{"title":"基于图像变形的云存储服务安全性改进技术验证","authors":"Ryota Hanyu, Kazuki Murakami, Qiangfu Zhao","doi":"10.1109/INDCOMP.2014.7011746","DOIUrl":null,"url":null,"abstract":"Recently, many kinds of cloud computing based services are provided and they are becoming more and more popular. But we think it is an urgent problem to improve the security of cloud services especially for storage services because the number of cyber-attacks is increasing. Currently, our research group proposed an image morphing based technology for improving the security of cloud services. This technology provides a novel way both for encrypting and for hiding secret information. In this paper, we verify and discuss about the vulnerability of the proposed technology, and suggest possible methods for further improvement.","PeriodicalId":246465,"journal":{"name":"2014 IEEE International Symposium on Independent Computing (ISIC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Verification of an image morphing based technology for improving the security in cloud storage services\",\"authors\":\"Ryota Hanyu, Kazuki Murakami, Qiangfu Zhao\",\"doi\":\"10.1109/INDCOMP.2014.7011746\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, many kinds of cloud computing based services are provided and they are becoming more and more popular. But we think it is an urgent problem to improve the security of cloud services especially for storage services because the number of cyber-attacks is increasing. Currently, our research group proposed an image morphing based technology for improving the security of cloud services. This technology provides a novel way both for encrypting and for hiding secret information. In this paper, we verify and discuss about the vulnerability of the proposed technology, and suggest possible methods for further improvement.\",\"PeriodicalId\":246465,\"journal\":{\"name\":\"2014 IEEE International Symposium on Independent Computing (ISIC)\",\"volume\":\"113 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Symposium on Independent Computing (ISIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDCOMP.2014.7011746\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Symposium on Independent Computing (ISIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDCOMP.2014.7011746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Verification of an image morphing based technology for improving the security in cloud storage services
Recently, many kinds of cloud computing based services are provided and they are becoming more and more popular. But we think it is an urgent problem to improve the security of cloud services especially for storage services because the number of cyber-attacks is increasing. Currently, our research group proposed an image morphing based technology for improving the security of cloud services. This technology provides a novel way both for encrypting and for hiding secret information. In this paper, we verify and discuss about the vulnerability of the proposed technology, and suggest possible methods for further improvement.