Privacy-Preserving Image Storage on Cloud Using An Unified Cryptographic Authentication Scheme

Authors

  • R. Manivannan Department of Computer Science and Engineering, E.G.S. Pillay Engineering College Nagapattinam, India Author
  • G. Venkateshwaran Department of Computer Science and Engineering, E.G.S. Pillay Engineering College Nagapattinam, India Author
  • D. Menaga Department of Computer Science and Engineering, St.Joseph’s Institute of Technology, Chennai, Tamil Nadu, India Author
  • S. Sivakumar Department of Computer Science and Engineering, Nehru Institute of Engineering and Technology, Coimbatore, India Author
  • M. Hema Kumar Department of Electronics and Communication Engineering, Sona College of Technology, Salem, Tamil Nadu, India Author
  • Minu Susan Jacob Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Rajiv Gandhi Salai, Chennai - 600 119, Tamilnadu, India Author

DOI:

https://doi.org/10.56294/sctconf2024.609

Keywords:

cloud computing, data encryption standard, image encryption, Twofish algorithm

Abstract

With the proliferation of several cutting-edge technologies such as the Artificial Intelligence (AI), and Machine Learning (ML), Internet of Things (IoT), cloud technology is gaining colossal popularity in recent years. Despite the general publicity on the theme across the digital world, defending user data kept in the cloud database is the most decisive problem. Recent potential cyber attacks reveal that storing private images entails more unique care related to other types of information on the cloud. As the cloud customer who has kept their images has no control over their data the cloud service provider has to ensure better security against cyber threats. Cryptography algorithms are the best choice to secure pictorial data in the cloud. These techniques transform images into an inarticulate form to keep confidentiality over undependable and vulnerable social media .In this paper, we aim to propose an approach for improving image security on the cloud using cryptography algorithms. We developed a cohesive approach, called Unified Cryptographic Image Authentication (UCIA) to protect user images on a cloud platform. The proposed UCIA approach includes two phases: (i)UCIA engenders a cipher text through a Data Encryption Standard (DES) by providing a key and a message as input, and (ii)UCIA implements a Twofish algorithm to encipher the pictures by applying cipher text. The enciphered picture data is then stored in the cloud database and can be recovered when the customer requests it. The effectiveness of both enciphering and deciphering procedures are analyzed using the evaluation metrics including time for enciphering, deciphering, cloud storage, and enciphering throughput. Experimental results reveal the better performance and strength of the UCIA approach

References

1. Markets and Markets. Cloud Computing Market (November 2022). Available online: https://www.marketsandmarkets.com/Market-Reports/cloud-computing-market-234.html

2. Yenugula M, Goswami SS, Kaliappan S, Saravanakumar R, Alasiry A, Marzougui M, AlMohimeed A, Elaraby A. Analyzing the Critical Parameters for Implementing Sustainable AI Cloud System in an IT Industry Using AHP-ISM-MICMAC Integrated Hybrid MCDM Model. Mathematics. 2023; 11(15):3367

3. Gartner. Accelerating Shift to the Cloud Means the Market Opportunity for Providers is Narrowing (February, 2022). Available online: https://www.gartner.com/en/newsroom/press-releases/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending

4. Chauhan M, Shiaeles S. An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions. Network. 2023; 3(3):422-450.

5. Chang Y-F, Tai W-L, Huang Y-T. Privacy-Preserved Image Protection Supporting Different Access Rights. Applied Sciences. 2022; 12(23):12335.

6. Ngnie Sighom JR, Zhang P, You L. Security Enhancement for Data Migration in the Cloud. Future Internet. 2017; 9(3):23.

7. Manikandan, S, Chinnadurai, M, "Effective Energy Adaptive and Consumption in Wireless Sensor Network Using Distributed Source Coding and Sampling Techniques",. Wireless Personal Communication (2021), 118, 1393–1404 (2021)

8. Berisha B, Mëziu E, Shabani I. Big data analytics in Cloud computing: an overview. J Cloud Comput (Heidelb). 2022;11(1):24.

9. Molas G, Nowak E. Advances in Emerging Memory Technologies: From Data Storage to Artificial Intelligence. Applied Sciences. 2021; 11(23):11254.

10. T. U. Haq, T. Shah, G. F. Siddiqui, M. Z. Iqbal, I. A. Hameed and H. Jamil, "Improved Twofish Algorithm: A Digital Image Enciphering Application," in IEEE Access, vol. 9, pp. 76518-76530, 2021,

11. Quenaya, MR, Villa-Herrera, AA, Chambi Ytusaca, SF, Yauri Ituccayasi, JE, Velazco-Paredes, Y, Flores-Quispe, R "Image Encryption using an Image Pattern based on Advanced Encryption Standard," 2021 IEEE Colombian Conference on Communications and Computing (COLCOM), Cali, Colombia, 2021, pp. 1-6

12. Ashwaq T. Hashim and Ammar H. Jassem and Suhad A. Ali, A Novel Design of Blowfish Algorithm for Image Security, Journal of Physics: Conference Series, 2021, vol. 1818, no. 1, pp. 012085

13. Adeniyi AE, Misra S, Daniel E, Bokolo A Jr. Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data. Algorithms. 2022; 15(10):373.

14. S. Manikandan, K. Raju, R. Lavanya, R.Hemavathi, "Energy Efficiency Controls on Minimizing Cost with Response Time and Guarantee Using EGC Algorithm",International Journal of Information Technology Insights & Transformations, Vol. 3, No. 1, 2017

15. Matthews, R. (1989). On the derivation of a Chaotic encryption algorithm. Cryptologia, 14, 29–42.

16. A. Bastanta, R. Nuryansyah, C. A. Nugroho and W. Budiharto, "Image Data Encryption Using DES Method," 2021 1st International Conference on Computer Science and Artificial Intelligence (ICCSAI), Jakarta, Indonesia, 2021, pp. 130-135

17. Peram, SR, Vardhan,GH,Neeraj, M, Anand Kumar, B, Analysis of image security by triple DES,Materials Today: Proceedings, Volume 64, Part 1,2022, Pages 808-813

18. Lin C-H, Hu G-H, Chan C-Y, Yan J-J. Chaos-Based Synchronized Dynamic Keys and Their Application to Image Encryption with an Improved AES Algorithm. Applied Sciences. 2021; 11(3):1329

Downloads

Published

2024-03-11

How to Cite

1.
Manivannan R, Venkateshwaran G, Menaga D, Sivakumar S, Hema Kumar M, Jacob MS. Privacy-Preserving Image Storage on Cloud Using An Unified Cryptographic Authentication Scheme. Salud, Ciencia y Tecnología - Serie de Conferencias [Internet]. 2024 Mar. 11 [cited 2024 Nov. 21];3:.609. Available from: https://conferencias.ageditor.ar/index.php/sctconf/article/view/700