Survey on Data Security between User and Cloud Storage

R. Kanimozhi*, **, S. Deivanai***, G.Muthumariyamma****, R.Kowsalya*****
* Assistant Professor, Department of Information Technology, A.V.C College of Engineering, Mannampandal, India.
**-***** UG Scholar, Department of Information Technology, A.V.C College of Engineering, Mannampandal, India.
Periodicity:May - July'2015
DOI : https://doi.org/10.26634/jcc.2.3.4792

Abstract

Mobile devices are widely deployed in the world, and many people use them to download and upload media such as videos and pictures. Traditional security approaches were proposed to secure the data exchange between users and the cloud. Information hiding techniques have been recently emerged in many different application areas. In a digital image watermarking system, watermark is embedded in an object and the object may be an image or audio or video. Image object have been used in this paper. But nowadays, files are uploaded and maintained in cloud servers, where malicious users access these watermarked images from cloud servers and remove the watermarks from the images and make use of them without any copyright from the data owner. To overcome this problem, this paper introduces the new method of image chunk. Image chunk will split the image into four parts of sections and upload them in a four different sections to the cloud server respectively. Therefore, users cannot access the image and also cannot remove the watermarks from the file. Also, the authors have proposed a file compression technique to optimize the memory size and quality for storage space in the server. It will reduce the bandwidth usage for file upload and downloads.

Keywords

Watermark, Image Chunks, Compression, Size Reduction, Image Quality.

How to Cite this Article?

Kanimozhi, R.,Jayashree, J., Deivanai, S., Muthumariyammal, G., and Kowsalya, R. (2015). Survey on Data Security between User and Cloud Storage. i-manager’s Journal on Cloud Computing, 2(3), 19-25. https://doi.org/10.26634/jcc.2.3.4792

References

[1]. Y. Xu and S. Mao, (2013). “A Survey of Mobile Cloud Computing for Rich Media Applications”. IEEE Wireless Commun., Vol. 20, No. 3.
[2]. S. Wang and S. Dey, (2013). “Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Applications”. IEEE Trans. Multimedia, Vol. 15, No. 4, pp. 870–883.
[3]. O. H. Kwon, Y. S. Kim, and R. H. Park, (1999). “A VariableBlock-Size Dot based Watermarking method”. IEEE Trans. Consumer Electronics, Vol. 45, No. 4, pp. 1221–1229.
[4]. G. C. Langelaar and R. L. Lagendijk, (2001). “Optimal Differential Energy Watermarking of DCT Encoded Images and Video”. IEEE Trans. Image Processing, Vol. 10, No. 1, pp. 148–158.
[5]. A. J. Choudhury et al., (2011). “A Strong User Authentication Framework for Cloud Computing”. Proc. IEEE Asia-Pacific Services Computing Conf., pp. 110– 115.
[6]. S. Dey, (2012). “Cloud Mobile Media: Opportunities, Chal-lenges, and Directions”. Proc. Int'l. Conf. Computing, Networking and Commun., pp. 929–33.
[7]. B. Ronget al., (2009). “A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study”. IEEE Trans.Vehic. Tech., Vol. 58, No. 1, pp. 398–408.
[8]. K. Lu, Y. Qian, and H.-H. Chen, (2007). “A Secure and Service-Oriented Network Control Framework for WiMAX Networks”. IEEE Commun.Mag., Vol. 45, No. 5, pp. 124–30.
[9]. R. Chow et al., (2010). “Authentication in the Clouds: A Framework and Its Application to Mobile Users”. Proc. ACM Cloud Computing Security Wksp., Chicago, IL.
[10]. M.-S. Hsieh, D.-C.Tseng, and Y.-H. Huang, (2001). “Hiding Digital Watermarks using Multiresolution Wavelet Transform”. IEEE Trans. Industrial Electronics, Vol. 48, No. 5, pp. 875–882.
[11]. F. Sardis et al.,(2013). “On the Investigation of Cloud- Based Mobile Media Environments with Service- Populating and QoS-Aware Mechanisms”. IEEE Trans. Multimedia, Vol. 15, No. 4, pp. 769–77.
[12]. R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, (1994). “A Digital Watermark”. Proc. IEEE Int'l.Conf. Image Processing, Vol. 2, pp. 86–90.
[13]. C. F. Wu and W. S. Hsieh, (2000). “Image Refining Technique Using Digital Watermarking”. IEEE Trans. Consumer Electronics, Vol. 46, No. 1, pp. 1–5.
[14]. J. Huang and C. Yang, (2004). “Image Digital Watermarking Algorithm Using Multi-Resolution Wavelet Ttansform”. Proc. IEEE Int'l. Conf. Systems, Man and Cybernetics, pp. 2977–82.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.