Increasing Data Secrecy In Cloud By Implementing Image Cryptography
[Full Text]
AUTHOR(S)
Prathamesh Vijay Lahande, Dr. Parag Ravikant Kaveri
KEYWORDS
ASCII; Cipher-Image; Cipher-Text; Cloud; Cryptography; Data Integrity; Decryption; Encryption; Pixel.
ABSTRACT
Cloud provides an easy platform for users for the purpose of accessing and storing data from anywhere using the internet. Hence in spite the data being private, sensitive as well as confidential, the user decides to reside the data using the cloud by trusting the cloud. But, the privacy of this data resting on the cloud often gets compromised due to various issues, leading towards the security breach of the cloud and affecting the integrity of the data. This research paper contributes a methodology of encryption and decryption for securing the data on cloud. Traditionally, encryption process generates a cipher-text from a private text using a key, but the methodology proposed generates a cipher image from private text. Using this proposed methodology, the user can store any kind of data on the cloud without worrying about its breach or its integrity being affected.
REFERENCES
[1] Prerna, Parul Agrawal, “Cryptography Based Security for Cloud Computing Systemâ€, International Journal of Advanced Research in Computer Science, Volume 8, No. 5, May-June 2017, ISSN No. 0976-5697.
[2] Rachna Arora, Anshu Parashar, “Secure User Data in Cloud Computing Using Encryption Algorithmsâ€, International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926, ISSN: 2248-9622.
[3] Arjun Kumar, Byung Gook Lee, HoonJae Lee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computingâ€.
[4] Gunavathy.S, Dr.Meena.C, “A survey: data security in cloud using cryptography and steganographyâ€, International Research Journal of Engineering and Technology (IRJET), May 2019, e-ISSN: 2395-0056, p-ISSN: 2395-0072.
[5] May Hattim, “An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithmsâ€, March 2017.
[6] Harshad R. Pawar, Dr. Dinesh G. Harkut, “Classical and Quantum Cryptography for Image Encryption & Decryptionâ€.
[7] Kim-Kwang Raymond Choo, Josep Domingo-Ferrer, Lei Zhang, “Cloud Cryptography: Theory, Practice and Future Research Directionsâ€.
[8] Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit, “Cloud Security Issuesâ€, 2009 IEEE International Conference on Services Computing.
[9] S.V.N.Srivalli, Ben SwarupMedikonda, “Development of a Cloud-based Secure Text File Application using Hybrid Cryptography and Steganographyâ€, International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Volume-8, Issue-1, May 2019.
[10] Elizabeth Chang, “Disguising Text Cryptography using Image Cryptographyâ€, January 2004.
[11] Shilpi Harnal, R.K. Chauhan, “Hybrid Cryptography based E2EE for Integrity & Confidentiality in Multimedia Cloud Computingâ€, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-10, August 2019.
[12] Sandeep Bhowmik, Sriyankar Acharyya, “Image Cryptography: The Genetic Algorithm Approachâ€.
[13] Sara Tedmori, Nijad Al-Najdawi, “Lossless Image Cryptography Algorithm Based on Discrete Cosine Transformâ€, International Arab Journal of Information Technology • September 2012.
[14] Zhan Qin, Jian Weng, Yong Cui, Kui Ren, “Privacy-preserving Image Processing in the Cloudâ€.
[15] Rongzhi Wang, “Research on data security technology based on cloud storageâ€.
[16] Punam V. Maitri, Aruna Verma, “Secure File storage in Cloud Computing using Hybrid Cryptography Algorithmâ€, IEEE WiSPNET 2016 conference.
[17] K. Brindha, N. Jeyanthi, “Secured Document Sharing Using Visual Cryptography in Cloud Data Storageâ€, ISSN: 1311-9702, 2015.
[18] Brindha Krishnamurthy, Jeyanthi Nagamalai, “Securing Cloud Data using Visual Cryptographyâ€, February 2015.
[19] Bernd GroBauer, ToBias Walloschek, and elmar sTöcker, “Understanding Cloud Computing Vulnerabilitiesâ€.
[20] Eng. Hashem H. Ramadan, Moussa Adamou Djamilou, “Using Cryptography Algorithms to Secure Cloud Computing Data and Servicesâ€, American Journal of Engineering Research (AJER), 13th October 2017, e-ISSN: 2320-0847 p-ISSN: 2320-0936 Volume-6, Issue-10, pp-334-337.
[21] Manish M. Potey, C A Dhote, Deepak H. Sharma, “Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Surveyâ€, International Journal of Computer Applications (0975 – 8887) Volume 67– No.3, April 2013
[22] https://en.wikipedia.org/wiki/Image
[23] Keijo Ruohonen, “Mathematical Cryptologyâ€, 2014.
|