An Application to Secure Multimedia Data in Cloud Environment using Paillier Cryptography
نویسنده
چکیده
The Cloud is an internet-based computing where shared resources, software and information are provided to the computer. Now a days it is one of the prominent technologies to provide wide variety of services. In this condition data can be categorized into sensitive and insensitive. Among these two types sensitive data requires security. The existing system does not provide any security concerns for storing sensitive data in the cloud environment. So, it is necessary to develop an application to provide better security to the sensitive data in the cloud environment. This paper presented one of the best cryptographic algorithm that is homomorphic encryption which is used to provide better security to the multimedia data in the cloud environment when streaming or after streaming is over. Through this algorithm data can be encrypt and upload into cloud environment as well as download and decrypt into original form. By using this application we can provide better security to the cloud environment when compare to existing one. Keywords— Homomorphism, Cryptography, Public Key, Private Key, Euler’s totient function, Carmichael’s function, Frame Buffer.
منابع مشابه
Attribute based Encryption and Key Distribution for Secure Storage in Clouds
A new decentralized access control scheme is used for secure data storage in clouds that supports anonymous authentication. According to this scheme a user can create a file and store it securely in the cloud. Decryption will only work if the attributes associated with the decryption key match the policy used to encrypt the message. The cloud verifies the authenticity of the users without knowi...
متن کاملSecure Cloud based Privacy Preserving DataMinning Platform
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern. Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blinda...
متن کاملPrivate Searching on Encrypted Data in Cloud
Cloud computing appeared as the most common paradigm in the time being that provides calculations and storage resources by when used – pay method. Users can exploit cloud resources from anywhere at any time without maintenance cost. Flexibility in resource allocation enabled cloud services to be effective in delivering with reasonable cost. However, transfer data to cloud make it vulnerable to ...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملDecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the Cloud, share a large amount of data day by day. Secure Data sharing is an important issue over the cloud environment. In order to enhance the security services, the paper proposes Decentralized Cryptography Technique for Secure Communication over the Clouds. In this p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014