Scalable and robust cryptography approach using cloud computing

被引:3
|
作者
Manaa, Mehdi Ebady [1 ]
Hadi, Zuhair Gheni [1 ]
机构
[1] Univ Babylon, Coll Informat Technol, Dept Informat Networks, Hillah, Iraq
关键词
Cloud computing; Cryptography; RSA; Steganography; Algorithms of Cryptography; Image;
D O I
10.1080/09720529.2020.1727609
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the development of technology and cloud computing, many users use cloud computing to manage civil or military services and projects in a cloud network, saving both their common data as well as sensitive or personal information remotely. Being multi-accessible and relatively low in cost, it is regarded as a flexible process wherein the user can increase or reduce these factors according to their needs, such as the memory, communication speed, expansion, and others. Unfortunately, the security of the cloud and the preservation of confidential information still remain a major concern for users of this service, especially for enterprises that need confidentiality in the use of technology. Therefore, this work comes to play an integral role in the increase of the security of the cloud in a technical, practical and modern way, using mixed encryption, information hiding, and information processing remotely. In this work, the RSA and RGBA images are used to encrypt and hide information in Amazon Web Services (AWS), enabling the act of cloud computing remotely between the main site (admin) and the clients. The results show a good performance in terms of time, entropy, RISE and PSNR for the evaluation process.
引用
收藏
页码:1439 / 1445
页数:7
相关论文
共 50 条
  • [41] An Approach of Using OS Through Cloud Computing
    Gupta, Devansh
    2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 163 - 168
  • [42] Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography
    Ahamed, N. Niyaz
    Duraipandian, N.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01): : 83 - 94
  • [43] Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography
    Guesmi, Houda
    Sadiane, Leila Azouz
    2017 25TH INTERNATIONAL CONFERENCE ON SYSTEMS ENGINEERING (ICSENG), 2017, : 324 - 330
  • [44] A Cloud Computing Architecture Framework for Scalable RFID
    Dabas, Chetna
    Gupta, J. P.
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 441 - 444
  • [45] A Scalable Data Platform for Cloud Computing Systems
    Liu, Liang
    Wo, Tianyu
    Applied Decisions in Area of Mechanical Engineering and Industrial Manufacturing, 2014, 577 : 860 - 864
  • [46] A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
    Chase, Jonathan
    Niyato, Dusit
    Wang, Ping
    Chaisiri, Sivadon
    Ko, Ryan K. L.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 565 - 579
  • [47] Scalable risk assessment method for cloud computing using game theory (CCRAM)
    Furuncu, Evrim
    Sogukpinar, Ibrahim
    COMPUTER STANDARDS & INTERFACES, 2015, 38 : 44 - 50
  • [48] A Scalable Cloud Platform using Matlab Distributed Computing Server Integrated with HDFS
    Dutta, Rahul
    Annappa, B.
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 141 - 145
  • [49] Scalable Intrusion Detection Systems Log Analysis using Cloud Computing Infrastructure
    Kumar, Manish
    Hanumanthappa, M.
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 206 - 209
  • [50] CloudProteoAnalyzer: scalable processing of big data from proteomics using cloud computing
    Li, Jiancheng
    Xiong, Yi
    Feng, Shichao
    Pan, Chongle
    Guo, Xuan
    BIOINFORMATICS ADVANCES, 2024, 4 (01):