Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review

被引:0
|
作者
Mamta [1 ]
Khare, Mayank Deep [1 ]
Yadav, Chandra Shekhar [1 ]
机构
[1] NIET, Greater Noida, Uttar Pradesh, India
来源
2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017) | 2017年
关键词
Cloud computing; visual cryptography; Encryption; Decryption; Secret key; Genetic Algorithm; Crossover; Mutation; Critical Index;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's Cloud Computing is the great concept in the development of an on-demand network which provides access to a common pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform, and Software can be accessed as a service. Cloud Computing provides reimbursement in terms of low cost and convenience of data, but its unique feature is its security. Sharing of data is an imperative functionality in cloud storage. In Cloud computing environment the sharing of data and transfer has increased exponentially. There are the various factors in data security like integrity, confidentiality, and authentication services. Maintaining secrecy and protection for critical data are highly challenging, particularly when data are stored in memory or send via any communication networks. I have reviewed several papers regarding our concept and what I found is that in some papers, GA has been used for security, In other papers used GA, VC, and Steganography together for enhancing security. But some are providing security quite well, having high overhead. And those which have low overhead, have poor security. In this paper we have described the genetic algorithm and visual cryptography related papers which helps to know the all areas where these techniques will be used. Genetic algorithm is used for providing encryption and decryption, for hiding critical data we are using visual cryptography
引用
收藏
页码:413 / 416
页数:4
相关论文
共 50 条
  • [21] Efficient Secure and Private Healthcare Data Transmission and Allocation in Cloud Environment
    Buddesab
    Yashaswini, M. S.
    Thriveni, J.
    Venugopal, K. R.
    2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 153 - 158
  • [22] Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm
    Reddy, M. Indra Sena
    Kumar, A. P. Siva
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 62 - 69
  • [23] RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique
    Shankar, K.
    Eswaran, P.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (11)
  • [24] Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
    Liu, Feng
    Wu, Haitao
    Lu, Xiaochun
    Liu, Xiyang
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 175 - 190
  • [25] Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
    Gulsezim, Duisen
    Zhansaya, Seiitkaliyeva
    Razaque, Abdul
    Ramina, Yestayeva
    Amsaad, Fathi
    Almiani, Muder
    Ganda, Raouf
    Oun, Ahmed
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 405 - 411
  • [26] Secured Document Sharing Using Visual Cryptography in Cloud Data Storage
    Brindha, K.
    Jeyanthi, N.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (04) : 111 - 123
  • [27] Secure Mail using Visual Cryptography (SMVC)
    Ajish, S.
    Rajasree, R.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [28] Secure data storage and retrieval system using hybridization of orthogonal knowledge swarm optimization and oblique cryptography algorithm in cloud
    N. Madhusudhana Reddy
    G. Ramesh
    Srinivasa Babu Kasturi
    D. Sharmila
    G. Gopichand
    L. Thomas Robinson
    Applied Nanoscience, 2023, 13 : 2449 - 2461
  • [29] Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme
    Gayathri, R.
    Nagarajan, V.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 118 - 123
  • [30] Convergent encryption enabled secure data deduplication algorithm for cloud environment
    Ahmad, Shahnawaz
    Arif, Mohd.
    Ahmad, Javed
    Nazim, Mohd.
    Mehfuz, Shabana
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (21)