Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review

被引:0
|
作者
Mamta [1 ]
Khare, Mayank Deep [1 ]
Yadav, Chandra Shekhar [1 ]
机构
[1] NIET, Greater Noida, Uttar Pradesh, India
关键词
Cloud computing; visual cryptography; Encryption; Decryption; Secret key; Genetic Algorithm; Crossover; Mutation; Critical Index;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's Cloud Computing is the great concept in the development of an on-demand network which provides access to a common pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform, and Software can be accessed as a service. Cloud Computing provides reimbursement in terms of low cost and convenience of data, but its unique feature is its security. Sharing of data is an imperative functionality in cloud storage. In Cloud computing environment the sharing of data and transfer has increased exponentially. There are the various factors in data security like integrity, confidentiality, and authentication services. Maintaining secrecy and protection for critical data are highly challenging, particularly when data are stored in memory or send via any communication networks. I have reviewed several papers regarding our concept and what I found is that in some papers, GA has been used for security, In other papers used GA, VC, and Steganography together for enhancing security. But some are providing security quite well, having high overhead. And those which have low overhead, have poor security. In this paper we have described the genetic algorithm and visual cryptography related papers which helps to know the all areas where these techniques will be used. Genetic algorithm is used for providing encryption and decryption, for hiding critical data we are using visual cryptography
引用
收藏
页码:413 / 416
页数:4
相关论文
共 50 条
  • [41] Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 130 : 551 - 578
  • [42] A New Approach for Maintaining Data Security using Cryptography in a Hybrid Cloud Environment
    Jebaseli, Nisha
    Banu, A. Fairose
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (02) : 214 - 224
  • [43] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment
    Acharya, Shreenath
    Manoj, K.
    Gayana, M. N.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873
  • [44] Enabling secure authentication using fingerprint and visual cryptography
    Annappanavar, Sneha Manohar
    Chavan, Pallavi Vijay
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (06) : 614 - 639
  • [45] Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application
    Prema, G.
    Natarajan, S.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 727 - 730
  • [46] A Secure Data Transmission Mechanism for Cloud Outsourced Data
    Alhaj, Abdullah
    Aljawarneh, Shadi
    Masadeh, Shadi
    Abu-Taieh, Evon
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (01) : 34 - 43
  • [47] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [48] Musical Cryptography using Genetic Algorithm
    Kumar, Chandan
    Dutta, Sandip
    Chakborty, Soubhik
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1742 - 1747
  • [49] A High Secure Medical Image Storing and Sharing in Cloud Environment Using Hex Code Cryptography Method-Secure Genius
    Preethi, P.
    Asokan, R.
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2019, 9 (07) : 1337 - 1345
  • [50] Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment
    Namasudra, Suyel
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (04) : 2289 - 2300