Scalable and robust cryptography approach using cloud computing

被引:3
|
作者
Manaa, Mehdi Ebady [1 ]
Hadi, Zuhair Gheni [1 ]
机构
[1] Univ Babylon, Coll Informat Technol, Dept Informat Networks, Hillah, Iraq
关键词
Cloud computing; Cryptography; RSA; Steganography; Algorithms of Cryptography; Image;
D O I
10.1080/09720529.2020.1727609
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the development of technology and cloud computing, many users use cloud computing to manage civil or military services and projects in a cloud network, saving both their common data as well as sensitive or personal information remotely. Being multi-accessible and relatively low in cost, it is regarded as a flexible process wherein the user can increase or reduce these factors according to their needs, such as the memory, communication speed, expansion, and others. Unfortunately, the security of the cloud and the preservation of confidential information still remain a major concern for users of this service, especially for enterprises that need confidentiality in the use of technology. Therefore, this work comes to play an integral role in the increase of the security of the cloud in a technical, practical and modern way, using mixed encryption, information hiding, and information processing remotely. In this work, the RSA and RGBA images are used to encrypt and hide information in Amazon Web Services (AWS), enabling the act of cloud computing remotely between the main site (admin) and the clients. The results show a good performance in terms of time, entropy, RISE and PSNR for the evaluation process.
引用
收藏
页码:1439 / 1445
页数:7
相关论文
共 50 条
  • [31] Scalable Distributed DNN Training Using Commodity GPU Cloud Computing
    Strom, Nikko
    16TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2015), VOLS 1-5, 2015, : 1488 - 1492
  • [32] Scalable Queries For Large Datasets Using Cloud Computing: A Case Study
    McGlothlin, James P.
    Khan, Latifur
    PROCEEDINGS OF THE 15TH INTERNATIONAL DATABASE ENGINEERING & APPLICATIONS SYMPOSIUM (IDEAS '11), 2011, : 8 - 16
  • [33] Categorical quantum cryptography for access control in cloud computing
    Lirong Qiu
    Xin Sun
    Juan Xu
    Soft Computing, 2018, 22 : 6363 - 6370
  • [34] A hybrid cryptography technique for data storage on cloud computing
    Bermani, Ali Kadhim
    Murshedi, Tariq A. K.
    Abod, Zaid A.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1613 - 1624
  • [35] Designing of Cryptography Based Security System for Cloud Computing
    Sengupta, Nandita
    Holmes, Jeffrey
    2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 52 - 57
  • [36] The Strategy of Cryptography for the Proposed Model of Security in Cloud Computing
    Hyseni, Dhurate
    Selimi, Besnik
    Luma, Artan
    Cico, Betim
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 24 - 28
  • [37] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [38] Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
    Sasikumar, K.
    Nagarajan, Sivakumar
    IEEE ACCESS, 2024, 12 : 52325 - 52351
  • [39] Categorical quantum cryptography for access control in cloud computing
    Qiu, Lirong
    Sun, Xin
    Xu, Juan
    SOFT COMPUTING, 2018, 22 (19) : 6363 - 6370
  • [40] Comparative study of cryptography for cloud computing for data security
    Mathur P.
    Gupta A.K.
    Vashishtha P.
    Recent Advances in Computer Science and Communications, 2021, 14 (05) : 1508 - 1513