Defending against phishing attacks in cloud computing using digital watermarking
Abstract
Cloud computing is an important aspect for cloud security using digital watermarking. Digital watermarking is a technique used to embed information into digital content such as images, audio, or video, for various purposes including copyright protection, authentication, and tamper detection. While digital watermarking itself is not a direct solution for cloud security, it can be used as a component of a broader security strategy. Conveying information concentrated work processes in the cloud carries new factors to be considered during detail and planning. The cloud planning work process under asset distribution is essentially difficult because of the computational power of the work process, the reliance among assignments, and the heterogeneity of cloud assets. Phishing is a sort of friendly designing attack routinely used to take individual information, alongside login qualifications and FICO rating card numbers. Acknowledge potential challenges associated with the implementation of digital watermarking in the cloud, such as algorithm strength, scalability, and evolving security threats. Emphasize the importance of regular updates and assessments to maintain the effectiveness of watermarking techniques. The proposed ODWS Algorithm (Optimized digital watermarking Security system) performs higher in compression to the previously developed based algorithms for securing the cloud services. Watermarking can be integrated with encryption key management systems. Watermarks may contain information about the encryption keys used to protect the data. This can add an extra layer of security, as unauthorized access attempts without the correct keys would be evident through the absence of incorrect watermark information. The need for encryption for cloud services using the internet. It’s important to note that while digital watermarking can enhance security, it should be used in conjunction with other security measures such as encryption, access controls, and regular security audits. Additionally, the effectiveness of digital watermarking depends on the specific implementation and the strength of the watermarking algorithm used. Regular updates and assessments of the watermarking technique are essential to adapt to evolving security threats.
Keywords
Full Text:
PDFReferences
1. Syed E. Final Report of Digital Watermarking. University of Texas at Arlington; 2011.
2. Zhou Y, Jin W. A novel image zero-watermarking scheme based on DWT-SVD. 2011 International Conference on Multimedia Technology. Published online July 2011. doi: 10.1109/icmt.2011.6002066
3. Sweeti NM. Similarity Based Technique and Text document classification. International Journal of Advance Engineering Research and Technology (IJAERT). 2016, 4(2): 23-30.
4. Tiwari A, Sharma RM. Potent Cloud Services Utilization with Efficient Revised Rough Set Optimization Service Parameters. Proceedings of the International Conference on Advances in Information Communication Technology & Computing - AICTC ’16. Published online 2016. doi: 10.1145/2979779.2979869
5. Sun T, Shao X, Wang X. A Novel Binary Image Digital Watermarking Algorithm Based on DWT and Chaotic Encryption. Young Computer Scientists; 2008.
6. Franklin RV, Manekandan GRS, Santhi V. Entropy based Robust Watermarking Scheme using Hadamard Transformation Technique. International Journal of Computer Applications; 2011.
7. Ramanjaneyulu1 K, Rajarajeswari K. An Oblivious and Robust Multiple Image Watermarking Scheme Using Genetic Algorithm. The International journal of Multimedia & Its Applications. 2010, 2(3): 19-38. doi: 10.5121/ijma.2010.2302
8. Yan Y, Rong H, Mintao X. A Novel Audio Watermarking Algorithm for Copyright Protection Based on DCT Domain. 2009 Second International Symposium on Electronic Commerce and Security. Published online 2009. doi: 10.1109/isecs.2009.141
9. Tiwari A, Sharma V, Mahrishi M. Service Adaptive Broking Mechanism Using MROSP Algorithm. Smart Innovation, Systems and Technologies. Published online 2014: 383-391. doi: 10.1007/978-3-319-07350-7_43
10. Chen L, Li M. An effective blind watermark algorithm based on DCT. 2008 7th World Congress on Intelligent Control and Automation. Published online 2008. doi: 10.1109/wcica.2008.4593967
11. Ameya KN, Raghunath SH. A Blind DCT Domain Digital Watermarking for Biometric Authentication. Intelligent Control and Automation. International Journal of Computer Applications. 2010.
12. Kim J, Won S, Zeng W, Park S. Copyright protection of vector map using digital watermarking in the spatial domain. In: Proceedings of the 2011 7th International Conference Digital Content, Multimedia Technology and its Applications (IDCTA).
13. Taherinia AH, Jamzad M. A new adaptive watermarking attack in wavelet domain. 2009 International Multimedia, Signal Processing and Communication Technologies. Published online March 2009. doi: 10.1109/mspct.2009.5164240
14. Bennour J, Dugelay JL, Matta F. Watermarking attack: BOWS contest. Security, Steganography, and Watermarking of Multimedia Contents IX. Published online February 26, 2007. doi: 10.1117/12.705561
15. Singh S, Chana I. A Survey on Resource Scheduling in Cloud Computing: Issues and Challenges. Journal of Grid Computing. 2016, 14(2): 217-264. doi: 10.1007/s10723-015-9359-2
16. Chang V, Wills G. A model to compare cloud and non-cloud storage of Big Data. Future Generation Computer Systems. 2016, 57: 56-76. doi: 10.1016/j.future.2015.10.003
17. Doja MN, Kumar N. Image authentication schemes against keylogger spyware. In: Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Arti_cial Intelligence, Networking, and Parallel/Distributed Computing.
18. Tiwari A, Garg R. Orrs Orchestration of a Resource Reservation System Using Fuzzy Theory in High-Performance Computing. International Journal of Software Innovation. 2022, 10(1): 1-28. doi: 10.4018/ijsi.297923
19. Tiwari A, Garg R. Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems. International Journal on Semantic Web and Information Systems. 2022, 18(1): 1-18. doi: 10.4018/ijswis.306260
20. Tiwari A, Garg R. A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology. International Journal of Security and Privacy in Pervasive Computing. 2022, 14(1): 1-21. doi: 10.4018/ijsppc.313048
21. Tiwari A, Garg R. Reservation System for Cloud Computing Resources (RSCC). International Journal of Cloud Applications and Computing. 2022, 12(1): 1-22. doi: 10.4018/ijcac.311502
22. Tiwari A, Sharma RM. A Skywatch on the Challenging Gradual Progression of Scheduling in Cloud Computing. Applications of Computing, Automation and Wireless Systems in Electrical Engineering. Published online 2019: 531-541. doi: 10.1007/978-981-13-6772-4_46
23. Kumar Sharma A, Tiwari A, Bohra B, Khan S. A Vision towards Optimization of Ontological Datacenters Computing World. International Journal of Information Systems & Management Science. 2018, 1(2).
24. Tiwari A, Sharma RM. Rendering Form Ontology Methodology for IoT Services in Cloud Computing. International Journal of Advanced Studies of Scientific Research. 2018, 3(11).
25. Rangaiah YV, Sharma AK, Bhargavi T, et al. A Taxonomy towards Blockchain based Multimedia content Security. 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT). Published online December 23, 2022. doi: 10.1109/cisct55310.2022.10046548
26. Rohinidevi VV, Srivastava PK, Dubey N, et al. A Taxonomy towards fog computing Resource Allocation. 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT). Published online December 23, 2022. doi: 10.1109/cisct55310.2022.10046643
27. Singh NK, Jain A, Arya S, et al. Attack Detection Taxonomy System in cloud services. In: Proceedings of the 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT).
28. Chouhan A, Tiwari A, Diwaker C, et al. Efficient Opportunities and Boundaries towards Internet of Things (IoT) Cost Adaptive Model. 2022 IEEE Delhi Section Conference (DELCON). Published online February 11, 2022. doi: 10.1109/delcon54057.2022.9753057
29. Theofanos MF, Pfleeger SL. Guest Editors’ Introduction: Shouldn’t All Security Be Usable? IEEE Security & Privacy Magazine. 2011, 9(2): 12-17. doi: 10.1109/msp.2011.30
30. Wiedenbeck S, Waters J, Birget JC, et al. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies. 2005, 63(1-2): 102-127. doi: 10.1016/j.ijhcs.2005.04.010
31. Jain AK, Gupta BB. A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Information Systems. 2021, 16(4): 527-565. doi: 10.1080/17517575.2021.1896786
32. Yu C, Li J, Li X, et al. Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia Tools and Applications. 2017, 77(4): 4585-4608. doi: 10.1007/s11042-017-4637-6
DOI: https://doi.org/10.32629/jai.v7i5.1061
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Sasidhar Attuluri, Mona Ramesh, Raja Rao Budaraju, Sumit Kumar, Jhum Swain, Jitendra Kurmi, Bhupati
License URL: https://creativecommons.org/licenses/by-nc/4.0/