Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning

Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning

Sarvesh Kumar, Surendra Kumar, Nikhil Ranjan, Shivam Tiwari, T. Rajesh Kumar, Dinesh Goyal, Gajanand Sharma, Varsha Arya, Marjan Kuchaki Rafsanjani
Copyright: © 2022 |Pages: 20
DOI: 10.4018/IJCAC.311033
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain technique, visual cryptography, and Arnold transformation. This scheme provides additional security features to the secret share image at the trusted authority side for copyright protection of digital images. The proposed technique is robust against some selected attacks like scaling, blurring, etc. This technique protects the copyright of digital data over the cloud. It is a need and necessary to protect and prevent the illegal copying, redistribution, and copyright infringement of multimedia. This research work aims at increasing robustness and security of the digital image copyright scheme. The proposed scheme is a hybrid authentication framework that will perform better in the watermarking system of security using simulation over MATLAB.
Article Preview
Top

Introduction

Cloud wellbeing is the self-control of organization protection plans given to getting circled handling structures. This contains safeguarding insights actually and all through the online-based development, applications, and stages. Getting these plans merges the undertakings of cloud providers and the buyers that utilize them, whether a person, with little to medium affiliations, or ride uses them. Cloud providers have relationship on their servers through steady web affiliations. Since their business endeavor depends upon buyer trust, cloud wellbeing strategies are used to protect benefactor measurements stowed away and safely set aside. Not with standing, cloud security also lovely rests in the client's arms as pleasantly via (Gupta et al., 2022). Understanding the two components is essential to a sound cloud security plan. Cloud computing offers availability of information, records, programs, and furthermore contributes from a net program over the web. Cloud Computing shops the product, programs, and different processing applications in a focal area. The administration of resources on the cloud has assurance challenges. One of the significant issues is to ensure insights respectability. It is hazardous to guarantee data trustworthiness in distributed computing for the outcomes collecting procedure. One achievable response to ensure information security is Data Provenance. In distributed computing, the term information provenance is depicted as the remarkable stock of shared information objects.

In (Gupta et al., 2014) paper, a watermarking technique is used to store provenance records of shared real factors objects in disseminated processing. This approach will assist with finding the certified load of data objects in circulated registering. The sweep is performed by authorizing the introduced watermarking approach in an open-source stage viewed as own Cloud. Availability of technology offers easy access to digital media content but on the other hand, it is also responsible for its insecurity. Images, videos, audio and text le are traditionally stored in devices like Compact disk etc. As the information technology and computer networking across the globe are developing, the copying of digital multimedia content is becoming more and more convenient. It is very easy to store and duplicate multimedia content. Therefore, unauthorized copying and redistribution of digital content has become easier with the encoding shown in figure 1. Copying in the digital world is so exact and similar that no technology exists that can differentiate between them. Internet is a great boon for the society because it provides large number of resources in each educational field. It provides a platform where one can exchange ideas and resources across the world. Many companies sales their product on-line, to reduce the cost of transportation and other expenses. All this increases the availability of information for the user but, at the same time it also encourages the ease to unauthorized copying and redistribution of multimedia data.

Figure 1.

Basic Cloud Service encoding system using image

IJCAC.311033.f01

(Jain et al., 2022) Cloud security is an entire heap of headways, shows, and best practices that shield scattered enlisting conditions, applications running in the cloud, and information held in the cloud. Getting cloud associations starts with understanding what precisely is being gotten, as well as, the framework focuses that should be made due. As a format, backend improvement against security weaknesses is overall inside the hands of cloud master focuses. Other than picking a security-cognizant supplier, clients should zero in regularly on certified help plans and the protected utilization of propensities. Also, clients ought to be certain that any end-client equipment and affiliations are reasonably gotten. Burglary is a huge issue connected with media data that is open over the web.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing