Reference Hub5
A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images

A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images

Xiaojuan Dong, Weiming Zhang, Xianjun Hu, Keyang Liu
Copyright: © 2018 |Volume: 10 |Issue: 4 |Pages: 22
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522543633|DOI: 10.4018/IJDCF.2018100109
Cite Article Cite Article

MLA

Dong, Xiaojuan, et al. "A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images." IJDCF vol.10, no.4 2018: pp.118-139. http://doi.org/10.4018/IJDCF.2018100109

APA

Dong, X., Zhang, W., Hu, X., & Liu, K. (2018). A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images. International Journal of Digital Crime and Forensics (IJDCF), 10(4), 118-139. http://doi.org/10.4018/IJDCF.2018100109

Chicago

Dong, Xiaojuan, et al. "A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images," International Journal of Digital Crime and Forensics (IJDCF) 10, no.4: 118-139. http://doi.org/10.4018/IJDCF.2018100109

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how cloud storage dramatically benefits people in freeing up their local storage space, while bringing the separation of the data ownership and private manipulation. Hence, it is difficult for the cloud user to make sure that the cloud storage provider (CSP) has obeyed the request of deletion to remove all corresponding data. To solve the issue technically, this article proposes an interactive cloud-user watermarking protocol (CUW) based on the homomorphic encryption. To meet security requirements, the encrypted watermark is embedded into encrypted data. Moreover, to enjoy the convenient cloud services, the uploaded data is eventually stored in the cloud server in the form of plain text. The performance of the CUW protocol is evaluated through a prototype implementation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.