K-RSA: Secure data storage technique for multimedia in cloud data server

被引:6
|
作者
Sinha, Keshav [1 ]
Priya, Annu [1 ]
Paul, Partha [2 ]
机构
[1] Birla Inst Technol, Dept Comp Sci Engn, Mesra, Jharkhand, India
[2] Sarala Birla Univ, Dept Comp Sci Engn, Ranchi, Bihar, India
关键词
Secure hidden layer (SHL); key management server (KMS); share holder server (SHS); cloud service provider(CSP); chinese remainder theorem (CRT); cloud storage server (CSS); BIG DATA; ALGORITHMS; PRIVACY; MODEL;
D O I
10.3233/JIFS-191687
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud has become one of the most demanding services for data storage. On another hand, the security of data is one of the challenging tasks for Cloud Service Provider (CSP). Cryptography is one of the ways for securing the storage data. Cryptography is not a new approach instead of the efficient utilization of cryptographical algorithms is greatly needed. In this work, we proposed a Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption. The SHL is consisting of two major modules (i) Key Management Server (KMS) and (ii) Share Holder Server (SHS) which is used for storing and sharing of cryptographic key. For this purpose, we proposed a server-side encryption algorithm, which is based on the asymmetric algorithm (RSA and CRT) for providing end-to-end security of multimedia data. The experimental results of text and video are evidence that the size of file is not much affected after the encryption and effectively stored at Cloud Storage Server (CSS). The parameters like ciphertext size, encryption time and throughput are considered for performance evaluation of the proposed encryption technique.
引用
收藏
页码:3297 / 3314
页数:18
相关论文
共 50 条
  • [31] A Secure and Searchable Data Storage in Cloud Computing
    Gupta, Sarika
    Satapathy, Sangita Rani
    Mehta, Piyush
    Tripathy, Anupam
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 106 - 109
  • [32] A Secure Architecture for Data Storage in the Cloud Environments
    Fu, Chuan
    Yang, Jun
    Liu, Zheli
    Jia, Chunfu
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 289 - 291
  • [33] Secure data storage in the cloud with homomorphic encryption
    Bensitel, Yasmina
    Romadi, Rahal
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 1 - 6
  • [34] Comment on Improved Secure RSA cryptosystem (ISRSAC) for Data Confidentiality in Cloud
    Liu, Chenglian
    Hsu, Chieh-Wen
    International Journal of Network Security, 2019, 21 (04) : 709 - 712
  • [35] On-demand data elevation in a hierarchical multimedia storage server
    Triantafillou, P
    Papadakis, T
    PROCEEDINGS OF THE TWENTY-THIRD INTERNATIONAL CONFERENCE ON VERY LARGE DATABASES, 1997, : 226 - 235
  • [36] Secure Tensor Decomposition for Heterogeneous Multimedia Data in Cloud Computing
    Fu, Cai
    Yang, Zhao
    Liu, Xiao-Yang
    Yang, Jia
    Walid, Anwar
    Yang, Laurence T.
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (01) : 247 - 260
  • [37] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    K. L. Neela
    V. Kavitha
    Cluster Computing, 2018, 21 : 115 - 124
  • [38] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [39] Enhancement of data confidentiality and secure data transaction in cloud storage environment
    Neela, K. L.
    Kavitha, V.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 115 - 124
  • [40] Provable Data Possession Supporting Secure Data Transfer for Cloud Storage
    Yu, Yong
    Ni, Jianbing
    Yu, Yong
    Wu, Wei
    Wang, Yilei
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 38 - 42