Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem

被引:13
作者
Falmari, Vinod Ramesh [1 ]
Brindha, M. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli, India
关键词
USER AUTHENTICATION SCHEME; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; ENCRYPTION; DESIGN; PROTOCOL; SYSTEM;
D O I
10.1016/j.jisa.2020.102513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a cloud based digital image locker system along with secure user authentication and novel image cryptosystem for preserving privacy of user images is proposed. Images require more storage space as compared to text. So, it is not feasible to store images locally in digital locker for everyone. By taking advantage of high speed Internet, it is feasible to use cloud for efficient storage of images. However, so many researchers feel that cloud technology is ‘honest-but-curious’. Cloud service follows the specified protocol completely, but it traces and analyzes the data to get the user's important information. To overcome from such challenges, privacy of user's identity and data should be preserved. The proposed authentication protocol is designed using Paillier based difference function which is based on Homomorphic cryptosystem. The speciality of homomorphic function is that computation on encrypted data is possible without decrypting the cipher text. Because of this, authentication process is done in encrypted environment. A novel image cryptosystem is designed based on Fridrich model. In this cryptosystem, confusion is performed at bit-level and diffusion is performed at pixel-level. Keys are modified in each round of confusion to achieve more security. Simulation and cryptanalysis prove the effectiveness of the proposed system. © 2020 Elsevier Ltd
引用
收藏
页数:15
相关论文
共 53 条
[1]   A fractal-based image encryption system [J].
Abd-El-Hafiz, Salwa Kamal ;
Radwan, Ahmed G. ;
Haleem, Sherif H. Abdel ;
Barakat, Mohamed L. .
IET IMAGE PROCESSING, 2014, 8 (12) :742-752
[2]  
Abdurrahman UA, 2013, 2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), P293, DOI 10.1109/ICECCO.2013.6718286
[3]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[4]  
Ah Kioon M. C., 2013, Applied Mechanics and Materials, V347, P2706
[5]   Secure clustering for efficient data dissemination in vehicular cyber-physical systems [J].
Bali, Rasmeet S. ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :476-492
[6]  
Beerliová-Trubíniová Z, 2006, LECT NOTES COMPUT SC, V3876, P305
[7]  
Bellare M., 1995, Advances in Cryptology-EUROCRYPT'94, P92, DOI DOI 10.1007/BFB0053428
[8]  
Carlton R.A, 2017, SECURE INTEGER COMP
[9]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[10]   Personalized information encryption using ECG signals with chaotic functions [J].
Chen, Ching-Kun ;
Lin, Chun-Liang ;
Chiang, Cheng-Tang ;
Lin, Shyan-Lung .
INFORMATION SCIENCES, 2012, 193 :125-140