{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T21:10:45Z","timestamp":1723237845383},"reference-count":11,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636201","61572452"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users\u2019 permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users\u2019 worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system\u2019s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.<\/jats:p>","DOI":"10.1155\/2017\/4376282","type":"journal-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T23:30:53Z","timestamp":1513035053000},"page":"1-14","source":"Crossref","is-referenced-by-count":5,"title":["A Cloud-User Protocol Based on Ciphertext Watermarking Technology"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9680-0875","authenticated-orcid":true,"given":"Keyang","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of China, Anhui, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5576-6108","authenticated-orcid":true,"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of China, Anhui, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1890-7236","authenticated-orcid":true,"given":"Xiaojuan","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of China, Anhui, China"}]}],"member":"98","reference":[{"key":"4","year":"2017"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2590944"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.49"},{"issue":"11","key":"10","first-page":"169","volume":"4","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS160210018L"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2012.2228342"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/83.913598"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.837553"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2015.12.005"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4376282.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4376282.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4376282.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T23:31:00Z","timestamp":1513035060000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/4376282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":11,"alternative-id":["4376282","4376282"],"URL":"https:\/\/doi.org\/10.1155\/2017\/4376282","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}