Abstract

ABSTRACT Storing data in a third party cloud system causes serious problems on data confidentiality. Generally, encryption techniques provide data confidentiality but with limited functionality, which occurs due to unsupported actions of encryption operation in cloud storage space. Hence, developing a decentralized secure storage system with multiple support functions like encryption, encoding, and forwarding tends to get complicated, when the storage system spreads. This paper aims mainly on hiding image information using specialized steganographic image authentication (SSIA) algorithm in clustered cloud systems. The SSIA algorithm is applied to virtual elastic clusters in a public cloud platform. Here, the SSIA algorithm embeds the image information using blowfish algorithm and genetic operators. Initially, the blowfish symmetric block encryption is applied over the image and then the genetic operator is applied to re-encrypt the image information. The proposed algorithm provides an improved security than conventional blowfish algorithm in a clustered cloud system.

Highlights

  • In recent years, cloud computing gained a better recognition in organization and individuals using storage, computation, and software services [1]

  • The proposed method has an integrated specialized steganographic image authentication (SSIA) algorithm to provide high-level security to the images in the private cloud

  • Genetic algorithm searches the individuals based on the probability and it solves the problem associated with optimization

Read more

Summary

Introduction

Cloud computing gained a better recognition in organization and individuals using storage, computation, and software services [1]. The main drawback associated with cloud computing is its issues related to security and privacy of data. Cloud computing is an important application in health, banking, and security services [5,6,7], the data is considered sensitive. Better confidentiality has to be maintained at the user and server side during processing, rest, and transfer This has imposed the present study to consider data security as an important and critical issue that has to be addressed thoroughly. The cryptosystem used is steganography based system, which is designed to work on the distributed data and further, it accumulates and reduces the data loss with increased efficiency without any security loss. The outline of the paper is organized as follows: Section 2 provides the related works.

Related work
Blowfish algorithm
Genetic algorithm
Blowfish image decryption
Proposed cloud stegnographic image authentication model
Experimental results
NPCR and UACI
Correlation coefficient
Execution time
B Entire image
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call