Skip to main content

2018 | OriginalPaper | Buchkapitel

Efficiently Secure Data Privacy on Hybrid Cloud Using Novel Image Scrambling and Modified SPIHT

verfasst von : T. M. Praneeth Naidu, G. Spandana

Erschienen in: Microelectronics, Electromagnetics and Telecommunications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Technology has grown to such an extent that anything can be stored in cloud. But the extension of the adoption of the cloud is hindered as there are some major concerns regarding the privacy of data stored and data size in the public cloud. In hybrid cloud computing (HCC), the images are preserved in dedicated cloud. However, this technique avoids the basic feature of the cloud computing as it increases the computation and storage overhead on the cloud. A novel algorithm approach is used to compute the private image data, where 0.001 time of AES algorithm is used and the delay is 3–5% when compared to other traditional public cloud approaches. The data compression algorithm used reduces the data size by 87%, thus reducing the time of uploading by 70%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Huang, X., & Du, X. (2013b). Efficiently secure data privacy on hybrid cloud. In IEEE International Conference on Communications (pp. 1936–1940). Huang, X., & Du, X. (2013b). Efficiently secure data privacy on hybrid cloud. In IEEE International Conference on Communications (pp. 1936–1940).
2.
Zurück zum Zitat P. Mell and T. Grance, “Draft nist working definition of cloud computing,” Referenced on June. 3rd, 2009. P. Mell and T. Grance, “Draft nist working definition of cloud computing,” Referenced on June. 3rd, 2009.
3.
Zurück zum Zitat M. D. Ryan, “Cloud computing privacy concerns on our doorstep,” Communications of the ACM, 2011. M. D. Ryan, “Cloud computing privacy concerns on our doorstep,” Communications of the ACM, 2011.
4.
Zurück zum Zitat A. Feldman, W. Zeller, M. Freedman, and E. Felten, “Sporc: Group collaboration using untrusted cloud resources,” OSDI, Oct, 2010. A. Feldman, W. Zeller, M. Freedman, and E. Felten, “Sporc: Group collaboration using untrusted cloud resources,” OSDI, Oct, 2010.
5.
Zurück zum Zitat C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM, 2010 Proceedings IEEE, 2010. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM, 2010 Proceedings IEEE, 2010.
6.
Zurück zum Zitat S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in INFOCOM, 2010 Proceedings IEEE, 2010. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in INFOCOM, 2010 Proceedings IEEE, 2010.
7.
Zurück zum Zitat V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM conference on CCS, 2006. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM conference on CCS, 2006.
8.
Zurück zum Zitat E. Demaine and M. Demaine, “Jigsaw puzzles, edge matching, and polyomino packing: Connections and complexity,” Graphs and Combinatorics, vol. 23, 2007. E. Demaine and M. Demaine, “Jigsaw puzzles, edge matching, and polyomino packing: Connections and complexity,” Graphs and Combinatorics, vol. 23, 2007.
9.
Zurück zum Zitat T. Cho, S. Avidan, and W. Freeman, “A probabilistic image jigsaw puzzle solver,” in Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, 2010. T. Cho, S. Avidan, and W. Freeman, “A probabilistic image jigsaw puzzle solver,” in Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, 2010.
10.
Zurück zum Zitat Kefei Zhang, Fang Yuan, Jiang Guo: A Novel Neural Network Approach to Transformer Fault Diagnosis Based on Momentum-Embedded BP Neural Network Optimized by Genetic Algorithm and Fuzzy c-Means, Arabian Journal for Science and Engineering, 41(9) 3451–3461 (2016). Kefei Zhang, Fang Yuan, Jiang Guo: A Novel Neural Network Approach to Transformer Fault Diagnosis Based on Momentum-Embedded BP Neural Network Optimized by Genetic Algorithm and Fuzzy c-Means, Arabian Journal for Science and Engineering, 41(9) 3451–3461 (2016).
Metadaten
Titel
Efficiently Secure Data Privacy on Hybrid Cloud Using Novel Image Scrambling and Modified SPIHT
verfasst von
T. M. Praneeth Naidu
G. Spandana
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7329-8_88

Neuer Inhalt