Abstract
The advent of social networking has given rise to the huge data processing in terms of image and video streams. This, in turn, increased the use of cloud computing services by the users. Secure data storage and access are the main challenges in front of the cloud scenario. This paper reports a novel method of multimedia data security in the cloud paradigm. The proposed method watermarks and compresses the data before its storage in the cloud. This approach not only safeguards the data storage but also reduces the storage requirement and allied monitory overheads. The simulation result shows a 7 and 36 % use of CPU and memory capacity, which overrules the additional hardware requirement for the proposed module in the cloud paradigm.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Brown, E.: NIST issues cloud computing guidelines for managing security and privacy. National Institute of Standards and Technology Special Publication 800-144 (2012)
Vouk, M.: Cloud computing—issues, research and implementations. In: 30th International Conference on Information Technology Interfaces (ITI-08), pp. 31–40. Dubrovnik, June 2008
Weiss, A.: Computing in the clouds. NetWorker 11(4), 16–25 (2007)
Wang, L., Laszewski, G., You, A., et al.: Cloud computing: a perspective study. New Gen. Comput. 28(2), 137–146 (2010)
Chow, R., Golle, P., Jakobsson, M., et al.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of ACM workshop on Cloud Computing, pp. 85–90. Security, Chicago, Nov 2009
Modi, C., Patel, D., Borisaniya, B., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42–57 (2013)
Digimarc. http://www.digimarc.com
Podilchuk, C., Zeng, W.: Image-adaptive watermarking using visual models. IEEE J. Sel. Areas Commun. 16, 525–539 (1998)
Podilchuk, C., Delp, E.: Digital watermarking algorithms and its applications. IEEE Signal Proc. Mag. 18(4), 33–46 (2001)
Wu, C., Hsieh, W.: Image refining technique using digital watermarking. IEEE Trans. Consumer Elect. 46(1), 1–5 (2000)
Kwon, O., Kim, Y., Park, R.: A variable block-size dot based watermarking method. IEEE Trans. Consumer Elect. 45(4), 1221–1229 (1999)
Langelaar, G., Lagendijk, R.: Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Proc. 10(1), 148–158 (2001)
Huang, J., Yang, C.: Image digital watermarking algorithm using multi-resolution wavelet transform. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, pp. 2977–82, 2004
Hsieh, M., Tseng, D., Huang, Y.: Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans. Ind. Elec. 48(5), 875–882 (2001)
Megalingam, R., Nair, M., Srikumar et al.: Performance comparison of novel, robust spatial domain digital image watermarking with the conventional frequency domain watermarking techniques. In: International Conference on Signal Acquisition and Processing (ICSAP-10), pp. 349–353. Bangalore, India, Feb 2010
Lancini, R., Mapelli, F., Tubaro, S.: A robust video watermarking technique in the spatial domain. 4th EURASIP-IEEE Region 8 International Symposium on Video/Image Processing and Multimedia Communications, pp. 251–256, 2002
Ruanaidh, J., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process. 66(3), 303–317 (1998)
Fallahpour, M., Shirmohammadi, S., Semsarzadeh, M., Jiying, Z.: Tampering detection in compressed digital video using watermarking. IEEE Trans. Instrum. Meas. 63(5), 1057–1072 (2014)
Keyvanpour, M., Farnoosh, M.: A new encryption method for secure embedding in image watermarking. In: 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE-10), vol. 2, pp. 403–407. Chengdu, Aug 2010
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. NEC Research Institute, Princeton, NJ, Tech. Rep. 95–10, 1995
Armbrust, M., Fox, A., Griffith, R. et al.: Above the Clouds: A Berkeley View of Cloud Computing. University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009
Chappell, D.: Introducing the Azure Service Platform. White paper, Oct 2008
Amazon EC2 and S3. http://aws.amazon.com/
Google App Engine. http://code.google.com/appengine/
Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: IEEE Fourth International Conference on Internet Multimedia Systems Architecture and Application (IMSAA-10), pp. 1–6. Bangalore, India, Dec 2010
Nourian, A., Maheswaran, M.: Using segmentation for confidentiality aware image storage and retrieval on clouds. In: Communication and Information System Security Symposium (Globecom-12), pp. 758–763. Anaheim, CA (2012)
Kester, Q., Nana, L., Pascu, A.: A novel cryptographic encryption technique for securing digital images in the cloud using AES and RGB pixel displacement. European Modeling Symposium, pp. 293–298, 2013
Markandey, A., Moghe, S., Bhute, Y., Honale, S.: An image encryption mechanism for data security in clouds. In: IEEE Global Humanitarian Technology Conference—South Asia Satellite (GHTC-SAS-14), pp. 227–231. Trivandrum, India, Sept 2014
Kamara, S., Lauter, K.: Cryptographic cloud storage. Financial Cryptography and Data Security. Lecture Notes in Computer Science, vol. 6054, pp. 136–149 (2010)
Dai, L., Zhou, Q.: A PKI-based mechanism for secure and efficient access to outsourced data. In: Proceedings of Second International Conference on Networking and Digital Society (ICNDS-10). Wenzhou, vol. 1, pp. 640–643 (2010)
Barjatya, A.: Block matching algorithms for motion estimation. DIP 6620 Spring 2004 Final Project Paper, pp. 1–6 (2004)
Bruckmann, A., Hammerle, J., Reichl, M., Uhl, A.: Hybrid fractal/wavelet image compression in a high performance computing environment. In: High-Performance Computing and Networking, Lecture Notes in Computer Science, vol. 1225, pp. 115–126 (1997)
Deshpande, P., Sharma, S., Peddoju, S.: Implementation of a private cloud: a case study. In: Advances in Intelligent Systems and Computing, vol. 259, pp. 635–647 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Prachi Deshpande, Sharma, S.C., Peddoju, S.K. (2016). Data Storage Security in Cloud Paradigm. In: Pant, M., Deep, K., Bansal, J., Nagar, A., Das, K. (eds) Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 436. Springer, Singapore. https://doi.org/10.1007/978-981-10-0448-3_20
Download citation
DOI: https://doi.org/10.1007/978-981-10-0448-3_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0447-6
Online ISBN: 978-981-10-0448-3
eBook Packages: EngineeringEngineering (R0)