Table of Content

Open Access

ARTICLE

Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing

Zhen Yang1,2, Yongfeng Huang1,2,*, Xing Li1,2, Wenyu Wang3
Department of Electronic Engineering, Tsinghua University, Beijing, 100084, China.
Tsinghua National Laboratory for Information Science and Technology, Beijing, 100084, China.
Information Networking Institute, Carnegie Mellon University, Pittsburgh, PA, 15213, USA .
* Corresponding Author: Yongfeng Huang. Email: .

Computers, Materials & Continua 2018, 56(1), 1-17. https://doi.org/ 10.3970/cmc.2018.03697

Abstract

To cope with privacy leakage caused by multimedia outsourcing and sharing, data provenance is used to analyze leaked multimedia and provide reactive accountability. Existing schemes of multimedia provenance are based on watermarking protocols. In an outsourcing scenario, existing schemes face two severe challenges: 1) when data leakage occurs, there exists a probability that data provenance results can be repudiated, in which case data provenance tracking fails; and 2) when outsourced data are shared, data encryption transfer causes key management burden outside the schemes, and privacy leakage threatens users. In this paper, we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol, which integrates an asymmetric watermarking protocol, robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance. We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management. Our scheme is also lightweight and easy to deploy. Extensive security and performance analysis compares our scheme with the state of the art. The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing, sharing and provenance.

Keywords

Data provenance, asymmetric fingerprint protocol, digital watermarking, multimedia outsourcing.

Cite This Article

Z. . Yang, Y. . Huang, X. . Li and W. . Wang, "Efficient secure data provenance scheme in multimedia outsourcing and sharing," Computers, Materials & Continua, vol. 56, no.1, pp. 1–17, 2018.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1165

    View

  • 696

    Download

  • 0

    Like

Share Link

WeChat scan