Scalable and robust cryptography approach using cloud computing

被引:3
|
作者
Manaa, Mehdi Ebady [1 ]
Hadi, Zuhair Gheni [1 ]
机构
[1] Univ Babylon, Coll Informat Technol, Dept Informat Networks, Hillah, Iraq
关键词
Cloud computing; Cryptography; RSA; Steganography; Algorithms of Cryptography; Image;
D O I
10.1080/09720529.2020.1727609
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the development of technology and cloud computing, many users use cloud computing to manage civil or military services and projects in a cloud network, saving both their common data as well as sensitive or personal information remotely. Being multi-accessible and relatively low in cost, it is regarded as a flexible process wherein the user can increase or reduce these factors according to their needs, such as the memory, communication speed, expansion, and others. Unfortunately, the security of the cloud and the preservation of confidential information still remain a major concern for users of this service, especially for enterprises that need confidentiality in the use of technology. Therefore, this work comes to play an integral role in the increase of the security of the cloud in a technical, practical and modern way, using mixed encryption, information hiding, and information processing remotely. In this work, the RSA and RGBA images are used to encrypt and hide information in Amazon Web Services (AWS), enabling the act of cloud computing remotely between the main site (admin) and the clients. The results show a good performance in terms of time, entropy, RISE and PSNR for the evaluation process.
引用
收藏
页码:1439 / 1445
页数:7
相关论文
共 50 条
  • [21] Cognitive cryptography for data security in cloud computing
    Ogiela, Urszula
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [22] A Review: Cryptography and Steganography Algorithm for Cloud Computing
    Singla, Surbhi
    Bala, Anju
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 953 - 957
  • [23] Application of Cognitive Cryptography in Fog and Cloud Computing
    Ogiela, Marek R.
    Ogiela, Lidia
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2017, 2018, 12 : 293 - 298
  • [24] Chaos-based Cryptography for Cloud Computing
    Tobin, P.
    Tobin, L.
    Mc Keever, M.
    Blackledge, J.
    2016 27TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2016,
  • [25] Scalable and efficient approach for secure group communication using proxy cryptography
    Youngjoo Shin
    Junbeom Hur
    Wireless Networks, 2012, 18 : 413 - 425
  • [26] An Approach For Securing Data On Cloud Using Data Slicing And Cryptography
    Bobde, Rupesh R.
    Khaparde, Amit
    Raghuwanshi, M. M.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [27] Scalable and efficient approach for secure group communication using proxy cryptography
    Shin, Youngjoo
    Hur, Junbeom
    WIRELESS NETWORKS, 2012, 18 (04) : 413 - 425
  • [28] Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing
    Kumar, Anuj
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1529 - 1535
  • [29] Scalable database management in cloud computing
    Kaur, Pankaj Deep
    Sharma, Gitanjali
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 658 - 667
  • [30] Elastic Scalable Cloud Computing Using Application-Level Migration
    Imai, Shigeru
    Chestna, Thomas
    Varela, Carlos A.
    2012 IEEE/ACM FIFTH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2012), 2012, : 91 - 98