Secure Searchable Image Encryption in Cloud Using Hyper Chaos
Journal: The International Arab Journal of Information Technology (Vol.16, No. 2)Publication Date: 2019-03-01
Authors : Shaheen Ayyub; Praveen Kaushik;
Page : 251-259
Keywords : Cloud computing; encryption; cloud security; privacy and integrity; hyper chaos; decryption; logistic map.;
Abstract
In cloud computing, security is the main issue to many cloud providers and researchers. As we know that cloud acts as a big black box. Nothing inside the cloud is visible to the cloud user. This means that when we store our data or images in the cloud, we lost our control upon it. The data in the provider's hands could make security and privacy issues in cloud storage as users lose their control over their data. So it is necessary for protecting user's private data that they should be stored in the encrypted form and server should not learn anything about the stored data. These data may be personal images. In this paper we have worked on the user's personal images which should be kept secret. The proposed scheme is to do the encryption of the images stored in the cloud. In this paper Hyper Chaos based encryption is done, which is applied on the masked images. Comparing with conventional algorithms chaos based ones have suggested more secure and fast encryption methods. The flicker images are used to create the mask for the original image and then hyper chaos is applied for encrypting the image. Prior methods in this regard are restricted to either some attacks possibility or key transfer mechanism. One of the advantages of proposed algorithm is that, the key is also encrypted. Some values of generated encrypted key with the index is sent to the server & other value is sent to the user. After decrypting the key, an encrypted image can be decrypted. The key encryption is used to enhance the security and privacy of the algorithm. Index is also created for the images before storing them on the cloud.
Other Latest Articles
- An EfficientMispronunciation Detection System Using Discriminative Acoustic Phonetic Features for Arabic Consonants
- Information Analysis and 2D Point Extrapolation usingMethod of Hurwitz-Radon Matrices
- A New Approach of Lossy Image Compression Based on Hybrid Image Resizing Techniques
- Parallel Batch Dynamic Single Source Shortest Path Algorithm and Its Implementation on GPU based Machine
- Formal Architecture and Verification of a Smart Flood Monitoring System-of-Systems
Last modified: 2019-04-28 19:12:48