Scalable and robust cryptography approach using cloud computing

被引:3
作者
Manaa, Mehdi Ebady [1 ]
Hadi, Zuhair Gheni [1 ]
机构
[1] Univ Babylon, Coll Informat Technol, Dept Informat Networks, Hillah, Iraq
关键词
Cloud computing; Cryptography; RSA; Steganography; Algorithms of Cryptography; Image;
D O I
10.1080/09720529.2020.1727609
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the development of technology and cloud computing, many users use cloud computing to manage civil or military services and projects in a cloud network, saving both their common data as well as sensitive or personal information remotely. Being multi-accessible and relatively low in cost, it is regarded as a flexible process wherein the user can increase or reduce these factors according to their needs, such as the memory, communication speed, expansion, and others. Unfortunately, the security of the cloud and the preservation of confidential information still remain a major concern for users of this service, especially for enterprises that need confidentiality in the use of technology. Therefore, this work comes to play an integral role in the increase of the security of the cloud in a technical, practical and modern way, using mixed encryption, information hiding, and information processing remotely. In this work, the RSA and RGBA images are used to encrypt and hide information in Amazon Web Services (AWS), enabling the act of cloud computing remotely between the main site (admin) and the clients. The results show a good performance in terms of time, entropy, RISE and PSNR for the evaluation process.
引用
收藏
页码:1439 / 1445
页数:7
相关论文
共 21 条
  • [1] Elasticity in Cloud Computing: State of the Art and Research Challenges
    Al-Dhuraibi, Yahya
    Paraiso, Fawaz
    Djarallah, Nabil
    Merle, Philippe
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (02) : 430 - 447
  • [2] Almohammad A., 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), P215, DOI 10.1109/IPTA.2010.5586786
  • [3] Balasaraswathi VR, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), P1190, DOI 10.1109/ICACCCT.2014.7019286
  • [4] Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique
    Chidambaram, Nithya
    Raj, Pethuru
    Thenmozhi, K.
    Amirtharajan, Rengarajan
    [J]. INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2016, 2016
  • [5] An Approach to Image Spam Filtering Based on Base64 Encoding and N-Gram Feature Extraction
    Xu, Congfu
    Chen, Yafang
    Chiew, Kevin
    [J]. 22ND INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2010), PROCEEDINGS, VOL 1, 2010,
  • [6] Khajeh-Hosseini A., 2010, RES CHALLENGES ENTER, P7
  • [7] Lee B., 2018, 2018 SPACEOPS C, P1, DOI [DOI 10.1007/978-3-319-68517-5_1, DOI 10.1145/3170427.3170631, 10.1145/3170427.3170631]
  • [8] Li Y., 2016, INTELLIGENT CRYPTOGR, P1
  • [9] Manaa M.E, 2018, J ENG APPL SCI, V13, P2382, DOI [10.3923/jeasci.2018.2382.2387, DOI 10.36478/JEASCI.2018.2382.2387]
  • [10] Manaa M.E., 2017, J TELECOMMUN ELECT C, V9, P1