Abstract
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users’ embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.
Similar content being viewed by others
References
D. Y. Li, H. S. Zhang. Internet computing beyond Turing machine. Communications of the CCF, vol. 5, no. 12, pp. 8–16, 2009. (in Chinese)
Ro. Haas, R. Marty. Everything over IP, IP over everything, [Online], Available: ftp://www.snm.ethz.ch/pub/lehre/inteco/WS0001/V1-IP-Everything.PDF, May 30, 2011.
T. Berners-Lee, R. Cailliau. World Wide Web: Proposal for a HyperText Project, [Online], Available: http://www.w3.org/Proposal.html, May 30, 2011.
N. G. Carr. IT Doesn’t Matter, [Online], Available: http://hbr.org/product/it-doesn-t-matter/an/R0305B-PD F-ENG, May 30, 2011.
M. Miller. Cloud Computing: Web-based Applications That Change the Way You Work and Collaborate Online, USA: QUE, 2008.
D. Y. Li. Software Engineering in the Network Age, Technical Report, Beijing Institute of Technology, 2007. (in Chinese)
E. Bertino. Data security. Data & Knowledge Engineering, vol. 25, no. 1–2, pp. 199–216, 1998.
Z. H. Liu, P. Yin. Information Hiding Technology and Application, Beijing, PRC: Science Press, 2002. (in Chinese)
D. Y. Li, X. M. Shi, H. J. Meng. Membership clouds and membership cloud generators. Computer Research and Development, vol. 32, no. 6, pp. 15–20, 1995. (in Chinese)
D. N. Zhao, Y. Zhang, D. Y. Li. Text digital watermarking technology based on cloud model. Journal of Computer Applications, vol. 23, no. s2, pp. 100–102, 2003. (in Chinese)
Y. Zhang, D. N. Zhao, D. Y. Li. Watermarking relational databases. Journal of PLA University of Science and Technology, vol. 4, no. 5, pp. 1–4, 2003. (in Chinese)
Y. Zhang, X. M. Niu, D. N. Zhao. A method of protecting relational databases copyright with cloud watermark. World Academy of Science, Engineering and Technology, vol. 3, pp. 68–72, 2005.
D. Y. Li, Y. Du. Artificial Intelligence with Uncertainty, New York, USA: CRC Press, 2007.
D. Y. Li, C. Y. Liu. Study on the universality of the normal cloud model. China Engineering Science, vol. 6, no. 8, pp. 28–34, 2004. (in Chinese)
R. Agrawal, J. Kiernan. Watermarking relational databases. In Proceedings of the 28th VLDB Conference, ACM, Hong Kong, PRC, pp. 155–166, 2002.
Z. H. Zhang, X. M. Jin, J. M. Wang, D. Y. Li. Watermarking relational database using image. In Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, IEEE, Shanghai, PRC, vol. 3, pp. 1739–1744, 2004.
V. M. Potdar, S. Han, E. Chang. A survey of digital image watermarking techniques. In Proceedings of the 3rd IEEE International Conference on Industrial Informatics, IEEE, Perth, Australia, pp. 709–716, 2005.
X. Kong, R. Feng. Watermarking medical signals for telemedicine. IEEE Transactions on Information Technology in Biomedicine, vol. 5, no. 3, pp. 195–201, 2001.
C. Rey, D. Jean-Luc. A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing, vol. 2002, no. 1, pp. 613–621, 2002.
J. F. Delaigle, C. D. Vleeschouwer, B. Macq. Watermarking algorithm based on a human visual model. Signal Processing, vol. 66, no. 3, pp. 319–335, 1998.
G. Lo-Varco, W. Puech, W. Dumas. Content based watermarking for securing color images. Journal of Imaging Science and Technology, vol. 49,no. 5, pp. 464–473, 2005.
X. Y. Wang, J. Wu. A feature-based robust digital image watermarking against desynchronization attacks. International Journal of Automation and Computing, vol. 4, no. 4, pp. 428–432, 2007.
B. C. Mohan, S. S. Kumar. A robust image watermarking scheme using singular value decomposition. Journal of Multimedia, vol. 3, no. 1, pp. 7–15, 2008.
S. E. I. Baba, L. Z. Krikor, T. Arif, Z. Shaaban. Watermarking of digital images in frequency domain. International Journal of Automation and Computing, vol. 7, no. 1, pp. 17–22, 2010.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported by National Basic Research Program of China (973 Program) (No. 2007CB310800) and China Postdoctoral Science Foundation (No. 20090460107 and No. 201003794).
Yu-Chao Liu received the B. Sc. and M. Sc. degrees in computer science from the PLA University of Science and Technology, PRC in 2002 and 2005, respectively. He is currently a Ph. D. candidate in Department of Computer Science and Technology, Tsinghua University, PRC. Also, he is an engineer of the Institute of Electronic System Engineering, PRC.
His research interests include cloud computing, granular computing, and artificial intelligence.
Yu-Tao Ma received the Ph.D. degree from the Wuhan University, PRC in 2007 and the M. Sc. and B. Sc. degrees from the Wuhan University of Science and Technology, PRC in 2004 and 2001, respectively, all in computer science. He is currently a lecturer in State Key Lab of Software Engineering (SKLSE) at Wuhan University as well as a post-doctor researcher of the Institute of Electronic System Engineering, PRC.
His research interests include software metrics, software evolution, and the interdisciplinary research between software engineering and complex networks.
Hai-Su Zhang received the B. Sc. and M. Sc. degrees in computer application technology from PLA University of Science and Technology, PRC in 2004 and 2007, respectively. He is currently a Ph.D. candidate at PLA University of Science and Technology.
His research interests include network data mining.
De-Yi Li is a professor at Tsinghua University, PRC, and the president of Chinese Association of Artificial Intelligence.
His research interests include artificial intelligence, complex network, and cloud computing.
Gui-Sheng Chen received the Ph.D. degree from Tsinghua University, PRC in 2005. He is currently a senior engineer of the Institute of Electronic System Engineering, PRC.
His research interests include artificial intelligence and complex network.
Rights and permissions
About this article
Cite this article
Liu, YC., Ma, YT., Zhang, HS. et al. A method for trust management in cloud computing: Data coloring by cloud watermarking. Int. J. Autom. Comput. 8, 280–285 (2011). https://doi.org/10.1007/s11633-011-0583-3
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11633-011-0583-3