Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review

被引:0
|
作者
Mamta [1 ]
Khare, Mayank Deep [1 ]
Yadav, Chandra Shekhar [1 ]
机构
[1] NIET, Greater Noida, Uttar Pradesh, India
来源
2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017) | 2017年
关键词
Cloud computing; visual cryptography; Encryption; Decryption; Secret key; Genetic Algorithm; Crossover; Mutation; Critical Index;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's Cloud Computing is the great concept in the development of an on-demand network which provides access to a common pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform, and Software can be accessed as a service. Cloud Computing provides reimbursement in terms of low cost and convenience of data, but its unique feature is its security. Sharing of data is an imperative functionality in cloud storage. In Cloud computing environment the sharing of data and transfer has increased exponentially. There are the various factors in data security like integrity, confidentiality, and authentication services. Maintaining secrecy and protection for critical data are highly challenging, particularly when data are stored in memory or send via any communication networks. I have reviewed several papers regarding our concept and what I found is that in some papers, GA has been used for security, In other papers used GA, VC, and Steganography together for enhancing security. But some are providing security quite well, having high overhead. And those which have low overhead, have poor security. In this paper we have described the genetic algorithm and visual cryptography related papers which helps to know the all areas where these techniques will be used. Genetic algorithm is used for providing encryption and decryption, for hiding critical data we are using visual cryptography
引用
收藏
页码:413 / 416
页数:4
相关论文
共 50 条
  • [1] Secret Data Sharing in Cloud Environment Using Steganography and Encryption Using GA
    Mandal, Subhasish
    Bhattacharyya, Souvik
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1469 - 1474
  • [2] An Efficient Secure Data Transmission Based on Visual Cryptography
    Jabi, Rubeena
    Patel, Punyaban
    Dubey, Deepty
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [3] Secure Data Transmission in Smart Cities Using DNA Cryptography with LZW Compression Algorithm
    Karthikeyan, S.
    Poongodi, T.
    OPTOELECTRONICS INSTRUMENTATION AND DATA PROCESSING, 2024, 60 (01) : 156 - 167
  • [4] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [5] SDPBDVC: secure data processing on big data using visual cryptography
    Brindha, K.
    Jeyanthi, N.
    INTERNATIONAL JOURNAL OF SERVICES TECHNOLOGY AND MANAGEMENT, 2020, 26 (2-3) : 237 - 251
  • [6] Securing Cloud Data using Visual Cryptography
    Brindha, K.
    Jeyanthi, N.
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [7] SECURE DIGITAL DATA VISUAL SHARING SCHEMES IN MULTI-OWNER PUBLIC CLOUD ENVIRONMENT APPLICATIONS
    Babu, Chekka ratna
    Babu, Raveendra
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2025, 26 (01): : 84 - 95
  • [8] BITS TO COLOR IMAGE CRYPTOGRAPHY FOR SECURE DATA TRANSMISSION IN CLOUD DATABASES
    MadhaviLatha, P.
    Katamaneni, Madhavi
    Guttikonda, Geetha
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 10 - 14
  • [9] Musical Cryptography using Genetic Algorithm
    Kumar, Chandan
    Dutta, Sandip
    Chakborty, Soubhik
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1742 - 1747
  • [10] Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment
    Hema, Sri Vigna V.
    Ramesh, K.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (26)