Skip to main content

2018 | OriginalPaper | Buchkapitel

Bit-Reversal Encryption Towards Secured Storage of Digital Image in Cloud Deployment

verfasst von : Soumitra Sasmal, Indrajit Pan

Erschienen in: Advanced Computational and Communication Paradigms

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy preservation of cloud data is gaining importance since majority of digital records are transferred to cloud-based storage. Familiarization of cloud storage is rapidly growing and people are choosing cloud storage services as suitable alternatives for personal setup. Potential increase in the cloud usage creates a concern for data security. Cloud records demand robust encryption standards. Protection is needed both from external hackers and internal intruders. This article reports a bit-reversal encryption mechanism for privacy preservation of digital image data deployed on cloud. This encryption mechanism deals with different types of digital images toward secure storage in cloud infrastructure. Experimental results show that the method is quite simple and easy to implement to preserve the privacy and security of user data either off premises or on premises cloud storage.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Knowinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Knowinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRef
2.
Zurück zum Zitat Brenner, M., Perl, H., Smith, M.: How practical is homomorphically encrypted program execution? An implementation and performance evaluation. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 375–382 (2012) Brenner, M., Perl, H., Smith, M.: How practical is homomorphically encrypted program execution? An implementation and performance evaluation. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 375–382 (2012)
3.
Zurück zum Zitat Brenner, M., Perl, H., Smith, M.: Practical applications of homomorphic encryption. In: Proceedings of 7th International Conference on Security and Cryptography, pp. 5–14 (2012) Brenner, M., Perl, H., Smith, M.: Practical applications of homomorphic encryption. In: Proceedings of 7th International Conference on Security and Cryptography, pp. 5–14 (2012)
4.
Zurück zum Zitat Datta, J., Pan, I., Bhattacharyya S.: Security challenges for cloud data: a survey. In: Proceedings of International Conference on Tele Communication, Power Analysis and Computing Techniques, Article 258 (2017) Datta, J., Pan, I., Bhattacharyya S.: Security challenges for cloud data: a survey. In: Proceedings of International Conference on Tele Communication, Power Analysis and Computing Techniques, Article 258 (2017)
5.
Zurück zum Zitat Li, J., Tan, X., Chen, X., Wong, D.: An efficient proof of retrievability with public auditing in cloud computing. In: Proceedings of 5th International Conference on Intelligent Network Collaborating System, pp. 93–98 (2013) Li, J., Tan, X., Chen, X., Wong, D.: An efficient proof of retrievability with public auditing in cloud computing. In: Proceedings of 5th International Conference on Intelligent Network Collaborating System, pp. 93–98 (2013)
6.
Zurück zum Zitat Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical. In: Proceedings of 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011) Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical. In: Proceedings of 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113–124 (2011)
7.
Zurück zum Zitat Qin, Z., Yan, J., Ren. K., Chen, C., Wang, C.: Towards efficient privacy preserving image feature extraction in cloud computing. In: Proceedings of ACM International Conference on Multimedia, pp. 497–506 (2014) Qin, Z., Yan, J., Ren. K., Chen, C., Wang, C.: Towards efficient privacy preserving image feature extraction in cloud computing. In: Proceedings of ACM International Conference on Multimedia, pp. 497–506 (2014)
8.
Zurück zum Zitat Sadeghi, A., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Proceedings of 12th International Conference on Information Security and Cryptography, pp. 229–244 (2010)CrossRef Sadeghi, A., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Proceedings of 12th International Conference on Information Security and Cryptography, pp. 229–244 (2010)CrossRef
9.
Zurück zum Zitat Sanchez, J., Canton, M.P.: The PC Graphics Handbook. CRC Press (2003). ISBN 0-8493-1678-2 Sanchez, J., Canton, M.P.: The PC Graphics Handbook. CRC Press (2003). ISBN 0-8493-1678-2
10.
Zurück zum Zitat Sharma, M., Kowar, M.K.: Image encryption techniques using chaotic schemes: a review. Int. J. Eng. Sci. Technol. 2(6), 2359–2363 (2010) Sharma, M., Kowar, M.K.: Image encryption techniques using chaotic schemes: a review. Int. J. Eng. Sci. Technol. 2(6), 2359–2363 (2010)
11.
Zurück zum Zitat Srivastava, A.: A survey report on different techniques of image encryption. Int. J. Emerg. Technol. Adv. Eng. ISSN 2(6), 2250–2459 (2012) Srivastava, A.: A survey report on different techniques of image encryption. Int. J. Emerg. Technol. Adv. Eng. ISSN 2(6), 2250–2459 (2012)
12.
Zurück zum Zitat Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of Computer Security, pp. 355–370 (2009)CrossRef Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of Computer Security, pp. 355–370 (2009)CrossRef
Metadaten
Titel
Bit-Reversal Encryption Towards Secured Storage of Digital Image in Cloud Deployment
verfasst von
Soumitra Sasmal
Indrajit Pan
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_77

Neuer Inhalt