Data Provenance for Cloud Computing using Watermark
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
The term data is new oil which has become a proverb due to large amount of data generation from various sources. Processing and storing such tremendous amount of data is beyond the capabilities of traditional computing system. Cloud computing preferably considered next-generation architecture due to dynamic resource pools, low cost, reliability, virtualization, and high availability. In cloud computing, one important issue is to track and record the origin of data objects which is known as data provenance. Major challenges to provenance management in distributed environment are privacy and security. This paper presents data provenance management for cloud computing using watermarking technique. The experiment is performed by using both visible and hidden watermarks on shared data objects stored in cloud computing environment. The experimental results demonstrate the efficiency and reliability of proposed technique.
Authors and Affiliations
Muhammad Umer Sarwar, Muhammad Kashif Hanif, Ramzan Talib, Bilal Sarwar, Waqar Hussain
Current Trends and Research Challenges in Spectrum-Sensing for Cognitive Radios
The ever increasing demand of wireless communication systems has led to search of suitable spectrum bands for transmission of data. The research in the past has revealed that radio spectrum is under-utilized in most of t...
Growing Cloud Computing Efficiency
Cloud computing is basically altering the expectation for how and when computing, storage and networking assets should be allocated, managed and devoted. End-users are progressively more sensitive in response time...
Robust Modeling and Linearization of MIMO RF Power Amplifiers for 4G and 5G Applications
In this paper, a novel set of orthogonal crossover polynomials for the baseband modelling and linearization of MIMO RF Pas is presented. The proposed solution is applicable to WCDMA and LTE applications. The new modellin...
DoS/DDoS Detection for E-Healthcare in Internet of Things
Internet of Things (IoT) has emerged as a new horizon in communication age. IoT has provided platform to various emerging technologies and applications for growth. E-Health services have also been integrated and greatly...
Emotion Detection in Text using Nested Long Short-Term Memory
Humans have the power to feel different types of emotions because human life is filled with many emotions. Human’s emotion can be reflected through reading or writing a text. In recent years, studies on emotion detection...