Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review

被引:0
|
作者
Mamta [1 ]
Khare, Mayank Deep [1 ]
Yadav, Chandra Shekhar [1 ]
机构
[1] NIET, Greater Noida, Uttar Pradesh, India
关键词
Cloud computing; visual cryptography; Encryption; Decryption; Secret key; Genetic Algorithm; Crossover; Mutation; Critical Index;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's Cloud Computing is the great concept in the development of an on-demand network which provides access to a common pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform, and Software can be accessed as a service. Cloud Computing provides reimbursement in terms of low cost and convenience of data, but its unique feature is its security. Sharing of data is an imperative functionality in cloud storage. In Cloud computing environment the sharing of data and transfer has increased exponentially. There are the various factors in data security like integrity, confidentiality, and authentication services. Maintaining secrecy and protection for critical data are highly challenging, particularly when data are stored in memory or send via any communication networks. I have reviewed several papers regarding our concept and what I found is that in some papers, GA has been used for security, In other papers used GA, VC, and Steganography together for enhancing security. But some are providing security quite well, having high overhead. And those which have low overhead, have poor security. In this paper we have described the genetic algorithm and visual cryptography related papers which helps to know the all areas where these techniques will be used. Genetic algorithm is used for providing encryption and decryption, for hiding critical data we are using visual cryptography
引用
收藏
页码:413 / 416
页数:4
相关论文
共 50 条
  • [31] A Review: Cryptography and Steganography Algorithm for Cloud Computing
    Singla, Surbhi
    Bala, Anju
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 953 - 957
  • [32] Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN
    Rani, Deevi Radha
    Geethakumari, G.
    COMPUTER COMMUNICATIONS, 2020, 150 : 799 - 810
  • [33] Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
    G. K. Sandhia
    S. V. K. Raja
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 3893 - 3902
  • [34] Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
    Sandhia, G. K.
    Raja, S. V. K.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) : 3893 - 3902
  • [35] ID-Based Cryptography for Secure Cloud Data Storage
    Kaaniche, Nesrine
    Boudguiga, Aymen
    Laurent, Maryline
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 375 - 382
  • [36] Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission
    Reddy, M. Indrasena
    Reddy, M. Purushotham
    Reddy, R. Obulakonda
    Praveen, A.
    WIRELESS NETWORKS, 2024, 30 (03) : 1151 - 1164
  • [37] Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission
    M. Indrasena Reddy
    M. Purushotham Reddy
    R. Obulakonda Reddy
    A. Praveen
    Wireless Networks, 2024, 30 : 1151 - 1164
  • [38] A Cryptography and Machine Learning Based Authentication for Secure Data-Sharing in Federated Cloud Services Environment
    Singh, Ashutosh Kumar
    Saxena, Deepika
    JOURNAL OF APPLIED SECURITY RESEARCH, 2022, 17 (03) : 385 - 412
  • [39] Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (01) : 551 - 578
  • [40] An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission
    Kumar, N. Rajesh
    Krishnan, R. Bala
    Manikandan, G.
    Raajan, N. R.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (07): : 2862 - 2878