Fast and Efficient Data Masking Method for Securing Image Over Cloud Computing Environment

被引:0
|
作者
Siddartha B.K. [1 ]
Ravikumar G.K. [1 ]
机构
[1] Department of Computer Science, BGS Institute Of Technology, BG, Nagara
关键词
chaotic system; Cryptography; data masking; DNA encoding; FEDM; runtime complexity;
D O I
10.2174/2666255813999201002151500
中图分类号
学科分类号
摘要
Objective: Preserving the confidentiality of sensitive information is becoming more and more difficult and challenging, considering current scenarios, as a huge amount of multimedia data are stored and communicated over the internet among users and cloud computing environment. The existing cryptography security model for storing images on a cloud platform cannot resist various kinds of modern attacks, such as statistical, differential, brute force, cropping attack, etc., therefore, an improved bit scrambling technique using chaotic maps that can resist various kinds of security attacks is needed. The FEDM cipher image provides less correlation among neighboring pixels and images can be decrypted even under the presence of noise. This study proposed a FEDM model to achieve better UACI, NPCR, histogram, runtime, and processing time performance than the existing image security methods. Methods: Preserving the confidentiality of sensitive information is becoming more and more difficult and challenging considering current scenarios as a huge amount of multimedia data are stored and communicated over the internet among users and cloud computing environment. The existing cryptography security model for storing images on a cloud platform cannot resist various kinds of modern attacks such as statistical, differential, brute force, cropping attack, etc. Results: The overall results show that the proposed FEDM model attains much superior performance considering histogram, UACI, NPCR, and runtime. The FEDM model can resist against SA. The FEDM model attains better performance because IBS is used in each step of CS. Thus, a correlation between adjacent pixels is less and aids superior security performance. Further, the FEDM model attains better UACI and NPCR performance when compared with the exiting image encryption model. Conclusion: The FEDM security method can resist DA, noise, cropping attack, and linear attacks more efficiently due to a larger keyspace. Further, the FEDM takes less time for provisioning security. Along with this, FEDM works smoothly under a cloud computing environment. No prior work has considered runtime performance evaluation under the cloud computing environment. FEDM model will significantly aid in reducing the overall operational cost of a cloud computing environment with a reduction in processing time as cloud charge is based on hours of usage. © 2022 Bentham Science Publishers.
引用
收藏
页码:636 / 648
页数:12
相关论文
共 50 条
  • [1] Mobile Sensor Cloud Computing Controlling and Securing Data Processing Over Smart Environment through Mobile Sensor Cloud Computing (MSCC)
    Kumar, Ranbijay
    Rajalakshmi, S.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 687 - 694
  • [2] Mobile Cloud Computing Framework for Securing Data
    Ikram, Arfa Arslaan
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Abid, Rabia
    Crichigno, Jorge
    Srivastava, Gautam
    2021 44th International Conference on Telecommunications and Signal Processing, TSP 2021, 2021, : 309 - 315
  • [3] Mobile Cloud Computing Framework for Securing Data
    Ikram, Arfa Arslaan
    Javed, Abdul Rehman
    Rizwan, Muhammad
    Abid, Rabia
    Crichigno, Jorge
    Srivastava, Gautam
    2021 44TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2021, : 309 - 315
  • [4] Efficient dynamic resource allocation method for cloud computing environment
    Belgacem, Ali
    Beghdad-Bey, Kadda
    Nacer, Hassina
    Bouznad, Sofiane
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2871 - 2889
  • [5] Efficient dynamic resource allocation method for cloud computing environment
    Ali Belgacem
    Kadda Beghdad-Bey
    Hassina Nacer
    Sofiane Bouznad
    Cluster Computing, 2020, 23 : 2871 - 2889
  • [6] Efficient Semantic Search over Encrypted Data in Cloud Computing
    Moh, Teng-Sheng
    Ho, Kam Ho
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 382 - 390
  • [7] Securing Public Data Storage in Cloud Environment
    Boopathy, D.
    Sundaresan, M.
    ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 555 - 562
  • [8] Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment
    Namasudra, Suyel
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2289 - 2300
  • [9] ENCRYPTION AS A SERVICE FOR SECURING DATA IN MOBILE CLOUD COMPUTING
    Mouhib, Ibtihal
    Driss, El Ouadghiri
    Zine-Dine, Khalid
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 546 - 550
  • [10] Securing Cloud Computing Environment using a new Trend of Cryptography
    Mohammad, Omer K. Jasim
    Abbas, Safia
    El-Horbaty, El-Sayed M.
    Salem, Abdel-Badeeh M.
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 217 - 224