Skip to main content
Log in

A method for trust management in cloud computing: Data coloring by cloud watermarking

  • Published:
International Journal of Automation and Computing Aims and scope Submit manuscript

Abstract

With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users’ embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. D. Y. Li, H. S. Zhang. Internet computing beyond Turing machine. Communications of the CCF, vol. 5, no. 12, pp. 8–16, 2009. (in Chinese)

    Google Scholar 

  2. Ro. Haas, R. Marty. Everything over IP, IP over everything, [Online], Available: ftp://www.snm.ethz.ch/pub/lehre/inteco/WS0001/V1-IP-Everything.PDF, May 30, 2011.

  3. T. Berners-Lee, R. Cailliau. World Wide Web: Proposal for a HyperText Project, [Online], Available: http://www.w3.org/Proposal.html, May 30, 2011.

  4. N. G. Carr. IT Doesn’t Matter, [Online], Available: http://hbr.org/product/it-doesn-t-matter/an/R0305B-PD F-ENG, May 30, 2011.

  5. M. Miller. Cloud Computing: Web-based Applications That Change the Way You Work and Collaborate Online, USA: QUE, 2008.

    Google Scholar 

  6. D. Y. Li. Software Engineering in the Network Age, Technical Report, Beijing Institute of Technology, 2007. (in Chinese)

  7. E. Bertino. Data security. Data & Knowledge Engineering, vol. 25, no. 1–2, pp. 199–216, 1998.

    Article  MATH  Google Scholar 

  8. Z. H. Liu, P. Yin. Information Hiding Technology and Application, Beijing, PRC: Science Press, 2002. (in Chinese)

    Google Scholar 

  9. D. Y. Li, X. M. Shi, H. J. Meng. Membership clouds and membership cloud generators. Computer Research and Development, vol. 32, no. 6, pp. 15–20, 1995. (in Chinese)

    Google Scholar 

  10. D. N. Zhao, Y. Zhang, D. Y. Li. Text digital watermarking technology based on cloud model. Journal of Computer Applications, vol. 23, no. s2, pp. 100–102, 2003. (in Chinese)

    MathSciNet  Google Scholar 

  11. Y. Zhang, D. N. Zhao, D. Y. Li. Watermarking relational databases. Journal of PLA University of Science and Technology, vol. 4, no. 5, pp. 1–4, 2003. (in Chinese)

    Google Scholar 

  12. Y. Zhang, X. M. Niu, D. N. Zhao. A method of protecting relational databases copyright with cloud watermark. World Academy of Science, Engineering and Technology, vol. 3, pp. 68–72, 2005.

    Google Scholar 

  13. D. Y. Li, Y. Du. Artificial Intelligence with Uncertainty, New York, USA: CRC Press, 2007.

    Book  Google Scholar 

  14. D. Y. Li, C. Y. Liu. Study on the universality of the normal cloud model. China Engineering Science, vol. 6, no. 8, pp. 28–34, 2004. (in Chinese)

    Google Scholar 

  15. R. Agrawal, J. Kiernan. Watermarking relational databases. In Proceedings of the 28th VLDB Conference, ACM, Hong Kong, PRC, pp. 155–166, 2002.

    Google Scholar 

  16. Z. H. Zhang, X. M. Jin, J. M. Wang, D. Y. Li. Watermarking relational database using image. In Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, IEEE, Shanghai, PRC, vol. 3, pp. 1739–1744, 2004.

    Google Scholar 

  17. V. M. Potdar, S. Han, E. Chang. A survey of digital image watermarking techniques. In Proceedings of the 3rd IEEE International Conference on Industrial Informatics, IEEE, Perth, Australia, pp. 709–716, 2005.

    Google Scholar 

  18. X. Kong, R. Feng. Watermarking medical signals for telemedicine. IEEE Transactions on Information Technology in Biomedicine, vol. 5, no. 3, pp. 195–201, 2001.

    Article  Google Scholar 

  19. C. Rey, D. Jean-Luc. A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing, vol. 2002, no. 1, pp. 613–621, 2002.

    MATH  Google Scholar 

  20. J. F. Delaigle, C. D. Vleeschouwer, B. Macq. Watermarking algorithm based on a human visual model. Signal Processing, vol. 66, no. 3, pp. 319–335, 1998.

    Article  MATH  Google Scholar 

  21. G. Lo-Varco, W. Puech, W. Dumas. Content based watermarking for securing color images. Journal of Imaging Science and Technology, vol. 49,no. 5, pp. 464–473, 2005.

    Google Scholar 

  22. X. Y. Wang, J. Wu. A feature-based robust digital image watermarking against desynchronization attacks. International Journal of Automation and Computing, vol. 4, no. 4, pp. 428–432, 2007.

    Article  Google Scholar 

  23. B. C. Mohan, S. S. Kumar. A robust image watermarking scheme using singular value decomposition. Journal of Multimedia, vol. 3, no. 1, pp. 7–15, 2008.

    Article  Google Scholar 

  24. S. E. I. Baba, L. Z. Krikor, T. Arif, Z. Shaaban. Watermarking of digital images in frequency domain. International Journal of Automation and Computing, vol. 7, no. 1, pp. 17–22, 2010.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Chao Liu.

Additional information

This work was supported by National Basic Research Program of China (973 Program) (No. 2007CB310800) and China Postdoctoral Science Foundation (No. 20090460107 and No. 201003794).

Yu-Chao Liu received the B. Sc. and M. Sc. degrees in computer science from the PLA University of Science and Technology, PRC in 2002 and 2005, respectively. He is currently a Ph. D. candidate in Department of Computer Science and Technology, Tsinghua University, PRC. Also, he is an engineer of the Institute of Electronic System Engineering, PRC.

His research interests include cloud computing, granular computing, and artificial intelligence.

Yu-Tao Ma received the Ph.D. degree from the Wuhan University, PRC in 2007 and the M. Sc. and B. Sc. degrees from the Wuhan University of Science and Technology, PRC in 2004 and 2001, respectively, all in computer science. He is currently a lecturer in State Key Lab of Software Engineering (SKLSE) at Wuhan University as well as a post-doctor researcher of the Institute of Electronic System Engineering, PRC.

His research interests include software metrics, software evolution, and the interdisciplinary research between software engineering and complex networks.

Hai-Su Zhang received the B. Sc. and M. Sc. degrees in computer application technology from PLA University of Science and Technology, PRC in 2004 and 2007, respectively. He is currently a Ph.D. candidate at PLA University of Science and Technology.

His research interests include network data mining.

De-Yi Li is a professor at Tsinghua University, PRC, and the president of Chinese Association of Artificial Intelligence.

His research interests include artificial intelligence, complex network, and cloud computing.

Gui-Sheng Chen received the Ph.D. degree from Tsinghua University, PRC in 2005. He is currently a senior engineer of the Institute of Electronic System Engineering, PRC.

His research interests include artificial intelligence and complex network.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, YC., Ma, YT., Zhang, HS. et al. A method for trust management in cloud computing: Data coloring by cloud watermarking. Int. J. Autom. Comput. 8, 280–285 (2011). https://doi.org/10.1007/s11633-011-0583-3

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11633-011-0583-3

Keywords

Navigation