A novel watermarking method for software protection in the cloud

  • Yu Z
  • Wang C
  • Thomborson C
 et al. 
  • 2


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


With the rapid development of cloud computing, software applications are shifting onto cloud storage rather than remaining within local networks. Software distributions within the cloud are subject to security breaches, privacy abuses, and access control violations. In this paper, we identify an insider threat to access control which is not completely eliminated by the usual techniques of encryption, cryptographic hashes, and access-control labels. We address this threat using software watermarking. We evaluate our access-control scheme within the context of a Collaboration-oriented Architecture, as defined by The Jericho Forum. 2011 John Wiley & Sons, Ltd.

Author-supplied keywords

  • cloud computing
  • software protection
  • watermarking

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • Z Yu

  • C Wang

  • C Thomborson

  • J Wang

  • S Lian

  • A V Vasilakos

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free