Open AccessBook
HESSIS: Hybrid Encryption Scheme for Secure Image Sharing in a Cloud Environment
Jaspreet Kaur,Sumit Sharma +1 more
Reads0
Chats0
TLDR
A hybrid algorithm ‘HESSIS’ is proposed to secure data while sharing and Secure hashing algorithm-3, Elliptic Curve and Advanced encryption algorithm are combined to enhance the security.Abstract:
Cloud computing has appeared as a new computing paradigm that offers a great possibility of storing information remotely. Advancements in this new technology have reduced computational cost, the expense for requisition hosting, computation, content delivery, and storage. Cloud has many advantages but has issues or threats also. Alongside that mobile devices are making major changes in the world. Users share their confidential information on an unsecured channel which is vulnerable to attack. Security is fundamental concern over cloud computing and Cryptography is one of the best techniques for protection. The main focus of this research work is to provide the high-level security to data while storing on the cloud. In existing work, security is provided to images but that security is not high level and encryption/ decryption time also increased. In this research work, a hybrid algorithm ‘HESSIS’ is proposed to secure data while sharing. In this proposed scheme Secure hashing algorithm-3, Elliptic Curve and Advanced encryption algorithm are combined to enhance the security. Parameters calculated are index building time, candidate selection time, and accuracy.read more
Citations
More filters
Proceedings ArticleDOI
Integrity based Authentication and Secure Information Transfer Over Cloud for Hospital Management System
TL;DR: The framework joins private and open key cryptography idea for accomplishing the objectives of security (CIA) and the secrecy can be accomplished utilizing symmetric key Blowfish calculation.
Journal ArticleDOI
Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment
Pallavi Vidyadhar Kulkarni,Rajashri Khanai,Dattaprasad A. Torse,Nalini C. Iyer,Gururaj Bindagi +4 more
TL;DR: In this paper , the secure and reliable neural cryptcoding (SARNC) technique was proposed to improve the security of cloud storage by integrating the AES with low-density parity check (LDPC) codes.
Dissertation
Enhancing Password Security Using a Hybrid Approach of SCrypt Hashing and AES Encryption
TL;DR: This research paper focuses on the hybrid combination of a strong memory hard hashing function SCrypt and a memory accelerated Advanced Encryption Standard (AES) algorithm, which can be used to enhance the security of password of online users from brute force attacks.
References
More filters
ReportDOI
The NIST Definition of Cloud Computing
Peter Mell,Timothy Grance +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI
A view of cloud computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Book ChapterDOI
The RC5 encryption algorithm
TL;DR: This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations and a novel feature of RC5 is the heavy use of data-dependent rotations.
Journal ArticleDOI
A survey on cloud computing security
TL;DR: This survey presents a comprehensive overview of the security issues for different factors affecting cloud computing, and encompasses the requirements for better security management and suggests 3-tier security architecture.