A method for trust management in cloud computing: Data coloring by cloud watermarking
- 1k Downloads
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users’ embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.
KeywordsCloud computing cloud security trust management cloud watermarking data coloring
- D. Y. Li, H. S. Zhang. Internet computing beyond Turing machine. Communications of the CCF, vol. 5, no. 12, pp. 8–16, 2009. (in Chinese)Google Scholar
- Ro. Haas, R. Marty. Everything over IP, IP over everything, [Online], Available: ftp://www.snm.ethz.ch/pub/lehre/inteco/WS0001/V1-IP-Everything.PDF, May 30, 2011.
- T. Berners-Lee, R. Cailliau. World Wide Web: Proposal for a HyperText Project, [Online], Available: http://www.w3.org/Proposal.html, May 30, 2011.
- N. G. Carr. IT Doesn’t Matter, [Online], Available: http://hbr.org/product/it-doesn-t-matter/an/R0305B-PD F-ENG, May 30, 2011.
- M. Miller. Cloud Computing: Web-based Applications That Change the Way You Work and Collaborate Online, USA: QUE, 2008.Google Scholar
- D. Y. Li. Software Engineering in the Network Age, Technical Report, Beijing Institute of Technology, 2007. (in Chinese)Google Scholar
- Z. H. Liu, P. Yin. Information Hiding Technology and Application, Beijing, PRC: Science Press, 2002. (in Chinese)Google Scholar
- D. Y. Li, X. M. Shi, H. J. Meng. Membership clouds and membership cloud generators. Computer Research and Development, vol. 32, no. 6, pp. 15–20, 1995. (in Chinese)Google Scholar
- Y. Zhang, D. N. Zhao, D. Y. Li. Watermarking relational databases. Journal of PLA University of Science and Technology, vol. 4, no. 5, pp. 1–4, 2003. (in Chinese)Google Scholar
- Y. Zhang, X. M. Niu, D. N. Zhao. A method of protecting relational databases copyright with cloud watermark. World Academy of Science, Engineering and Technology, vol. 3, pp. 68–72, 2005.Google Scholar
- D. Y. Li, C. Y. Liu. Study on the universality of the normal cloud model. China Engineering Science, vol. 6, no. 8, pp. 28–34, 2004. (in Chinese)Google Scholar
- R. Agrawal, J. Kiernan. Watermarking relational databases. In Proceedings of the 28th VLDB Conference, ACM, Hong Kong, PRC, pp. 155–166, 2002.Google Scholar
- Z. H. Zhang, X. M. Jin, J. M. Wang, D. Y. Li. Watermarking relational database using image. In Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, IEEE, Shanghai, PRC, vol. 3, pp. 1739–1744, 2004.Google Scholar
- V. M. Potdar, S. Han, E. Chang. A survey of digital image watermarking techniques. In Proceedings of the 3rd IEEE International Conference on Industrial Informatics, IEEE, Perth, Australia, pp. 709–716, 2005.Google Scholar
- G. Lo-Varco, W. Puech, W. Dumas. Content based watermarking for securing color images. Journal of Imaging Science and Technology, vol. 49,no. 5, pp. 464–473, 2005.Google Scholar