Secure Picture Data Partitioning for Cloud Computing Services

被引:13
|
作者
Leistikow, Rene [1 ]
Tavangarian, Djamshid [1 ]
机构
[1] Univ Rostock, Res Grp Comp Architecture, D-18055 Rostock, Germany
关键词
PRIVACY;
D O I
10.1109/WAINA.2013.157
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, the usage of Cloud Computing services has grown tremendously. Especially the vast number of services for managing, saving and organizing digital pictures like Dropbox, Picasa, or Flickr achieved a widespread popularity. However, there are some serious issues concerning data security and privacy. Firstly, the user has to trust the data management processes of the Cloud provider because of the loss of control over submitted data. Secondly, the Cloud provider must provide appropriate methods to ensure data security and privacy even in cases of security breaches or hardware failures. Moreover, the user-transparency of these methods is essential to strengthen trust between user and provider. In order to improve trust and data security with regard to picture data in Cloud Computing, we present a novel secure partitioning method based on data separation by using facial recognition and stripping algorithms.
引用
收藏
页码:668 / 671
页数:4
相关论文
共 50 条
  • [1] Trusted secure model for data services in cloud computing
    [J]. Xu, Zheng-Quan, 1600, Editorial Board of Journal on Communications (35):
  • [2] SECO: Secure and scalable data collaboration services in cloud computing
    Dong, Xin
    Yu, Jiadi
    Zhu, Yanmin
    Chen, Yingying
    Luo, Yuan
    Li, Minglu
    [J]. COMPUTERS & SECURITY, 2015, 50 : 91 - 105
  • [3] Blockchain as a Platform for Secure Cloud Computing Services
    Tsai, Wang-You
    Chou, Tzu-Chuan
    Chen, Jiann-Liang
    Ma, Yi-Wei
    Huang, Chen-Jui
    [J]. 2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 155 - 158
  • [4] Secure storage of data in cloud computing
    20150500466883
    [J]. (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [5] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [6] A secure re-encryption scheme for data services in a cloud computing environment
    Xiong, Lizhi
    Xu, Zhengquan
    Xu, Yanyan
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4573 - 4585
  • [7] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [8] Secure cloud computing for genomic data
    Datta, Somalee
    Bettinger, Keith
    Snyder, Michael
    [J]. NATURE BIOTECHNOLOGY, 2016, 34 (06) : 588 - 591
  • [9] Secure cloud computing for genomic data
    Somalee Datta
    Keith Bettinger
    Michael Snyder
    [J]. Nature Biotechnology, 2016, 34 : 588 - 591
  • [10] Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing
    Dhanya, N. M.
    Kousalya, G.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 45 - 53