Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud

Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud

Sadiq J. Almuairfi, Mamdouh Alenezi
Copyright: © 2020 |Pages: 25
ISBN13: 9781799827016|ISBN10: 1799827011|EISBN13: 9781799827023
DOI: 10.4018/978-1-7998-2701-6.ch003
Cite Chapter Cite Chapter

MLA

Almuairfi, Sadiq J., and Mamdouh Alenezi. "Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud." Handbook of Research on Multimedia Cyber Security, edited by Brij B. Gupta and Deepak Gupta, IGI Global, 2020, pp. 48-72. https://doi.org/10.4018/978-1-7998-2701-6.ch003

APA

Almuairfi, S. J. & Alenezi, M. (2020). Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud. In B. Gupta & D. Gupta (Eds.), Handbook of Research on Multimedia Cyber Security (pp. 48-72). IGI Global. https://doi.org/10.4018/978-1-7998-2701-6.ch003

Chicago

Almuairfi, Sadiq J., and Mamdouh Alenezi. "Anonymous Authentication for Privacy Preserving of Multimedia Data in the Cloud." In Handbook of Research on Multimedia Cyber Security, edited by Brij B. Gupta and Deepak Gupta, 48-72. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2701-6.ch003

Export Reference

Mendeley
Favorite

Abstract

Cloud computing technology provides cost-saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner's private information because the data owners lose control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. Anonymous Authentication Scheme will be proposed in this chapter as the most relatable, applicable, and appropriate techniques to be adopted by the cloud computing professionals for the eradication of risks that have been associated with the risks and challenges of privacy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.