2023
DOI: 10.21203/rs.3.rs-3036586/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Preventing Data Leakage in Cloud Servers through Watermarking and Encryption Techniques

Abstract: Due to the increasing utilization of various systems, services, and applications, sharing multimedia data has become a vital component of individuals' daily routines. However, data leakage is a common problem in cloud storage systems, which poses a significant threat to the confidentiality and copyright protection of multimedia information. To address this issue, digital watermarking has been suggested as an effective method for protecting copyright. The recommended approach combines watermarking and Proxy Re-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Since security is the primary concern in cloud computing, some users may find themselves comfortable transmitting information via the cloud. Cloud computing specialists have created certain secret keys for account security and use encryption methods to safeguard cloud servers [2,3,5]. To safeguard the data from threatening attacks, specific encryption techniques might be employed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since security is the primary concern in cloud computing, some users may find themselves comfortable transmitting information via the cloud. Cloud computing specialists have created certain secret keys for account security and use encryption methods to safeguard cloud servers [2,3,5]. To safeguard the data from threatening attacks, specific encryption techniques might be employed.…”
Section: Introductionmentioning
confidence: 99%
“…A shield against security issues that have frequently prevented the cloud from functioning and growing effectively is created by combining these techniques. Data security in the cloud utilizes a sophisticated strategy that combines innovative technology, widely accepted practices, and stringent regulations to safeguard data from unauthorized access, data breaches [5], and other cyber consequences of these challenges. One such cryptographic method combines NTRU Encrypt and AES encryption, resulting in an effective Double Encryption method.…”
Section: Introductionmentioning
confidence: 99%