{"id":"https://openalex.org/W2036390799","doi":"https://doi.org/10.1109/hpcsim.2012.6266986","title":"A cloud-based watermarking method for health data security","display_name":"A cloud-based watermarking method for health data security","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2036390799","doi":"https://doi.org/10.1109/hpcsim.2012.6266986","mag":"2036390799"},"language":"en","primary_location":{"id":"doi:10.1109/hpcsim.2012.6266986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2012.6266986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100546539","display_name":"Zhiwei Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiwei Yu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China","Dept. of Computer Science & Technology, Tsinghua University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Dept. of Computer Science & Technology, Tsinghua University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089209744","display_name":"Clark Thomborson","orcid":"https://orcid.org/0000-0002-4147-7898"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Clark Thomborson","raw_affiliation_strings":["Department of Computer Science, University of Auckland, New Zealand","Department of Computer Science, The University of Auckland, New Zealand#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]},{"raw_affiliation_string":"Department of Computer Science, The University of Auckland, New Zealand#TAB#","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047153705","display_name":"Chaokun Wang","orcid":"https://orcid.org/0000-0002-2986-2574"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaokun Wang","raw_affiliation_strings":["School of Software, Key Laboratory for Information System Security, Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList), Tsinghua University, Beijing, China","School of Software, Tsinghua University, Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology(TNList), Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Key Laboratory for Information System Security, Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"School of Software, Tsinghua University, Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology(TNList), Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373517","display_name":"Jianmin Wang","orcid":"https://orcid.org/0000-0001-6841-7943"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianmin Wang","raw_affiliation_strings":["School of Software, Key Laboratory for Information System Security, Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList), Tsinghua University, Beijing, China","School of Software, Tsinghua University, Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology(TNList), Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Key Laboratory for Information System Security, Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"School of Software, Tsinghua University, Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology(TNList), Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100448564","display_name":"Rui Li","orcid":"https://orcid.org/0000-0002-9071-7544"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Li","raw_affiliation_strings":["School of Software, Key Laboratory for Information System Security, Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList), Tsinghua University, Beijing, China","School of Software, Tsinghua University, Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology(TNList), Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Key Laboratory for Information System Security, Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList), Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"School of Software, Tsinghua University, Key Laboratory for Information System Security, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology(TNList), Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100546539"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.9969,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91423366,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"642","last_page":"647"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8730697631835938},{"id":"https://openalex.org/keywords/cloudlet","display_name":"Cloudlet","score":0.8299973607063293},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7445533275604248},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.6947370767593384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6946810483932495},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5590131282806396},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5310937166213989},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.521557092666626},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.49509182572364807},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4836784303188324},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3238769471645355},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19515064358711243},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09846469759941101},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09238126873970032}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8730697631835938},{"id":"https://openalex.org/C2781055072","wikidata":"https://www.wikidata.org/wiki/Q25325266","display_name":"Cloudlet","level":3,"score":0.8299973607063293},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7445533275604248},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.6947370767593384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6946810483932495},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5590131282806396},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5310937166213989},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.521557092666626},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.49509182572364807},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4836784303188324},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3238769471645355},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19515064358711243},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09846469759941101},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09238126873970032},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcsim.2012.6266986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2012.6266986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1983627106","https://openalex.org/W1990089822","https://openalex.org/W2031611173","https://openalex.org/W2131629857","https://openalex.org/W2147251504","https://openalex.org/W2158518777","https://openalex.org/W2172280491","https://openalex.org/W2541575037","https://openalex.org/W6681800601","https://openalex.org/W6729020231"],"related_works":["https://openalex.org/W2474275862","https://openalex.org/W3082808059","https://openalex.org/W2288076623","https://openalex.org/W3008399534","https://openalex.org/W3175669490","https://openalex.org/W1938897670","https://openalex.org/W4238810876","https://openalex.org/W1813777996","https://openalex.org/W4382999950","https://openalex.org/W2197524490"],"abstract_inverted_index":{"Private":[0],"health":[1,32],"information":[2],"once":[3],"confined":[4],"to":[5,36,69],"local":[6],"medical":[7],"institutions":[8],"is":[9,21,30,34],"migrating":[10],"onto":[11],"the":[12,64,71,85,89,102,105,112],"Internet":[13],"as":[14],"an":[15],"Electronic":[16],"Health":[17],"Record":[18],"(EHR)":[19],"that":[20,96],"accessed":[22],"by":[23,83],"cloud":[24,67],"computing.":[25],"No":[26],"matter":[27],"where":[28],"it":[29],"hosted,":[31],"data":[33],"subject":[35],"security":[37],"breaches,":[38],"privacy":[39],"abuses,":[40],"and":[41,51,78],"access":[42],"control":[43],"violations.":[44],"However,":[45],"novel":[46],"technologies":[47],"have":[48],"new":[49,53],"vulnerabilities,":[50],"allow":[52],"mitigations.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58,91],"propose":[59],"a":[60],"watermarking":[61],"method":[62],"in":[63,88],"architecture":[65],"of":[66,73,101,104,111],"computing,":[68],"mitigate":[70],"risks":[72],"insider":[74],"disclosures.":[75],"Our":[76,93],"design":[77],"preliminary":[79],"implementation":[80],"are":[81],"accomplished":[82],"exploiting":[84],"MapReduce":[86],"mechanism":[87],"cloudlet":[90],"built.":[92],"evaluation":[94],"shows":[95],"our":[97],"proposal":[98],"addresses":[99],"all":[100],"requirements":[103],"Cloud":[106],"Oriented":[107],"Architecture":[108],"(COA)":[109],"framework":[110],"Jericho":[113],"Forum.":[114]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
