Abstract

The term data is new oil which has become a proverb due to large amount of data generation from various sources. Processing and storing such tremendous amount of data is beyond the capabilities of traditional computing system. Cloud computing preferably considered next-generation architecture due to dynamic resource pools, low cost, reliability, virtualization, and high availability. In cloud computing, one important issue is to track and record the origin of data objects which is known as data provenance. Major challenges to provenance management in distributed environment are privacy and security. This paper presents data provenance management for cloud computing using watermarking technique. The experiment is performed by using both visible and hidden watermarks on shared data objects stored in cloud computing environment. The experimental results demonstrate the efficiency and reliability of proposed technique.

Highlights

  • During the last 20 years, continuous development in web technology has produced a huge collection of data

  • This approach is used to answer the following questions related to data security in cloud computing: What is the original source of data object? Who is the owner of data object? How much reliable is the original source? Who modified the data object? the efficiency and reliability of proposed technique is measured

  • A watermarking technique is proposed which stores the information about the origin of data product

Read more

Summary

INTRODUCTION

During the last 20 years, continuous development in web technology has produced a huge collection of data. According to Gartner’s 2011 CIO Agenda Survey, most of organizations will depend on the cloud computing more than half of their IT Services before 2020 This prototype shifting reduced the costs to manage the software and hardware resources. The term data provenance is defined as the original source of shared data objects. A watermarking technique is used to store provenance information of shared data objects in cloud computing. The experiment is performed by implementing the presented watermarking technique in an open source platform known as ownCloud [3] This approach is used to answer the following questions related to data security in cloud computing: What is the original source of data object?

RELATED WORK
CLOUD COMPUTING
DATA PROVENANCE
METHODOLOGY
AND DISCUSSION
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call