CFP last date
20 May 2024
Reseach Article

A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment

by Nour El-zawawi, Mohamed Hamdy, Raina El-gohary, Mohamed F.tolba
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 13
Year of Publication: 2013
Authors: Nour El-zawawi, Mohamed Hamdy, Raina El-gohary, Mohamed F.tolba
10.5120/11899-7964

Nour El-zawawi, Mohamed Hamdy, Raina El-gohary, Mohamed F.tolba . A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment. International Journal of Computer Applications. 69, 13 ( May 2013), 1-9. DOI=10.5120/11899-7964

@article{ 10.5120/11899-7964,
author = { Nour El-zawawi, Mohamed Hamdy, Raina El-gohary, Mohamed F.tolba },
title = { A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 13 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number13/11899-7964/ },
doi = { 10.5120/11899-7964 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:07.368600+05:30
%A Nour El-zawawi
%A Mohamed Hamdy
%A Raina El-gohary
%A Mohamed F.tolba
%T A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 13
%P 1-9
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Providing cloud services gets an increasing interest of both scientific and industrial applications today. Storage services are the fundamental component of the Cloud computing paradigm. Exploiting such storage services enables users to outsource their data into the cloud. Not only is the reduction of storage and maintenance costs achieved but gets rid of the required infrastructure burden as well. How to prevent data abuses it by the cloud remains a hot point of the research. As there is a lack of trust between the service providers and clients, a set of challenges of securing the outsourced data against being abused is popped up. In this article, an enhanced secure data scheme for Cloud environments, EnhancedWatermarking Technique for Rational Database with non repudiation (EWRDN), is proposed. It is based on a set of enhancements for the WRDN approach. It improves space complexity by 56% of original WRDN system with the same time complexity. EWRDN Service works as a trusted third party between clients and service providers. It guarantees data integrity, privacy, and non repudiation with the ability to recover data to its origin. Moreover, it gives data owner more controlling capabilities for their data, by tracing users' activities. Besides, it adds a user signature over data being processed. A proposed architecture for EWRDN service is illustrated to prove data integrity and save copyright with the ability to trace the data and recover it to its origin if unauthorized changes take place.

References
  1. Digital signature standard (DSS). National Institute of Standards and Technology (NIST), 2009. Federal Information Processing Standard 186-3.
  2. Imad M. Abbadi and Muntaha Alawneh. A framework for establishing trust in the cloud. Computers and Electrical Engineering, 2012.
  3. Aradhana and I. Chana. Developing trust policies for cloud scenarios. In 2nd International Conference on Computerand Communication Technology, ICCCT, pages 389– 393, 2011.
  4. L. D. Dhinesh Babu, P. Venkata Krishna, A. Mohammed Zayan, and Vijayant Panda. An analysis of security related issues in cloud computing. In 4th International Conference Contemporary Computing, IC3. Springer, 2011.
  5. Durgesh Bajpai, Manu Vardhan, and Dharmender Singh Kushwaha. Authentication and authorization interface using security service level agreements for accessing cloud services. In 5th International Conference on Contemporary Computing-IC3, volume 306 of Communications in Computer and Information Science, page 370:382. Springer, 2012.
  6. Eric Bodden, Malte Clasen, and Joachim Kneis. Arithmetic coding revealed a guided tour from theory to praxis. Technical report, McGill University, 2007.
  7. Don Box, David Ehnebuske, Gopal Kakivaya, Andrew Layman, Noah Mendelsohn, Henrik Frystyk Nielsen, Satish Thatte, and Dave Winer. Simple object access protocol (soap) 1. 1. W3c note, World Wide Web Consortium, 2000.
  8. Roy H. Campbell, Mirko Montanari, and Reza Farivar. A middleware for assured clouds. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 3:87–94, 2012.
  9. Mariana Carroll, Paula Kotz´e, and Alta van der Merwe. Secure cloud computing: Benefits, risks and controls. In Information Security South Africa, ISSA, pages 1– 9. IEEE Computer Society, 2011.
  10. WilliamY. Chang, Hosame Abu-Amara, and JessicaFeng Sanford. Security for enterprise cloud services. In Transforming Enterprise Cloud Services, chapter 9, pages 341– 384. Springer Netherlands, 2010.
  11. Antonio Corradi. Database security management for healthcare saas in the amazon aws cloud. In Proceedings of the IEEE Symposium on Computers and Communications, ISCC '12, pages 812–819. IEEE Computer Society, 2012.
  12. Jean-Daniel Cryans, Alain April, and Alain Abran. Criteria to compare cloud computing with current database technology. In InternationalWorkshop On statistical Modelling (IWSM), 2008.
  13. Tharam Dillon, Chen Wu, and Elizabeth Chang. Cloud computing: Issues and challenges. In IEEE International Conference on Advanced Information Networking and Applications. IEEE Computer Society, 2010.
  14. Thomas Erl. Web Services and Contemporary SOA, chapter 6. Pearson Education, 2005.
  15. W. Fawaz, B. Daheb, O. Audouin, M. Du-Pond, and G. Pujolle. Service level agreement and provisioning in optical networks. IEEE Communications Magazine, 42:36–43, 2004.
  16. Prof. Dieter Fensel, Dr. Federico Michele Facca, Dr. Elena Simperl, and Ioan Toma. Service science. In Semantic Web Services, chapter 3, pages 25–35. Springer, 2011.
  17. M. Fugini and G. Hadjichristofi. Security and trust in cloud scenarios. In 1st International Workshop on Securing Services on the Cloud, IWSSC, pages 22– 29, 2011.
  18. Tyrone Grandison, E. Michael Maximilien, Sean S. E. Thorpe, and Alfredo Alba. Towards a formal definition of a computing cloud. In 6th World Congress on Services, SERVICES, pages 191–192. IEEE Computer Society, 2010.
  19. Asit Dan and Richard King and Richard Franck Heiko Ludwig and, Alexander Keller and. A service level agreement language for dynamic electronic services. Electronic Commerce Research, 3:43–59, 2003.
  20. Dan Hubbard and Michael Sutton. Top threats to cloud computing. Technical report, Cloud Security Alliance, 2010.
  21. Wassim Itani, Ayman Kayssi, and Ali Chehab. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009.
  22. Meiko Jensen, Jorg Schwenk, and and Luigi Lo Iacono Nils Gruschka. On technical security issues in cloud computing. In IEEE International Conference on Cloud Computing. IEEE Computer Society, 2009.
  23. Jian Pei Jiawei Han and, Micheline Kamber and. Data Mining Concepts & Techniques, chapter 3. Elsevier (Morgan Kaufmann), 3 edition, 2011.
  24. Matthias Klusch. Semantic web service coordination. In CASCOM: Intelligent Service Coordination in the Semantic Web, Whitestein Series in Software Agent Technologies and Autonomic Computing, chapter 4, pages 59–104. Birkhuser Basel, Springer, 2008.
  25. Ryan K L Ko, Peter Jagadpramana, Miranda Mowbray, Siani Pearson, Markus Kirchberg, Qianhui Liang, and Bu Sung Lee. Trustcloud: A framework for accountability and trust in cloud computing. In IEEE World Congress on Services (SERVICES). IEEE Computer Society, 2011.
  26. Wenjuan Li and Lingdi Ping. Trust model to enhance security and interoperability of cloud environment. In First International Conference, CloudCom, volume 5931, pages 69–79, 2009.
  27. Zhen Liu, Mark S. Squillante, and Joel L. Wolf. On maximizing service-level-agreement profits. In Proceedings of the 3rd ACM conference on Electronic Commerce, EC '01, page 213:223. ACM Digital Library, 2001.
  28. Peter Mell and Tim Grance. The nist definition of cloud computing, 2011.
  29. Rafael Moreno-Vozmediano, Rubn Montero, and Ignacio Llorente. Key challenges in cloud computing to enable the future internet of services. IEEE Internet Computing, PP:1, 2012.
  30. Mohamed Al Morsy, John Grundy, and Ingo Mller. An analysis of the cloud computing security problem. In Proceedings of Asia-Pacific Software Engineering Conference 2010 Cloud Workshop. IEEE Computer Society, 2010.
  31. CORPORATE NIST. The digital signature standard. Communications of the ACM, 35, 1992.
  32. M. P. Papazoglou. Service-oriented computing: concepts, characteristics and directions. In Proceedings of the Fourth International Conference on Web Information Systems Engineering, WISE 2003. , pages 3–12. IEEE Computer Society, 2003.
  33. Scott Paquettea, Paul T. Jaegerb, and Susan C. Wilsonb. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 37:245253, 2010.
  34. S. Pearson and A. Benameur. Privacy, security and trust issues arising from cloud computing. In IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pages 693 –702, 2010.
  35. R. Perrey and M. Lycett. Service-oriented architecture. In Proceedings. 2003 Symposium on Applications and the InternetWorkshops, pages 116–119. IEEE Computer Society, 2003.
  36. Rohit Ranchal, Bharat Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong Kang, and Mark Linderman. Protection of identity information in cloud computing without trusted third party. In IEEE Symposium on Reliable Distributed Systems,, SRDS, pages 368–372, 2010.
  37. Bhaskar Prasad Rimal, Admela Jukan, Dimitrios Katsaros, and Yves Goeleven. Architectural requirements for cloud computing systems: An enterprise cloud approach. Grid Computing, 9:3–26, 2011.
  38. Anbang Ruan and Andrew Martin. Repcloud: achieving fine-grained cloud tcb attestation with reputation systems. In Proceedings of the sixth ACM workshop on Scalable trusted computing, STC '11, page 3:14. ACM Digital Library, 2011.
  39. Kazue Sako. Digital signature schemes. In Encyclopedia of Cryptography and Security (2nd Ed. ), pages 343–344. Springer, 2011.
  40. H. Sato, A. Kanai, and S. Tanimoto. A cloud trust model in a security aware cloud. In 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT), pages 121 –124, 2010.
  41. Khalid Sayood. Lossless Compression Handbook, chapter 5, page 101152. Academic Press, 2004.
  42. S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34:1–11, 2011.
  43. Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6):24–31, 2010.
  44. WILLIAM VOORSLUYS, JAMES BROBERG, and RAJKUMAR BUYYA. introduction to cloud computing. In Cloud Computing: Principles and Paradigms, chapter 1, page 144. Wiley Press, 2011.
  45. Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou. Privacy-preserving public auditing for data storage security in cloud computing. In IEEE INFOCOM, page 1:9, 2010.
  46. Yu Yonghong. Privacy protection in secure database service. In International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE Computer Society, 2010.
  47. Nour Zawawi, Rania El-Gohary, Mohamed Hamdy, and Mohamed F. Tolba. A novel watermarking approach for data integrity and non-repudiation in rational databases. In First International Conference on Advanced Machine Learning Technologies and Applications (AMLTA12), 2012.
  48. Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, and Aoying Zhou;. Security and privacy in cloud computing: A survey. In Sixth International Conference on Semantics Knowledge and Grid, SKG. IEEE Computer Society, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing middleware services establishing trust in Clouds privacy trustworthy computing security