Securing Cloud Data and Cheque Truncation System with Visual Cryptography

نویسنده

  • Jaya
چکیده

Cloud computing is growing day-by-day in the current world scenario. Organizations are excited and worried at the same time to use cloud computing features as it will require for them to move their data on public cloud. Resource utilization is the main advantage of cloud computing which results in storing data of multiple clients in one place. Private cloud is preferred by the companies but it does not provide all the advantages of cloud computing. Cloud providers are working hard to secure their infrastructure and the stored data in cloud. To secure data, encryption is the most preferred solution. But the problem with traditional cryptographic methods is that they take huge amount of computation power and time in processing the encrypted data. Visual Cryptography is a cryptographic method which takes less amount of time to encrypt or decrypt data and can be applied in the field of cloud to improve its security parameters. It can also be used in the financial field such as Cheque Truncation System to transfer the images securely. General Terms Security, Cryptography, Steganography et. al.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret Image Sharing Based CTS with Cheating Detection

Cheque Truncation System(CTS) is an automatic cheque clearance system implemented by RBI.CTS uses cheque image, instead of the physical cheque itself, for cheque clearance thus reducing the turn around time drastically. This approach holds back the physical movement of cheque from presenting bank to the drawee bank. In CTS, digital image of the cheque is protected using standard public key and ...

متن کامل

Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage

With the vast development in cloud computing model, various organizations and individuals often deploy the cloud without reviewing the security policies and procedures which can cause great risk in their business. Securing data in cloud storage becomes a challenging task not only for the cloud user but also to the Cloud Service Provider (CSP). Storing secret data in unencrypted form is suscepti...

متن کامل

Secure Data Storage with Deduplication and Efficient Convergent Key Management

Businesses and consumers are becoming increasingly conscious of the value of secure archival data storage. Most of the organization need to outsource their confidential data including sensitive information to cloud. One of the greatest challenge todays cloud storage services facing is the management of ever increasing volume of data and most importantly security. This paper introduces a techniq...

متن کامل

Two Out of Three Threshold Visual Cryptography Data Hiding Scheme for Block Truncation Coding

For Image processing with low computational complexity Block truncation coding (BTC) is an efficient compression tool. However, it has some deficiencies like the blocking and false contour which may cause defective image reproduction. These defects may be improved with the use of error-diffused BTC but the security issues can limit its industrial application. To improve the security issue and t...

متن کامل

Signing Perfect Currency Bonds

We propose the idea of a Quantum Cheque Scheme, a cryptographic protocol in which any legitimate client of a trusted bank can issue a cheque, that cannot be counterfeited or altered in anyway, and can be verified by a bank or any of its branches. We formally define a Quantum Cheque and present the first Unconditionally Secure Quantum Cheque Scheme and show it to be secure against any no-signali...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013