logo

Application and Effectiveness of Watermarking Technique in Cloud Computing

   

Added on  2023-01-19

25 Pages9644 Words87 Views
DISSERTATION
(Application and effectiveness of watermarking technique in cloud computing to
enhance cloud data security)

TABLE OF CONTENTS
CHAPTER 1: INTRODUCTION ...................................................................................................1
Background..................................................................................................................................1
Aim and Objectives......................................................................................................................2
Rationale......................................................................................................................................3
Significance..................................................................................................................................3
Research specification.................................................................................................................4
Gantt Chart...................................................................................................................................4
CHAPTER 2 : LITERATURE REVIEW .......................................................................................5
2.1 Cloud computing framework ................................................................................................5
2.2 Watermarking techniques and its benefits for business ........................................................8
2.3 Security and data privacy issues related to cloud computing .............................................12
CHAPTER 3: RESEARCH METHODOLOGY...........................................................................16
Chapter 4 , RESULTS ,SYNTHESIS............................................................................................26
2.1 Cloud computing framework...............................................................................................26
2.2 Watermarking techniques and its benefits for business.......................................................29
2.3 Security and data privacy issues related to cloud computing..............................................31
FINDINGS AND RESULT...........................................................................................................33
CONCLUSION..............................................................................................................................36
RECOMMEDNDATION..............................................................................................................37
REFERENCES..............................................................................................................................38

CHAPTER 1: INTRODUCTION
Background
Cloud computing refers to the software technology used for providing the services over the
internet which can be used for the further use of the technology which can be used to provide
information. It includes servers, storage, database, networking, software, analytics and
intelligence which are used to provide a faster innovation in the things which can change over
within a shorter span of time, flexibility of resources is generated which involves the use of
flexible resources which can change over time. Cloud is built to aim the service which are made
to minimise the negative effect of the internet use this is build for the innovation like you pay for
what you use there is a limited services offered and the exact information can be evaluated out.
The cloud computing is the hardware and software which uses for providing the services
over internet. It is used to store and access data on internet from any device, which is able to use
internet. It is safe and secure to store data over cloud computing (A SURVEY ON
WATERMARKING METHODS FOR SECURITY OF CLOUD DATA, 2016). There are lot of
examples of cloud computing like Google's Gmail, Facebook, etc. because anybody can access
the data via login. As it provides more data storage, improved performance, low maintenance
needed, increased capacity to store data, increased data security, backup and recovery of data is
easy. Now come to the new way to make more securely storage of the data and files on the
cloud computing. The Watermarking technique is very effective and easier to secure the data on
the cloud. Because data security is main issue nowadays, the data can be copied, altered, or
transmitted easily. So using Watermarking technique on storing the data is useful and data can be
protected. Digital watermarking technique protects the digital data, like text, images, audio,
video. Digital Watermarking technique is developed from the steganography (To Propose A
Novel Technique for Watermarking In Cloud Computing, 2015). It includes the embedding of the
information or digital watermark with the files, and the data contains the watermark with the raw
file and then it is stored then it generates a digital watermarked file. Digital Watermarking
Technique has many advantages using to improve data security on the cloud computing, such as
it provides the copyright protection, the important information which has copyright can be
embedded as watermark into production, if any issue is raised on the copyright, then the
watermark can be the evidence from the owner's behalf (A Cloud-Based Watermarking Method
for Health Data and Image Security, 2014).
1

Authentication is provided, when any image or content is stored and the attacker tries to
hack the data but would be unsuccessful because the use of the digital signature would provide
the security to the content so that no modification will be done on the data, it demands for the
authentication and it is highly secured. The watermarking technique provides the imperceptibility
which means the invisibility , suppose the image contains the watermark but the person can't
identify the watermark, and it looks like the original image and the unauthorized person can't
access the image (An Efficient Approach for Security of Cloud Using Watermarking Technique,
2013). Its is very secure from the point of data security because it keeps the watermark private up
to the user only. Nobody else can identify the watermark of other and unable to retrieve any file
from the cloud computing.
Aim and Objectives
Aim
“To describe application and effectiveness of watermarking technique in cloud
computing to enhance cloud data security”
Objectives
To understand conceptual framework of cloud computing
To describe concept of watermarking technique and its benefits for business
To investigate issues related to cloud computing and data security
Problem statement:
This study needs to evaluate the need of the effectiveness of the watermarking techniques used to
evaluate the effects which can be use to minimise the factors which can be used to evaluate the
cloud computing strategies which can be used to generate data related to the watermark.
Watermark is not so secured and there are chances of data theft as anyone can access the data by
recovery generation which can be easily changed with the measurative steps followed easy
modifications of the issues are the major problem related to cloud computing. There are many
cases which can be heard about the outsourcing the data which can be outsourced in return of
money. Data accessed to cloud can be used by the host company which can be a threat to users.
how the conceptual framework of cloud computing can be understood?
Describe the concept of watermark techniques and its benefits for business?
How can issues related to cloud computing and data security can be evaluated?
2

Statement of Purpose:
'This aims to describe the applications and effectiveness of the watermarking techniques in cloud
computing to enhance cloud data security.'
the study carried out reflects on the description of the applications and effectiveness carried out
on the basis of the study carried out which can be used to evaluate the data which are done to aim
the security and services of the cloud computing. The ways of evaluation of the work is carried
out which needs to be evaluated according to the need, this study provides the effectiveness of
the watermarking its benefits and use in cloud computing.
Rationale
The major reason of selecting topic of application and effectiveness of watermarking
technique in cloud computing to enhance cloud data security is the interest topic and researcher
has studied computer science hence this is essential topic and very vast. That is why individual
has selected this topic for the research. In addition, Scholar has worked in past on cloud
computing elements has individual has proper knowledge about it. Scholar is well aware with the
data security issues hence this is being taken into consideration for the present investigations
(Kumar and Gupta, 2018).
Significance
This is very important topic because by gathering information about effectiveness of
watermarking technique companies will be able to control over issue of data security. Apart from
this, investigation will give positive results to other scholar because they will get study material
which can be used by them in future researches (Rhazlane and et.al., 2017). For the business
there are limited sources which needs to be carried out which aims to lower the running cost. It
reflects the use of the cloud computing with the reflection of its benefits of cloud computing
which can be done with the aim to develop the purpose of this research which can be evaluated.
This study will focus on the methods of security system used for the protection of cloud data and
the fundamental ways to evaluate out the security methods. Various methods for watermarking
of the cloud computing is carried out in this study digital watermarking facility has used for the
development and safety of the cloud computing which can be used to improve the data security
and safety of the data. Watermarking is evaluated to improve the data security services on cloud.
It will be important for the researchers to evaluate the security services offered on cloud
3

computing and the security offered by the watermarking to carry out his further research this can
be used by many organizations which work on the cloud computing data for the security and
safety of the data generated this research will be beneficial for the small business to make them
aware for the development and data security.
Research specification
Scholar will use interpretivism philosophy for conducting investigation on application
and effectiveness of watermarking technique in cloud computing to enhance cloud data security.
Researcher will gather all the detail related to watermarking technique from secondary sources
and will analyses data by using books, journals and other essential articles related to
watermarking. In addition to this, individual will take care of ethical aspects and will conduct
entire investigation within by following ethical guild lines properly (Uma and Sumathi, 2017).
Researcher will ensure that details are being used in the investigation in adequate manner hence
theories will be taken into consideration. Inductive approach will be followed to answer the
research questions related to effectiveness of water marking technique in data security.
Gantt Chart
W1 W2 W3 W4 W5 W6 W7 W8
Selection of
research topic
Using previous
literatures and
review these data
Selection of
appropriate
research method
Data collection
from secondary
sources such as
books, journals etc.
Analyses of data to
answer research
question
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Privacy and Security: Threats and Risks to Employee Data
|26
|7380
|354

Integrated Professional Skill in Digital Age | Assignment
|7
|1921
|93

Professional Skills in the Digital Age: Cloud Computing, Security & Privacy, Web Conferencing
|11
|3691
|28

(Solution) Integrated Professional Skills in the Digital Age
|8
|1871
|213

Cloud Based Organizations: A Discussion on Apple iCloud, Amazon Web Services, Google Docs, Windows Azure, and Salesforce.com
|11
|2081
|164

VIRTUALIZATION AND CLOUD COMPUTING 37
|50
|13877
|472