Privacy-Aware Reversible Watermarking in Cloud Computing Environments

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy-Aware Profiling for Cloud Computing Environments

Cloud Computing has changed the way in which people use the IT resources today. Now, instead of buying their own IT resources, they can use the services offered by Cloud Computing with reasonable costs based on a “pay-per-use” model. However, with the wide adoption of Cloud Computing, the costs for maintaining the Cloud infrastructure have become a vital issue for the vendors, especially with t...

متن کامل

A Privacy Agent in Context-Aware Ubiquitous Computing Environments

This paper targets personal privacy protection in context-aware ubiquitous computing environments. It proposes a privacy agent technology to help notify people of relevant information disclosure, and to empower them to manage privacy with relative ease. In essence, the development of the privacy agent technology employs privacy terminology and policies specified in Platform for Privacy Preferen...

متن کامل

Privacy of Mobile Users in Context-aware Computing Environments

This thesis provides a solution to address the difficulty of design and development of privacy-sensitive context-aware applications that can be used in peoples " everyday life without the concerns regarding potential abuse. Users would like to be able to control who can access their contextual information, with what granularity, and in which situations. These users " privacy preferences must be...

متن کامل

Location-aware brokering for consumers in multi-cloud computing environments

The variety and complexity in cloud marketplaces is growing, making it difficult for cloud consumers to choose cloud services from multiple providers in an economic and suitable way by taking into account multiple objectives and constraints. In this paper, we present an extension of CloudSim implementing cloud management functionality to enable the assessment of consumer-oriented brokering sche...

متن کامل

Privacy Aware Authentication Scheme for Distributed Mobile Cloud Computing

As mobile users generally access different types of mobile cloud computing services from a variety of service providers, it is extremely tedious for users to register different user accounts on each service provider and maintain corresponding private keys or passwords for authentication usage. In this paper, I propose a encryption method call Attribute encryption method. Cloud computing is a re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2018

ISSN: 2169-3536

DOI: 10.1109/access.2018.2880904