Study of Image Data Security with Cloud

Pronika Chawla, Harshit Parihar, Ankit Mathur
{"title":"Study of Image Data Security with Cloud","authors":"Pronika Chawla, Harshit Parihar, Ankit Mathur","doi":"10.1109/ICOEI56765.2023.10125614","DOIUrl":null,"url":null,"abstract":"The on-demand availableness of computer systems resources, especially storage of data (cloud storage) and rectifying power, with no direct ongoing administration by the user is what they call cloud computing. Large cloud functions are usually spread among several locations, each of which constitutes a data center. Customers may save money on capital expenses by using cloud computing, which frequently takes a “pay-as-you-go” approach. Coherence in cloud computing is achieved by sharing resources. In today's world of the Internet, demand for cloud services is increasing drastically leading to the production of new services day by day. As the services increase, the data gets primarily targeted by spiteful users who attempt to steal the data for their own atrocious and unethical activities. Users and trustworthy applications are considering more security and privacy and services get more in demand. Moreover, this study has reviewed several algorithms such as CPE-ABE (Ciphertext policy attribute-based encryption), ABE, KP-ABE (Key policy attribute-based encryption) CSP (Constraint satisfaction problem), PKG, AES (Advanced Encryption Standards), SHA-1 (Secure Hash Algorithm), Photo encryption, Photo decryption, PRE, IDEA (International Data Encryption algorithm) and LSBG (Least Significant Bit Grouping) for image data security. As already discussed, the increasing threats and frauds around the world, safe and secure applications and services should be created to resolve this problem so that people can store data on a platform that can be relied on. This research study has discussed about the concept of what are the paradigms required for securing and protecting the data and securing the image data at an encrypted level. This study has reviewed several existing research works, studied different algorithms which have been used in different research articles, and compared their strengths and drawbacks accordingly. Different research works have been summarized in a form of table, which includes multiple algorithms that are used to secure data, which are then distinguished them based on the strengths and drawbacks.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI56765.2023.10125614","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The on-demand availableness of computer systems resources, especially storage of data (cloud storage) and rectifying power, with no direct ongoing administration by the user is what they call cloud computing. Large cloud functions are usually spread among several locations, each of which constitutes a data center. Customers may save money on capital expenses by using cloud computing, which frequently takes a “pay-as-you-go” approach. Coherence in cloud computing is achieved by sharing resources. In today's world of the Internet, demand for cloud services is increasing drastically leading to the production of new services day by day. As the services increase, the data gets primarily targeted by spiteful users who attempt to steal the data for their own atrocious and unethical activities. Users and trustworthy applications are considering more security and privacy and services get more in demand. Moreover, this study has reviewed several algorithms such as CPE-ABE (Ciphertext policy attribute-based encryption), ABE, KP-ABE (Key policy attribute-based encryption) CSP (Constraint satisfaction problem), PKG, AES (Advanced Encryption Standards), SHA-1 (Secure Hash Algorithm), Photo encryption, Photo decryption, PRE, IDEA (International Data Encryption algorithm) and LSBG (Least Significant Bit Grouping) for image data security. As already discussed, the increasing threats and frauds around the world, safe and secure applications and services should be created to resolve this problem so that people can store data on a platform that can be relied on. This research study has discussed about the concept of what are the paradigms required for securing and protecting the data and securing the image data at an encrypted level. This study has reviewed several existing research works, studied different algorithms which have been used in different research articles, and compared their strengths and drawbacks accordingly. Different research works have been summarized in a form of table, which includes multiple algorithms that are used to secure data, which are then distinguished them based on the strengths and drawbacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于云的图像数据安全研究
计算机系统资源的按需可用性,特别是数据存储(云存储)和校正能力,无需用户进行直接的持续管理,这就是他们所说的云计算。大型云功能通常分布在多个位置,每个位置都构成一个数据中心。客户可以通过使用云计算来节省资本开支,云计算通常采用“现收现付”的方式。云计算中的一致性是通过资源共享来实现的。在当今的互联网世界中,对云服务的需求正在急剧增加,导致新服务的产生。随着服务的增加,数据主要成为恶意用户的目标,他们试图窃取数据以进行自己的残暴和不道德的活动。用户和值得信赖的应用程序正在考虑更多的安全和隐私,服务的需求也越来越大。此外,本研究还回顾了几种用于图像数据安全的算法,如CPE-ABE(基于密文策略属性的加密)、ABE、KP-ABE(基于密钥策略属性的加密)、CSP(约束满足问题)、PKG、AES(高级加密标准)、SHA-1(安全哈希算法)、照片加密、照片解密、PRE、IDEA(国际数据加密算法)和LSBG(最低有效位分组)。正如已经讨论过的,世界各地日益增加的威胁和欺诈,应该创建安全可靠的应用程序和服务来解决这个问题,以便人们可以将数据存储在一个可以依赖的平台上。本研究讨论了保护和保护数据所需的范式以及在加密级别保护图像数据的概念。本研究回顾了一些现有的研究工作,研究了不同研究文章中使用的不同算法,并相应地比较了它们的优缺点。不同的研究工作以表格的形式进行了总结,其中包括用于保护数据的多种算法,然后根据优点和缺点对它们进行了区分。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design of Crop Recommender System using Machine Learning and IoT Implementation of Ripple Carry Adder Using Full Swing Gate Diffusion Input Minimization of Losses in 119 Bus Radial Distribution Network using PSO Algorithm A Novel Cell Density Prediction Design using Optimal Deep Learning with Salp Swarm Algorithm Blockchain-based Secure Health Records in the Healthcare Industry
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1