Data Provenance for Cloud Computing using Watermark

Abstract

The term data is new oil which has become a proverb due to large amount of data generation from various sources. Processing and storing such tremendous amount of data is beyond the capabilities of traditional computing system. Cloud computing preferably considered next-generation architecture due to dynamic resource pools, low cost, reliability, virtualization, and high availability. In cloud computing, one important issue is to track and record the origin of data objects which is known as data provenance. Major challenges to provenance management in distributed environment are privacy and security. This paper presents data provenance management for cloud computing using watermarking technique. The experiment is performed by using both visible and hidden watermarks on shared data objects stored in cloud computing environment. The experimental results demonstrate the efficiency and reliability of proposed technique.

Authors and Affiliations

Muhammad Umer Sarwar, Muhammad Kashif Hanif, Ramzan Talib, Bilal Sarwar, Waqar Hussain

Keywords

Related Articles

Using Object-Relational Mapping to Create the Distributed Databases in a Hybrid Cloud Infrastructure

One of the challenges currently problems in the use of cloud services is the task of designing of data management systems. This is especially important for hybrid systems in which the data are located in public and priva...

Evaluating Mobile Phones and Web Sites for Academic Information Needs

In the last decade, there has been an exponential growth in use of mobile phones among people. Smart phone invention has digitized life of a common man especially after introduction of 3G/4G technology. People are used t...

Data Exfiltration from Air-Gapped Computers based on ARM CPU

Air-gapped Network is a network isolated from public networks. Several techniques of data exfiltration from air-gapped networks have been recently proposed. Air-gap malware is a malware that breaks the isolation of an ai...

A Serious Game for Healthcare Industry: Information Security Awareness Training Program for Hospital Universiti Kebangsaan Malaysia

This paper aims to develop an information security awareness training program for the healthcare industry to ensure the appropriate protection of electronic health systems. Serious games are primarily designed for traini...

mSCTP Based Decentralized Mobility Framework 

To conceive the full potential of wireless IP services, Mobile Nodes (MNs) must be able to roam seamlessly across different networks. Mobile Stream Control Transmission Protocol (mSCTP) is a transport layer solution, whi...

Download PDF file
  • EP ID EP259918
  • DOI 10.14569/IJACSA.2017.080654
  • Views 86
  • Downloads 0

How To Cite

Muhammad Umer Sarwar, Muhammad Kashif Hanif, Ramzan Talib, Bilal Sarwar, Waqar Hussain (2017). Data Provenance for Cloud Computing using Watermark. International Journal of Advanced Computer Science & Applications, 8(6), 407-411. https://europub.co.uk/articles/-A-259918