{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:40:10Z","timestamp":1748814010451,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811004476"},{"type":"electronic","value":"9789811004483"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0448-3_20","type":"book-chapter","created":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T03:34:03Z","timestamp":1458358443000},"page":"247-259","source":"Crossref","is-referenced-by-count":14,"title":["Data Storage Security in Cloud Paradigm"],"prefix":"10.1007","author":[{"family":"Prachi Deshpande","sequence":"first","affiliation":[]},{"given":"S. C.","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Sateesh K.","family":"Peddoju","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"key":"20_CR1","unstructured":"Brown, E.: NIST issues cloud computing guidelines for managing security and privacy. National Institute of Standards and Technology Special Publication 800-144 (2012)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Vouk, M.: Cloud computing\u2014issues, research and implementations. In: 30th International Conference on Information Technology Interfaces (ITI-08), pp. 31\u201340. Dubrovnik, June 2008","DOI":"10.1109\/ITI.2008.4588381"},{"issue":"4","key":"20_CR3","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/1327512.1327513","volume":"11","author":"Aaron Weiss","year":"2007","unstructured":"Weiss, A.: Computing in the clouds. NetWorker 11(4), 16\u201325 (2007)","journal-title":"netWorker"},{"issue":"2","key":"20_CR4","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s00354-008-0081-5","volume":"28","author":"Lizhe Wang","year":"2010","unstructured":"Wang, L., Laszewski, G., You, A., et al.: Cloud computing: a perspective study. New Gen. Comput. 28(2), 137\u2013146 (2010)","journal-title":"New Generation Computing"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P., Jakobsson, M., et al.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of ACM workshop on Cloud Computing, pp. 85\u201390. Security, Chicago, Nov 2009","DOI":"10.1145\/1655008.1655020"},{"issue":"1","key":"20_CR6","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"Chirag Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42\u201357 (2013)","journal-title":"Journal of Network and Computer Applications"},{"key":"20_CR7","unstructured":"Digimarc. http:\/\/www.digimarc.com"},{"issue":"4","key":"20_CR8","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"C.I. Podilchuk","year":"1998","unstructured":"Podilchuk, C., Zeng, W.: Image-adaptive watermarking using visual models. IEEE J. Sel. Areas Commun. 16, 525\u2013539 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"20_CR9","unstructured":"Podilchuk, C., Delp, E.: Digital watermarking algorithms and its applications. IEEE Signal Proc. Mag. 18(4), 33\u201346 (2001)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Wu, C., Hsieh, W.: Image refining technique using digital watermarking. IEEE Trans. Consumer Elect. 46(1), 1\u20135 (2000)","DOI":"10.1109\/30.826373"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Kwon, O., Kim, Y., Park, R.: A variable block-size dot based watermarking method. IEEE Trans. Consumer Elect. 45(4), 1221\u20131229 (1999)","DOI":"10.1109\/30.809212"},{"issue":"1","key":"20_CR12","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/83.892451","volume":"10","author":"G.C. Langelaar","year":"2001","unstructured":"Langelaar, G., Lagendijk, R.: Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Proc. 10(1), 148\u2013158 (2001)","journal-title":"IEEE Transactions on Image Processing"},{"key":"20_CR13","unstructured":"Huang, J., Yang, C.: Image digital watermarking algorithm using multi-resolution wavelet transform. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, pp. 2977\u201382, 2004"},{"key":"20_CR14","unstructured":"Hsieh, M., Tseng, D., Huang, Y.: Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans. Ind. Elec. 48(5), 875\u2013882 (2001)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Megalingam, R., Nair, M., Srikumar et al.: Performance comparison of novel, robust spatial domain digital image watermarking with the conventional frequency domain watermarking techniques. In: International Conference on Signal Acquisition and Processing (ICSAP-10), pp. 349\u2013353. Bangalore, India, Feb 2010","DOI":"10.1109\/ICSAP.2010.79"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Lancini, R., Mapelli, F., Tubaro, S.: A robust video watermarking technique in the spatial domain. 4th EURASIP-IEEE Region 8 International Symposium on Video\/Image Processing and Multimedia Communications, pp. 251\u2013256, 2002","DOI":"10.1109\/VIPROM.2002.1026664"},{"issue":"3","key":"20_CR17","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"Joseph J.K.\u00d2. Ruanaidh","year":"1998","unstructured":"Ruanaidh, J., Pun, T.: Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Process. 66(3), 303\u2013317 (1998)","journal-title":"Signal Processing"},{"issue":"5","key":"20_CR18","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1109\/TIM.2014.2299371","volume":"63","author":"Mehdi Fallahpour","year":"2014","unstructured":"Fallahpour, M., Shirmohammadi, S., Semsarzadeh, M., Jiying, Z.: Tampering detection in compressed digital video using watermarking. IEEE Trans. Instrum. Meas. 63(5), 1057\u20131072 (2014)","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Keyvanpour, M., Farnoosh, M.: A new encryption method for secure embedding in image watermarking. In: 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE-10), vol. 2, pp. 403\u2013407. Chengdu, Aug 2010","DOI":"10.1109\/ICACTE.2010.5579305"},{"key":"20_CR20","unstructured":"Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. NEC Research Institute, Princeton, NJ, Tech. Rep. 95\u201310, 1995"},{"key":"20_CR21","unstructured":"Armbrust, M., Fox, A., Griffith, R. et al.: Above the Clouds: A Berkeley View of Cloud Computing. University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009"},{"key":"20_CR22","unstructured":"Chappell, D.: Introducing the Azure Service Platform. White paper, Oct 2008"},{"key":"20_CR23","unstructured":"Amazon EC2 and S3. http:\/\/aws.amazon.com\/"},{"key":"20_CR24","unstructured":"Google App Engine. http:\/\/code.google.com\/appengine\/"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: IEEE Fourth International Conference on Internet Multimedia Systems Architecture and Application (IMSAA-10), pp. 1\u20136. Bangalore, India, Dec 2010","DOI":"10.1109\/IMSAA.2010.5729397"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Nourian, A., Maheswaran, M.: Using segmentation for confidentiality aware image storage and retrieval on clouds. In: Communication and Information System Security Symposium (Globecom-12), pp. 758\u2013763. Anaheim, CA (2012)","DOI":"10.1109\/GLOCOM.2012.6503204"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Kester, Q., Nana, L., Pascu, A.: A novel cryptographic encryption technique for securing digital images in the cloud using AES and RGB pixel displacement. European Modeling Symposium, pp. 293\u2013298, 2013","DOI":"10.1109\/EMS.2013.51"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Markandey, A., Moghe, S., Bhute, Y., Honale, S.: An image encryption mechanism for data security in clouds. In: IEEE Global Humanitarian Technology Conference\u2014South Asia Satellite (GHTC-SAS-14), pp. 227\u2013231. Trivandrum, India, Sept 2014","DOI":"10.1109\/GHTC-SAS.2014.6967588"},{"key":"20_CR29","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume-title":"Financial Cryptography and Data Security","author":"Seny Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. Financial Cryptography and Data Security. Lecture Notes in Computer Science, vol. 6054, pp. 136\u2013149 (2010)"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Dai, L., Zhou, Q.: A PKI-based mechanism for secure and efficient access to outsourced data. In: Proceedings of Second International Conference on Networking and Digital Society (ICNDS-10). Wenzhou, vol. 1, pp. 640\u2013643 (2010)","DOI":"10.1109\/ICNDS.2010.5479290"},{"key":"20_CR31","unstructured":"Barjatya, A.: Block matching algorithms for motion estimation. DIP 6620 Spring 2004 Final Project Paper, pp. 1\u20136 (2004)"},{"key":"20_CR32","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BFb0031585","volume-title":"High-Performance Computing and Networking","author":"A. Bruckmann","year":"1997","unstructured":"Bruckmann, A., Hammerle, J., Reichl, M., Uhl, A.: Hybrid fractal\/wavelet image compression in a high performance computing environment. In: High-Performance Computing and Networking, Lecture Notes in Computer Science, vol. 1225, pp. 115\u2013126 (1997)"},{"key":"20_CR33","first-page":"635","volume-title":"Advances in Intelligent Systems and Computing","author":"Prachi Deshpande","year":"2014","unstructured":"Deshpande, P., Sharma, S., Peddoju, S.: Implementation of a private cloud: a case study. In: Advances in Intelligent Systems and Computing, vol. 259, pp. 635\u2013647 (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fifth International Conference on Soft Computing for Problem Solving"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0448-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:17:58Z","timestamp":1748812678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0448-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811004476","9789811004483"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0448-3_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}