A method for trust management in cloud computing: Data coloring by cloud watermarking

  • Yu-Chao LiuEmail author
  • Yu-Tao Ma
  • Hai-Su Zhang
  • De-Yi Li
  • Gui-Sheng Chen


With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users’ embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.


Cloud computing cloud security trust management cloud watermarking data coloring 


  1. [1]
    D. Y. Li, H. S. Zhang. Internet computing beyond Turing machine. Communications of the CCF, vol. 5, no. 12, pp. 8–16, 2009. (in Chinese)Google Scholar
  2. [2]
    Ro. Haas, R. Marty. Everything over IP, IP over everything, [Online], Available:, May 30, 2011.
  3. [3]
    T. Berners-Lee, R. Cailliau. World Wide Web: Proposal for a HyperText Project, [Online], Available:, May 30, 2011.
  4. [4]
    N. G. Carr. IT Doesn’t Matter, [Online], Available: F-ENG, May 30, 2011.
  5. [5]
    M. Miller. Cloud Computing: Web-based Applications That Change the Way You Work and Collaborate Online, USA: QUE, 2008.Google Scholar
  6. [6]
    D. Y. Li. Software Engineering in the Network Age, Technical Report, Beijing Institute of Technology, 2007. (in Chinese)Google Scholar
  7. [7]
    E. Bertino. Data security. Data & Knowledge Engineering, vol. 25, no. 1–2, pp. 199–216, 1998.zbMATHCrossRefGoogle Scholar
  8. [8]
    Z. H. Liu, P. Yin. Information Hiding Technology and Application, Beijing, PRC: Science Press, 2002. (in Chinese)Google Scholar
  9. [9]
    D. Y. Li, X. M. Shi, H. J. Meng. Membership clouds and membership cloud generators. Computer Research and Development, vol. 32, no. 6, pp. 15–20, 1995. (in Chinese)Google Scholar
  10. [10]
    D. N. Zhao, Y. Zhang, D. Y. Li. Text digital watermarking technology based on cloud model. Journal of Computer Applications, vol. 23, no. s2, pp. 100–102, 2003. (in Chinese)MathSciNetGoogle Scholar
  11. [11]
    Y. Zhang, D. N. Zhao, D. Y. Li. Watermarking relational databases. Journal of PLA University of Science and Technology, vol. 4, no. 5, pp. 1–4, 2003. (in Chinese)Google Scholar
  12. [12]
    Y. Zhang, X. M. Niu, D. N. Zhao. A method of protecting relational databases copyright with cloud watermark. World Academy of Science, Engineering and Technology, vol. 3, pp. 68–72, 2005.Google Scholar
  13. [13]
    D. Y. Li, Y. Du. Artificial Intelligence with Uncertainty, New York, USA: CRC Press, 2007.CrossRefGoogle Scholar
  14. [14]
    D. Y. Li, C. Y. Liu. Study on the universality of the normal cloud model. China Engineering Science, vol. 6, no. 8, pp. 28–34, 2004. (in Chinese)Google Scholar
  15. [15]
    R. Agrawal, J. Kiernan. Watermarking relational databases. In Proceedings of the 28th VLDB Conference, ACM, Hong Kong, PRC, pp. 155–166, 2002.Google Scholar
  16. [16]
    Z. H. Zhang, X. M. Jin, J. M. Wang, D. Y. Li. Watermarking relational database using image. In Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, IEEE, Shanghai, PRC, vol. 3, pp. 1739–1744, 2004.Google Scholar
  17. [17]
    V. M. Potdar, S. Han, E. Chang. A survey of digital image watermarking techniques. In Proceedings of the 3rd IEEE International Conference on Industrial Informatics, IEEE, Perth, Australia, pp. 709–716, 2005.Google Scholar
  18. [18]
    X. Kong, R. Feng. Watermarking medical signals for telemedicine. IEEE Transactions on Information Technology in Biomedicine, vol. 5, no. 3, pp. 195–201, 2001.CrossRefGoogle Scholar
  19. [19]
    C. Rey, D. Jean-Luc. A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing, vol. 2002, no. 1, pp. 613–621, 2002.zbMATHGoogle Scholar
  20. [20]
    J. F. Delaigle, C. D. Vleeschouwer, B. Macq. Watermarking algorithm based on a human visual model. Signal Processing, vol. 66, no. 3, pp. 319–335, 1998.zbMATHCrossRefGoogle Scholar
  21. [21]
    G. Lo-Varco, W. Puech, W. Dumas. Content based watermarking for securing color images. Journal of Imaging Science and Technology, vol. 49,no. 5, pp. 464–473, 2005.Google Scholar
  22. [22]
    X. Y. Wang, J. Wu. A feature-based robust digital image watermarking against desynchronization attacks. International Journal of Automation and Computing, vol. 4, no. 4, pp. 428–432, 2007.CrossRefGoogle Scholar
  23. [23]
    B. C. Mohan, S. S. Kumar. A robust image watermarking scheme using singular value decomposition. Journal of Multimedia, vol. 3, no. 1, pp. 7–15, 2008.CrossRefGoogle Scholar
  24. [24]
    S. E. I. Baba, L. Z. Krikor, T. Arif, Z. Shaaban. Watermarking of digital images in frequency domain. International Journal of Automation and Computing, vol. 7, no. 1, pp. 17–22, 2010.CrossRefGoogle Scholar

Copyright information

© Institute of Automation, Chinese Academy of Sciences and Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Yu-Chao Liu
    • 1
    • 2
    Email author
  • Yu-Tao Ma
    • 2
    • 3
  • Hai-Su Zhang
    • 4
  • De-Yi Li
    • 1
  • Gui-Sheng Chen
    • 2
  1. 1.Department of Computer Science and TechnologyTsinghua UniversityBeijingPRC
  2. 2.Institute of Electronic System EngineeringBeijingPRC
  3. 3.State Key Lab of Software EngineeringWuhan UniversityWuhanPRC
  4. 4.School of Command AutomationPLA University of Science and TechnologyNanjingPRC

Personalised recommendations