Securing Cloud Data using Visual Cryptography

被引:0
|
作者
Brindha, K. [1 ]
Jeyanthi, N. [1 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
关键词
Cloud computing; outsourced; security; prototype; utilization; visual cryptographic technique;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing model allows the customers to access the secured information from the cloud server without the help of using the hardware or the software. For the effective usage of the data from the cloud provider, the data owner encrypts the data and then its ends to the cloud server. To secure the data in the cloud we have dealt through lots of security issues earlier. In this paper we have proposed the idea how the data could be made more secured using visual cryptographic techniques. This model not only increases the trust among the users to send their information with full reliability and also helps in the authorization of the users.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] An Approach For Securing Data On Cloud Using Data Slicing And Cryptography
    Bobde, Rupesh R.
    Khaparde, Amit
    Raghuwanshi, M. M.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [2] Cryptography in the cloud: securing cloud data with encryption
    Mani, A.
    Kakade, Kiran Shrimant
    Therasa, P. R.
    Vanitha, M.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 577 - 589
  • [3] Securing Multiple Color Secrets Using Visual Cryptography
    Vincent, Jenila M.
    Helena, E. Angeline
    [J]. INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 806 - 812
  • [4] Securing Surveillance Data Using Incremental Cryptography
    Antony, Lissiyas
    Sobhana, N., V
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2021), 2022, 417 : 216 - 225
  • [5] Secured Document Sharing Using Visual Cryptography in Cloud Data Storage
    Brindha, K.
    Jeyanthi, N.
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (04) : 111 - 123
  • [6] Securing Cloud Computing Environment using a new Trend of Cryptography
    Mohammad, Omer K. Jasim
    Abbas, Safia
    El-Horbaty, El-Sayed M.
    Salem, Abdel-Badeeh M.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 217 - 224
  • [7] Securing EPR Data Using Cryptography and Image Watermarking
    Zaz, Youssef
    El Fadil, Lhoussain
    El Kayyali, Mohamed
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2012, 4 (02) : 76 - 87
  • [8] Feature Based Encryption Technique For Securing Forensic Biometric Image Data Using AES and Visual Cryptography
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, J. M.
    Quaynor, Nii Narku
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 199 - 204
  • [9] Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review
    Mamta
    Khare, Mayank Deep
    Yadav, Chandra Shekhar
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017), 2017, : 413 - 416
  • [10] Securing information display by use of visual cryptography
    Yamamoto, H
    Hayasaki, Y
    Nishida, N
    [J]. OPTICS LETTERS, 2003, 28 (17) : 1564 - 1566