Provided by: International Journal of Scientific and Research Publication (IJSRP)
Date Added: Apr 2014
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody's laptop). The authors propose data allocation strategies that improve the probability of identifying leakages. In Image and video they can apply watermarking for detecting guilty agent. All the data will be stored on the cloud so reliable re-encryption in unreliable clouds technique is used. In this data owner store encrypted data in the cloud and issue decryption keys to authorized users.