Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review

被引:0
|
作者
Mamta [1 ]
Khare, Mayank Deep [1 ]
Yadav, Chandra Shekhar [1 ]
机构
[1] NIET, Greater Noida, Uttar Pradesh, India
关键词
Cloud computing; visual cryptography; Encryption; Decryption; Secret key; Genetic Algorithm; Crossover; Mutation; Critical Index;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's Cloud Computing is the great concept in the development of an on-demand network which provides access to a common pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform, and Software can be accessed as a service. Cloud Computing provides reimbursement in terms of low cost and convenience of data, but its unique feature is its security. Sharing of data is an imperative functionality in cloud storage. In Cloud computing environment the sharing of data and transfer has increased exponentially. There are the various factors in data security like integrity, confidentiality, and authentication services. Maintaining secrecy and protection for critical data are highly challenging, particularly when data are stored in memory or send via any communication networks. I have reviewed several papers regarding our concept and what I found is that in some papers, GA has been used for security, In other papers used GA, VC, and Steganography together for enhancing security. But some are providing security quite well, having high overhead. And those which have low overhead, have poor security. In this paper we have described the genetic algorithm and visual cryptography related papers which helps to know the all areas where these techniques will be used. Genetic algorithm is used for providing encryption and decryption, for hiding critical data we are using visual cryptography
引用
收藏
页码:413 / 416
页数:4
相关论文
共 50 条
  • [21] Secured Document Sharing Using Visual Cryptography in Cloud Data Storage
    Brindha, K.
    Jeyanthi, N.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (04) : 111 - 123
  • [22] Secure Retrieval in Outsourced Environment using Genetic Algorithm
    Vasgi, Bharati P.
    Kulkarni, Uday V.
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [23] Secure Mail using Visual Cryptography (SMVC)
    Ajish, S.
    Rajasree, R.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [24] Convergent encryption enabled secure data deduplication algorithm for cloud environment
    Ahmad, Shahnawaz
    Arif, Mohd.
    Ahmad, Javed
    Nazim, Mohd.
    Mehfuz, Shabana
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (21):
  • [25] Secure Image Transmission using Visual Cryptography Scheme without Changing the Color of the Image
    Johny, Shiji
    Antony, Anil
    2015 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICETECH), 2015, : 42 - 44
  • [26] Secure data storage and retrieval system using hybridization of orthogonal knowledge swarm optimization and oblique cryptography algorithm in cloud
    Reddy, N. Madhusudhana
    Ramesh, G.
    Kasturi, Srinivasa Babu
    Sharmila, D.
    Gopichand, G.
    Robinson, L. Thomas
    APPLIED NANOSCIENCE, 2022, 13 (3) : 2449 - 2461
  • [27] Secure Data Transmission Protocol based on Quantum Cryptography
    Hong, Joonmo
    Kang, BooJoong
    Kim, Hye Seon
    Chang, Peter
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4989 - 5002
  • [28] Secure Data Transmission on MANET by Hybrid Cryptography Technique
    Sharma, Ashish
    Bhuriya, Dinesh
    Singh, Upendra
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [29] Secure data storage and retrieval system using hybridization of orthogonal knowledge swarm optimization and oblique cryptography algorithm in cloud
    N. Madhusudhana Reddy
    G. Ramesh
    Srinivasa Babu Kasturi
    D. Sharmila
    G. Gopichand
    L. Thomas Robinson
    Applied Nanoscience, 2023, 13 : 2449 - 2461
  • [30] Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme
    Gayathri, R.
    Nagarajan, V.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 118 - 123