cloud computing becomes a main platform for the distribution of multimedia content. The paradigm of multimedia distribution has been shifted from the models in traditional ways to the one in cloud computing. Security and privacy are two most important issues in multimedia distribution. The new model in cloud computing concerns the following issues. Firstly, outsourced content should be confidential except a data owner (DO). Secondly, the CSP is semi-trusted in the public cloud computing environment. A malicious data user (DU) may collude with the CSP to harm the DO’s rights and interests. Thirdly, the rights and interests of DU, including anonymity and unlinkability, should be protected. Based on the above problems, we propose and analyze a Multimedia Distribution based Re-encryption and Fingerprinting (MDRF) scheme in cloud computing. The proposed scheme 1) allows efficient distribution of the content while preserving security and privacy of copyright holders and end users, 2) resolve the problems of piracy tracing, collusion resistance, and dispute resolution, and 3) protect the rights and interests of DU, including anonymity and unlinkability. The analysis part demonstrates that the security of DO and DU are well provided in the proposed scheme. The experimental results evaluate the performance of our framework in terms of collusion resistance of the fingerprint and imperceptibility of fingerprint embedding.
KeywordsRe-encryption Fingerprint Cloud computing Multimedia distribution
The authors are grateful for the anonymous reviewers who made constructive comments and improvements. This work was supported by the National Natural Science Foundation of China (No. 61702276, 61672294, 61502242), the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055, and the Priority Academic Program Development (PAPD) of Jiangsu Higher Education Institutions.
- 1.Boneh D, Shaw J (1995) Collusion-secure fingerprinting for digital data. Advances in cryptology-CRYPTO’95. LNCS 963. Springer, pp 452–465Google Scholar
- 2.Camenisch J (2000) Efficient anonymous fingerprinting with group signatures. Asiacrypt 2000. LNCS 1976. Springer, pp 415–428Google Scholar
- 3.Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Computers, Material & Continua 54(2):197–207Google Scholar
- 9.Kuribayashi M (2010) On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J Inf Secur 2010:1:1–1:11Google Scholar
- 15.Pfitzmann B, Waidner M (1997) Anonymous fingerprinting. Advances in cryptology-EUROCRYPT’97. LNCS 1233. Springer, pp 88–102Google Scholar
- 16.Prins JP, Erkin Z, Lagendijk RL (2007) Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J Inf Secur 2007:20:1–20:7Google Scholar
- 20.Ye C, Xiong Z, Ding Y, Li J, Wang G, Zhang X, Zhang K (2014) Secure multimedia big data sharing in social networks using fingerprinting and encryption in the JPEG2000 compressed domain. In: Trust, security and privacy in computing and communications (TrustCom), 2014 IEEE 13th international conference on, pp 616–621Google Scholar