Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review

被引:0
|
作者
Mamta [1 ]
Khare, Mayank Deep [1 ]
Yadav, Chandra Shekhar [1 ]
机构
[1] NIET, Greater Noida, Uttar Pradesh, India
来源
2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017) | 2017年
关键词
Cloud computing; visual cryptography; Encryption; Decryption; Secret key; Genetic Algorithm; Crossover; Mutation; Critical Index;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's Cloud Computing is the great concept in the development of an on-demand network which provides access to a common pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform, and Software can be accessed as a service. Cloud Computing provides reimbursement in terms of low cost and convenience of data, but its unique feature is its security. Sharing of data is an imperative functionality in cloud storage. In Cloud computing environment the sharing of data and transfer has increased exponentially. There are the various factors in data security like integrity, confidentiality, and authentication services. Maintaining secrecy and protection for critical data are highly challenging, particularly when data are stored in memory or send via any communication networks. I have reviewed several papers regarding our concept and what I found is that in some papers, GA has been used for security, In other papers used GA, VC, and Steganography together for enhancing security. But some are providing security quite well, having high overhead. And those which have low overhead, have poor security. In this paper we have described the genetic algorithm and visual cryptography related papers which helps to know the all areas where these techniques will be used. Genetic algorithm is used for providing encryption and decryption, for hiding critical data we are using visual cryptography
引用
收藏
页码:413 / 416
页数:4
相关论文
共 50 条
  • [41] Modified security and cryptography-based data deduplication in cloud environment
    Kumar, Doddi Suresh
    Srinivasu, Nulaka
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2025,
  • [42] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment
    Acharya, Shreenath
    Manoj, K.
    Gayana, M. N.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873
  • [43] Enabling secure authentication using fingerprint and visual cryptography
    Annappanavar, Sneha Manohar
    Chavan, Pallavi Vijay
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (06) : 614 - 639
  • [44] Secure Data Transfer in Android using Elliptical Curve Cryptography
    Ruprah, Taranpreet Singh
    Kore, Vishal S.
    Mali, Yogesh K.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [45] PSR: An Improvement of Lightweight Cryptography Algorithm for Data Security in Cloud Computing
    Chandra, P. Sri Ram
    Rao, p Syamala
    Naresh, K.
    Malladi, Ravisankar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (01) : 1053 - 1058
  • [46] A Secure Data Transmission Mechanism for Cloud Outsourced Data
    Alhaj, Abdullah
    Aljawarneh, Shadi
    Masadeh, Shadi
    Abu-Taieh, Evon
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (01) : 34 - 43
  • [47] Energy Aware Scheduling using Genetic Algorithm in Cloud Data Centers
    Kar, Ipsita
    Parida, R. N. Ramakant
    Das, Himansu
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3545 - 3550
  • [48] Improving Cost for Data Migration in Cloud Computing Using Genetic Algorithm
    Chawla, Nitin
    Kumar, Deepak
    Sharma, Dinesh Kumar
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2020, 8 (03) : 69 - 81
  • [49] A Secure Voice Channel using Chaotic Cryptography Algorithm
    Riyadi, Munawar A.
    Khafid, M. Reza Aulia
    Pandapotan, Natanael
    Prakoso, Teguh
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (ICECOS), 2018, : 141 - 145
  • [50] Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography
    Pandey, Hari Mohan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 (111): : 213 - 225