Shantanu Pal

Learn More
Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, we survey the current state-of-the-art and we classify them(More)
In order to determine the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. One of the most important concerns is to protect user's sensitive information from other users and hackers that(More)
With the tremendous growth of mobile devices, e.g, smartphones, tablets and PDAs in recent years, people are looking for more advanced platforms in order to use their computational applications (e.g., processing and storage) in a faster and more convenient way. In addition, mobile devices are capable of using cloud-based applications and the use of such(More)
Cloud-computing applications are fast replacing traditional mobile and desktop applications such as e-mail, document editing, or photo storage. Such applications may require ubiquitous network access that is not always available, e.g., in remote areas without infrastructure, but also in areas with infrastructure where the costs of access are too high for(More)
  • 1