Skip to main content

Data Storage Security in Cloud Paradigm

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 436))

Abstract

The advent of social networking has given rise to the huge data processing in terms of image and video streams. This, in turn, increased the use of cloud computing services by the users. Secure data storage and access are the main challenges in front of the cloud scenario. This paper reports a novel method of multimedia data security in the cloud paradigm. The proposed method watermarks and compresses the data before its storage in the cloud. This approach not only safeguards the data storage but also reduces the storage requirement and allied monitory overheads. The simulation result shows a 7 and 36 % use of CPU and memory capacity, which overrules the additional hardware requirement for the proposed module in the cloud paradigm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Brown, E.: NIST issues cloud computing guidelines for managing security and privacy. National Institute of Standards and Technology Special Publication 800-144 (2012)

    Google Scholar 

  2. Vouk, M.: Cloud computing—issues, research and implementations. In: 30th International Conference on Information Technology Interfaces (ITI-08), pp. 31–40. Dubrovnik, June 2008

    Google Scholar 

  3. Weiss, A.: Computing in the clouds. NetWorker 11(4), 16–25 (2007)

    Google Scholar 

  4. Wang, L., Laszewski, G., You, A., et al.: Cloud computing: a perspective study. New Gen. Comput. 28(2), 137–146 (2010)

    Google Scholar 

  5. Chow, R., Golle, P., Jakobsson, M., et al.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of ACM workshop on Cloud Computing, pp. 85–90. Security, Chicago, Nov 2009

    Google Scholar 

  6. Modi, C., Patel, D., Borisaniya, B., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42–57 (2013)

    Google Scholar 

  7. Digimarc. http://www.digimarc.com

  8. Podilchuk, C., Zeng, W.: Image-adaptive watermarking using visual models. IEEE J. Sel. Areas Commun. 16, 525–539 (1998)

    Google Scholar 

  9. Podilchuk, C., Delp, E.: Digital watermarking algorithms and its applications. IEEE Signal Proc. Mag. 18(4), 33–46 (2001)

    Google Scholar 

  10. Wu, C., Hsieh, W.: Image refining technique using digital watermarking. IEEE Trans. Consumer Elect. 46(1), 1–5 (2000)

    Google Scholar 

  11. Kwon, O., Kim, Y., Park, R.: A variable block-size dot based watermarking method. IEEE Trans. Consumer Elect. 45(4), 1221–1229 (1999)

    Google Scholar 

  12. Langelaar, G., Lagendijk, R.: Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Proc. 10(1), 148–158 (2001)

    Google Scholar 

  13. Huang, J., Yang, C.: Image digital watermarking algorithm using multi-resolution wavelet transform. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, pp. 2977–82, 2004

    Google Scholar 

  14. Hsieh, M., Tseng, D., Huang, Y.: Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans. Ind. Elec. 48(5), 875–882 (2001)

    Google Scholar 

  15. Megalingam, R., Nair, M., Srikumar et al.: Performance comparison of novel, robust spatial domain digital image watermarking with the conventional frequency domain watermarking techniques. In: International Conference on Signal Acquisition and Processing (ICSAP-10), pp. 349–353. Bangalore, India, Feb 2010

    Google Scholar 

  16. Lancini, R., Mapelli, F., Tubaro, S.: A robust video watermarking technique in the spatial domain. 4th EURASIP-IEEE Region 8 International Symposium on Video/Image Processing and Multimedia Communications, pp. 251–256, 2002

    Google Scholar 

  17. Ruanaidh, J., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process. 66(3), 303–317 (1998)

    Google Scholar 

  18. Fallahpour, M., Shirmohammadi, S., Semsarzadeh, M., Jiying, Z.: Tampering detection in compressed digital video using watermarking. IEEE Trans. Instrum. Meas. 63(5), 1057–1072 (2014)

    Google Scholar 

  19. Keyvanpour, M., Farnoosh, M.: A new encryption method for secure embedding in image watermarking. In: 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE-10), vol. 2, pp. 403–407. Chengdu, Aug 2010

    Google Scholar 

  20. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. NEC Research Institute, Princeton, NJ, Tech. Rep. 95–10, 1995

    Google Scholar 

  21. Armbrust, M., Fox, A., Griffith, R. et al.: Above the Clouds: A Berkeley View of Cloud Computing. University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009

    Google Scholar 

  22. Chappell, D.: Introducing the Azure Service Platform. White paper, Oct 2008

    Google Scholar 

  23. Amazon EC2 and S3. http://aws.amazon.com/

  24. Google App Engine. http://code.google.com/appengine/

  25. Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: IEEE Fourth International Conference on Internet Multimedia Systems Architecture and Application (IMSAA-10), pp. 1–6. Bangalore, India, Dec 2010

    Google Scholar 

  26. Nourian, A., Maheswaran, M.: Using segmentation for confidentiality aware image storage and retrieval on clouds. In: Communication and Information System Security Symposium (Globecom-12), pp. 758–763. Anaheim, CA (2012)

    Google Scholar 

  27. Kester, Q., Nana, L., Pascu, A.: A novel cryptographic encryption technique for securing digital images in the cloud using AES and RGB pixel displacement. European Modeling Symposium, pp. 293–298, 2013

    Google Scholar 

  28. Markandey, A., Moghe, S., Bhute, Y., Honale, S.: An image encryption mechanism for data security in clouds. In: IEEE Global Humanitarian Technology Conference—South Asia Satellite (GHTC-SAS-14), pp. 227–231. Trivandrum, India, Sept 2014

    Google Scholar 

  29. Kamara, S., Lauter, K.: Cryptographic cloud storage. Financial Cryptography and Data Security. Lecture Notes in Computer Science, vol. 6054, pp. 136–149 (2010)

    Google Scholar 

  30. Dai, L., Zhou, Q.: A PKI-based mechanism for secure and efficient access to outsourced data. In: Proceedings of Second International Conference on Networking and Digital Society (ICNDS-10). Wenzhou, vol. 1, pp. 640–643 (2010)

    Google Scholar 

  31. Barjatya, A.: Block matching algorithms for motion estimation. DIP 6620 Spring 2004 Final Project Paper, pp. 1–6 (2004)

    Google Scholar 

  32. Bruckmann, A., Hammerle, J., Reichl, M., Uhl, A.: Hybrid fractal/wavelet image compression in a high performance computing environment. In: High-Performance Computing and Networking, Lecture Notes in Computer Science, vol. 1225, pp. 115–126 (1997)

    Google Scholar 

  33. Deshpande, P., Sharma, S., Peddoju, S.: Implementation of a private cloud: a case study. In: Advances in Intelligent Systems and Computing, vol. 259, pp. 635–647 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prachi Deshpande .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Prachi Deshpande, Sharma, S.C., Peddoju, S.K. (2016). Data Storage Security in Cloud Paradigm. In: Pant, M., Deep, K., Bansal, J., Nagar, A., Das, K. (eds) Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 436. Springer, Singapore. https://doi.org/10.1007/978-981-10-0448-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0448-3_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0447-6

  • Online ISBN: 978-981-10-0448-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics