Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review

被引:0
|
作者
Mamta [1 ]
Khare, Mayank Deep [1 ]
Yadav, Chandra Shekhar [1 ]
机构
[1] NIET, Greater Noida, Uttar Pradesh, India
关键词
Cloud computing; visual cryptography; Encryption; Decryption; Secret key; Genetic Algorithm; Crossover; Mutation; Critical Index;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's Cloud Computing is the great concept in the development of an on-demand network which provides access to a common pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform, and Software can be accessed as a service. Cloud Computing provides reimbursement in terms of low cost and convenience of data, but its unique feature is its security. Sharing of data is an imperative functionality in cloud storage. In Cloud computing environment the sharing of data and transfer has increased exponentially. There are the various factors in data security like integrity, confidentiality, and authentication services. Maintaining secrecy and protection for critical data are highly challenging, particularly when data are stored in memory or send via any communication networks. I have reviewed several papers regarding our concept and what I found is that in some papers, GA has been used for security, In other papers used GA, VC, and Steganography together for enhancing security. But some are providing security quite well, having high overhead. And those which have low overhead, have poor security. In this paper we have described the genetic algorithm and visual cryptography related papers which helps to know the all areas where these techniques will be used. Genetic algorithm is used for providing encryption and decryption, for hiding critical data we are using visual cryptography
引用
下载
收藏
页码:413 / 416
页数:4
相关论文
共 50 条
  • [1] An Efficient Secure Data Transmission Based on Visual Cryptography
    Jabi, Rubeena
    Patel, Punyaban
    Dubey, Deepty
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [2] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [3] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [4] Securing Cloud Data using Visual Cryptography
    Brindha, K.
    Jeyanthi, N.
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [5] BITS TO COLOR IMAGE CRYPTOGRAPHY FOR SECURE DATA TRANSMISSION IN CLOUD DATABASES
    MadhaviLatha, P.
    Katamaneni, Madhavi
    Guttikonda, Geetha
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 10 - 14
  • [6] Secure Data Transmission in Smart Cities Using DNA Cryptography with LZW Compression Algorithm
    Karthikeyan, S.
    Poongodi, T.
    OPTOELECTRONICS INSTRUMENTATION AND DATA PROCESSING, 2024, 60 (01) : 156 - 167
  • [7] Deployment of Secure Sharing: Authenticity and Authorization using Cryptography in Cloud Environment
    Upadhyaya, Akanksha
    Bansal, Monika
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 852 - 855
  • [8] GLEnc Algorithm to Secure Data in Public Cloud Environment
    George, Lalu P.
    Amalarethinam, D. I. George
    Chandran, Anjana S.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2018 - 2022
  • [9] SDPBDVC: secure data processing on big data using visual cryptography
    Brindha, K.
    Jeyanthi, N.
    INTERNATIONAL JOURNAL OF SERVICES TECHNOLOGY AND MANAGEMENT, 2020, 26 (2-3) : 237 - 251
  • [10] Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm
    Maitri, Punam V.
    Verma, Aruna
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1635 - 1638