Image Stack Management and Data Access Control for Multi-Authority Cloud Storage

被引:0
|
作者
Dhargave, Shrutika C. [1 ]
Karande, Shridevi C. [1 ]
机构
[1] Maharashtra Inst Technol, Dept Comp Engn, Pune, Maharashtra, India
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI) | 2017年
关键词
Image splitting; cloud storage; security; privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing nowadays are gaining high importance from government services, private users and public sectors. The rise in cloud computing is due to the provided facilities such as flexibility, disaster recovery, security, etc. Moving data into cloud servers provide great convenience to users because they just have to upload their data and not care about the hardware management and security. But, the sensitive or privacy relevant data has some major implications. The techniques used so far for storage security are the cryptographic methods and some compression techniques such as compression sensing, JPEG compression technique, etc. to make more space for future data. In this paper we propose a system so that the cloud storage can be made more secure. To increase the efficiency, we are using DCT algorithm for compression and AES for encryption. The main concept of the proposed system is to increase the security so we are splitting the image in chunks. This Image splitting method, lowers the risk of image being retrieved by attacker as we upload the chunks instead of image.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
    Li, Xiaoyu
    Tang, Shaohua
    Xu, Lingling
    Wang, Huaqun
    Chen, Jie
    IEEE ACCESS, 2017, 5 : 393 - 405
  • [22] A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
    Kattimani, Sujata
    Pachouly, Shikha
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [23] Achieving Lightweight and Secure Access Control in Multi-Authority Cloud
    Wang, Yanchao
    Li, Fenghua
    Xiong, Jinbo
    Niu, Ben
    Shan, Fangfang
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 459 - 466
  • [24] CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage
    Dhal, K.
    Rai, S. C.
    Pattnaik, P. K.
    Tripathy, S.
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 987 - 1009
  • [25] TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
    Li, Wei
    Xue, Kaiping
    Xue, Yingjie
    Hong, Jianan
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (05) : 1484 - 1496
  • [26] CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage
    K. Dhal
    S. C. Rai
    P. K. Pattnaik
    S. Tripathy
    The Journal of Supercomputing, 2022, 78 : 987 - 1009
  • [27] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [28] Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    IEEE ACCESS, 2018, 6 : 34051 - 34074
  • [29] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [30] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    Soft Computing, 2018, 22 : 243 - 251