scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Securing cloud data using visual cryptography

K. Brindha1, N. Jeyanthi1
01 Feb 2015-pp 1-5
TL;DR: This paper has proposed the idea how the data could be made more secured using visual cryptographic techniques, which not only increases the trust among the users to send their information with full reliability and also helps in the authorization of the users.
Abstract: Cloud computing model allows the customers to access the secured information from the cloud server without the help of using the hardware or the software. For the effective usage of the data from the cloud provider, the data owner encrypts the data and then its ends to the cloud server. To secure the data in the cloud we have dealt through lots of security issues earlier. In this paper we have proposed the idea how the data could be made more secured using visual cryptographic techniques. This model not only increases the trust among the users to send their information with full reliability and also helps in the authorization of the users.
Citations
More filters
Proceedings ArticleDOI
28 Apr 2021
TL;DR: In this paper, the authors proposed a multilevel cryptography based security system for cloud computing, which is a hybrid approach of symmetric and asymmetric key cryptography algorithms, which increases the data security up to a maximum extant and takes less time in uploading and downloading the text file as compared to existing system.
Abstract: Security in cloud computing is the emerging research issues nowadays. A lot of organization are moving from their traditional data storage to cloud storage, which provides an efficient way to access the data anywhere and anytime. But, the main hitch of organization to use cloud computing is data security. This paper proposed a multilevel cryptography based security system for cloud computing. The model is hybrid approach of symmetric and asymmetric key cryptography algorithms. In this Data Encryption Standard (DES) and RSA are implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user as well as cloud service provider in order to reduce the security threats. The proposed model is implemented in java and cloudsim cloud simulator tool. This model increases the data security up to a maximum extant and it takes less time in uploading and downloading the text file as compare to existing system.

32 citations

Proceedings ArticleDOI
01 Sep 2016
TL;DR: A novel methodology is introduced by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography to address the need for safe and secure transactions.
Abstract: With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need automatically translates to the requirement of increased network security and better and fast encryption algorithms. This paper addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. The complete algorithm was designed and developed using the MATLAB 2011b software. The paper also discusses a hardware approach for deploying the algorithm and elaborates on an area, speed and power efficient design on a Spartan 3E Xilinx FPGA platform.

3 citations


Additional excerpts

  • ...Apart from these applications, visual cryptography can be employed in securing cloud data [17] and increasing image privacy as well [18], [19]....

    [...]

Proceedings ArticleDOI
K. Brindha1, N. Jeyanthi1
22 Mar 2017
TL;DR: A novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT) is proposed.
Abstract: Cloud computing is a new emerging computing paradigm in which any individual or organization can remotely store the information and it also reduces the burden of the cost of its storage and maintenance. Even though the cloud provides tangible merits to cloud users, it suffers from various security flaws. Due to these grave concerns, data confidentiality and integrity has become a challenging task not only for the data owners but also to the trusted service providers. To overcome this problem, this article proposes a novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT).

3 citations


Cites background from "Securing cloud data using visual cr..."

  • ...It commonly satisfies the properties of general field and it performs two operations such as addition and multiplication and each non- zero element has multiplicative inverse [31-32]....

    [...]

Book ChapterDOI
01 Jan 2021
TL;DR: Cloud analytics does enable organizations to perform better business intelligence, data warehouse operation, and online analytical processing (OLAP) and cloud computing is that technology that can perform huge-scale and computation which are very complex in nature.
Abstract: The huge amount of data burst which occurred with the arrival of economic access to the internet led to the rise of market of cloud computing which stores this data. And obtaining results from these data led to the growth of the “big data” industry which analyses this humongous amount of data and retrieve conclusion using various algorithms. Hadoop as a big data platform certainly uses map-reduce framework to give an analysis report of big data. The term “big data” can be defined as modern technique to store, capture, and manage data which are in the scale of petabytes or larger sized dataset with high-velocity and various structures. To address this massive growth of data or big data requires a huge computing space to ensure fruitful results through processing of data, and cloud computing is that technology that can perform huge-scale and computation which are very complex in nature. Cloud analytics does enable organizations to perform better business intelligence, data warehouse operation, and online analytical processing (OLAP).

2 citations

Proceedings ArticleDOI
01 Mar 2023
TL;DR: In this article , a multilevel cryptography-based solution for cloud computing is designed, which is a combination of asymmetric and symmetric key cryptography techniques, and the RSA and Data Encryption Standard (DES) are used in this proposed methodology to provide several levels of encoding and decoding at the sender and recipient side.
Abstract: Today's growing research topics include security in cloud computing. Since cloud storage provides easy access to the data whenever you need it. Many companies are switching from Conventional data storage to cloud storage. But data security is the biggest concern that companies face while using cloud computing. In this article, a multilevel cryptography-based safety solution for cloud computing is designed. This paradigm is a combination of asymmetric & symmetric key cryptography techniques. The RSA and Data Encryption Standard (DES) are used in this proposed methodology to provide several levels of encoding and decoding at the sender & recipient side, increasing the safety of cloud storage. This paradigm increases the data security to the highest possible level as compared to the current system.
References
More filters
ReportDOI
28 Sep 2011
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

15,145 citations

Journal ArticleDOI
TL;DR: This paper proposes a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme and proposes a successful method to embed an encrypted information without knowing the plain value.
Abstract: Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme.

146 citations

Proceedings ArticleDOI
30 Dec 2010
TL;DR: It is argued that the cloud data security problem should be solved form data life cycle, and a suggested design process of data security solution is given.
Abstract: Data security has become one of core problems of cloud computing. Many security solutions have been proposed, however, most of them only focus one stage of data life cycle, such as storage stage, which is not enough to solve cloud data security problem as threats exist in whole data life cycle. In this paper, we argue that the cloud data security problem should be solved form data life cycle. After detail analysis of data life cycle model and data security threats, a suggested design process of data security solution is given. The proposed idea is simple but important to create the complete security solution to cloud data security.

66 citations

Proceedings ArticleDOI
16 Oct 2014
TL;DR: To have efficient cloud storage confidentiality, this paper uses encryption and obfuscation as two different techniques to protect the data in the cloud storage.
Abstract: Cloud computing provides an enormous amount of virtual storage to the users. Cloud storage mainly helps to small and medium scale industries to reduce their investments and maintenance of storage servers. Cloud storage is efficient for data storage. Users' data are sent to the cloud is to be stored in the public cloud environment. Data stored in the cloud storage might mingle with other users' data. This will lead to the data protection issue in cloud storage. If the confidentiality of cloud data is broken, then it will cause loss of data to the industry. Security of cloud storage is ensured through confidentiality parameter. To ensure the confidentiality, the most common used technique is encryption. But encryption alone doesn't give maximum protection to the data in the cloud storage. To have efficient cloud storage confidentiality, this paper uses encryption and obfuscation as two different techniques to protect the data in the cloud storage. Encryption is the process of converting the readable text into unreadable form using an algorithm and a key. Obfuscation is same like encryption. Obfuscation is a process which disguises illegal users by implementing a particular mathematical function or using programming techniques. Based on the type of data, encryption and obfuscation can be applied. Encryption can be applied to alphabets and alphanumeric type of data and obfuscation can be applied to a numeric type of data. Applying encryption and obfuscation techniques on the cloud data will provide more protection against unauthorized usage. Confidentiality could be achieved with a combination of encryption and obfuscation.

59 citations

Journal ArticleDOI
TL;DR: This paper gives a review on research results of secure cloud storage in which cryptographic techniques have been used to their designs and indicates what type of cryptographic techniques is mainly adopted in existing cloud storages and what role the cryptographic techniques play.

50 citations