Author:
S Manikandan,Manivannan R.,Venkateshwaran G.,Sivakumar S.,Hema Kumar M.,Jacob Minu Susan
Abstract
With the proliferation of several cutting-edge technologies such as the Artificial Intelligence (AI), and Machine Learning (ML), Internet of Things (IoT), cloud technology is gaining colossal popularity in recent years. Despite the general publicity on the theme across the digital world, defending user data kept in the cloud database is the most decisive problem. Recent potential cyber attacks reveal that storing private images entails more unique care related to other types of information on the cloud. As the cloud customer who has kept their images has no control over their data the cloud service provider has to ensure better security against cyber threats. Cryptography algorithms are the best choice to secure pictorial data in the cloud. These techniques transform images into an inarticulate form to keep confidentiality over undependable and vulnerable social media .In this paper, we aim to propose an approach for improving image security on the cloud using cryptography algorithms. We developed a cohesive approach, called Unified Cryptographic Image Authentication (UCIA) to protect user images on a cloud platform. The proposed UCIA approach includes two phases: (i)UCIA engenders a cipher text through a Data Encryption Standard (DES) by providing a key and a message as input, and (ii)UCIA implements a Twofish algorithm to encipher the pictures by applying cipher text. The enciphered picture data is then stored in the cloud database and can be recovered when the customer requests it. The effectiveness of both enciphering and deciphering procedures are analyzed using the evaluation metrics including time for enciphering, deciphering, cloud storage, and enciphering throughput. Experimental results reveal the better performance and strength of the UCIA approach.
Publisher
Salud, Ciencia y Tecnologia
Reference17 articles.
1. Markets and Markets. Cloud Computing Market (November 2022). Available online: https://www.marketsandmarkets.com/Market-Reports/cloud-computing-market-234.html
2. Yenugula M, Goswami SS, Kaliappan S, Saravanakumar R, Alasiry A, Marzougui M, AlMohimeed A, Elaraby A. Analyzing the Critical Parameters for Implementing Sustainable AI Cloud System in an IT Industry Using AHP-ISM-MICMAC Integrated Hybrid MCDM Model. Mathematics. 2023; 11(15):3367
3. Gartner. Accelerating Shift to the Cloud Means the Market Opportunity for Providers is Narrowing (February, 2022). Available online: https://www.gartner.com/en/newsroom/press-releases/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending
4. Chauhan M, Shiaeles S. An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions. Network. 2023; 3(3):422-450.
5. Chang Y-F, Tai W-L, Huang Y-T. Privacy-Preserved Image Protection Supporting Different Access Rights. Applied Sciences. 2022; 12(23):12335.