Secured Data Transmission with Water Marking Technology in Cloud Environment

Authors

  • C. Kalpana  Assistant Professor, Department of Computer Science and Engineering, Sri Manakula Vinayagar Engineering College, Madagadipet, Pondicherry, Tamil Nadu, India
  • B. Anitha  UG Scholar, Department of Computer Science and Engineering, Sri Manakula Vinayagar Engineering College, Madagadipet, Pondicherry, Tamil Nadu, India
  • S. Keerthana  UG Scholar, Department of Computer Science and Engineering, Sri Manakula Vinayagar Engineering College, Madagadipet, Pondicherry, Tamil Nadu, India
  • N. Padmapriya  UG Scholar, Department of Computer Science and Engineering, Sri Manakula Vinayagar Engineering College, Madagadipet, Pondicherry, Tamil Nadu, India
  • V. Premika Vishalini  UG Scholar, Department of Computer Science and Engineering, Sri Manakula Vinayagar Engineering College, Madagadipet, Pondicherry, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195245

Keywords:

Data Storage System, Data Leakage, Employing Key, File Assured Deletion.

Abstract

In this paper contains the fulfillment of Data Lineage in Malicious Environment. A data distributor has given precise data to a set of supposedly trusted agents. Some of the data are leaked and found in an unjustified place. The distributor must assess the likelihood that the crevice data came from one or more agents, as opposed to having been individually gathered by other means. We propose data allocation strategies that improve the probability of identifying crevices. These methods do not build on alterations of the released data. In some cases, we can also implant “realistic but fake” data records to further improve our chances of detecting crevice and identifying the guilty party. While sending data over the network there is lots of illegitimate user trying to get useful information. There should be proper security should be provided to data which is send to network. Now a days smartphones use have been increased rapidly and the applications used in smartphones can get easy access to our confidential information. So for avoiding this we used the data lineage mechanism. We give the fake information to guilty agent. We develop and analyze a novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer, robust Watermarking, and signature primitives. Finally, we perform an experimental evaluation to demonstrate the practicality of our protocol and apply our framework to the important data leakage scenarios of data outsourcing and social networks. In general, we consider our lineage framework for data transfer, to be an key step towards achieving accountability by design.

References

  1. M. ARMBRUST, A. FOX, R. GRIFFITH, A.D. JOSEPH, R. KTAZ, A. KONWIN-SKI, G. LEE, D. PATTERSON, A. RABKIN, I. STOICS, AND M. ZAHARIA, “A VIEW OF CLOUD COMPUTING,” COMMUNICATIONS OF THE ACM, VOL. 53, NO. 4, 2010, PP. 50-58.
  2. M. S. BLUMENTHAL, “IS SECURITY LOST IN THE CLOUDS?”COMMUNICA-TIONS AND STRATEGIES, NO. 81, 2011, PP. 69-86.
  3. C.CACHINAND M.SCHUNTER, "A CLOUD YOU CAN TRUST,"IEEESPECTRUM,VOL. 48, NO. 12,2011,PP. 28-51.
  4. C. CREMERS, "THE SCYTHER TOOL: VERIFICATION, FALSIFICATION, AND ANALYSIS OF SECURITY PROTOCOLS." IN COMPUTER AIDED VERIFICATION, SPRINGER BERLIN HEIDELBERG, 2008, PP. 414-418.
  5. CLOUD SECURITY ALLIANCE HTTPS://DOWNLOADS.CLOUDSECURITYALLIANCE.ORG/INITIATIVES/CDG/CSA_CCAQIS_SURVEY.PDF (ACCESSED MARCH 24, 2013).
  6. W. DIFFIE, P. C. V. OORSCHOT, AND M. J. WIENER, “AUTHENTICATION AND AUTHENTICATED KEY EXCHANGES,”DESIGNS, CODES AND CRYPTOGRAPHY,VOL. 2, NO. 2, 1992, PP. 107-125.
  7. M. Ali, K. Bilal, S. U. Khan, B. Veeravalli, K. Li, and A. Y. Zomaya, “DROPS: Division and Replication of Data in the Cloud for Opti-mal Performance and Security,” IEEE Transactions on Cloud Computing, 2015, DOI: 10.1109/TCC.2015.2400460.
  8. N. En and N. Srensson, “An extensible SAT-solver,” Lecture Notes in Computer Science, vol. 2919, Springer, 2003, pp. 502-518.
  9. C P. Gomes, H. Kautz, A. Sabharwal, and B. Selman, “Satisfia-bility solvers,” In Handbook of Knowledge Representation, Elsevier, 2007.
  10. M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud compu-ting: Opportunities and challenges,”Information Sciences,Vol. 305, 2015, pp. 357-383.
  11. A. Juels and A. Opera, “New approaches to security and availabil-ity for cloud data,” Communications of the ACM,Vol. 56, No. 2, 2013, pp. 64-73.
  12. S. Kamara and K. Lauter, “Cryptographic cloud storage,” Financial Cryptography and Data Security,Springer Berlin Heidelberg, 2010, pp. 136-149.
  13. M. Kaufman,”Data security in the world of cloud compu-ting,”IEEE Security andPrivacy,Vol. 7, No. 4, 2009, pp. 61-64.
  14. H. Lin and W. Tzeng, “A secure decentralized erasure code for distributed network storage,” IEEE Transactions on Parallel and Dis-tributed Systems, vol. 21, no. 11, Nov. 2010, pp. 1586-1594.
  15. H. Lin and W. Tzeng, “A secure erasure code-based cloud storage system with secure data forwarding,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, June 2012, pp. 995-1003.
  16. S. U. R. Malik, S. K. Srinivasan, S. U. Khan, and L. Wang, “A Methodology for OSPF Routing Protocol Verification,” 12th Inter-national Conference on Scalable Computing and Communications (ScalCom), Changzhou, China, Dec. 2012.
  17. L. Moura and N. Bjrner, “Satisfiability Modulo Theories: An appetizer,” Lecture Notes in Computer Science, Vol. 5902, Springer, 2009, pp. 23-36.
  18. T. Murata, “Petri Nets: Properties, Analysis and Applications,” Proc. IEEE, Vol. 77, No. 4, pp. 541-580, Apr. 1989.
  19. A. Shamir, “How to Share a Secret,” Comm. ACM, Vol. 22, No. 11, Nov. 1979, pp. 612-613.
  20. H. Takabi, J. B. D. Joshi, and G. J. Ahn, "Security and privacy challenges in cloud computing environments,"IEEE Security andPrivacy, Vol. 8, No. 6, 2010,pp. 24-31.
  21. Y. Tang, P. P. Lee, J. C. S. Lui, and R. Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion,” IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 6, Nov. 2012, pp. 903-916.
  22. A. Yun, C. Shi, and Y. Kim, “On protecting integrity and confiden-tiality of cryptographic file system for outscored storage,” Proceed-ings of 2009 ACM workshop on cloud computing security CCSA’09, pp. 67-76, 2009.
  23. M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A. V. Vasilakos, K. Li, and A. Y. Zomaya, “SeDaSC: Secure Data Sharing in Clouds,” IEEE Systems Journal,2015,http:// dx.doi.org/10.1109/JSYST.2014.2379646.
  24. A. R.Khan, M. Othman, S. A. Madani, and S. U. Khan, “A survey of mobile cloud computing application models,”IEEE Communica-tions Surveys and Tutorials,2013,1-21.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
C. Kalpana, B. Anitha, S. Keerthana, N. Padmapriya, V. Premika Vishalini, " Secured Data Transmission with Water Marking Technology in Cloud Environment , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.624-628, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT195245