A novel watermarking method for software protection in the cloud

With the rapid development of cloud computing, software applications are shifting onto cloud storage rather than remaining within local networks. Software distributions within the cloud are subject to security breaches, privacy abuses, and access control violations. In this paper, we identify an insider threat to access control which is not completely eliminated by the usual techniques of encryption, cryptographic hashes, and access‐control labels. We address this threat using software watermarking. We evaluate our access‐control scheme within the context of a Collaboration‐oriented Architecture, as defined by The Jericho Forum. Copyright © 2011 John Wiley & Sons, Ltd.

[1]  Christian S. Collberg,et al.  Software watermarking via opaque predicates: Implementation, analysis, and attacks , 2006, Electron. Commer. Res..

[2]  Clark Thomborson,et al.  A Security Model for VoIP Steganography , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[3]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[4]  Thomas C. Rindfleisch,et al.  Privacy, information technology, and health care , 1997, CACM.

[5]  Christian S. Collberg,et al.  Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.

[6]  Genevieve Arboit,et al.  A Method for Watermarking Java Programs via Opaque Predicates , 2002 .

[7]  Clark D. Thomborson,et al.  A Framework for System Security , 2010, Handbook of Information and Communication Security.

[8]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[9]  Kai Hwang,et al.  Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[10]  John Mylopoulos,et al.  Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[11]  Noboru Sonehara,et al.  Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[12]  Yan Zhang,et al.  Handbook of Research on Secure Multimedia Distribution , 2009 .

[13]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[14]  Fei-Yue Wang,et al.  A Survey of Software Watermarking , 2005, ISI.

[15]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[16]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[17]  Christian S. Collberg,et al.  Software watermarking: models and dynamic embeddings , 1999, POPL '99.

[18]  William Zhu,et al.  Recognition in software watermarking , 2006, MCPS '06.