Habibur Rahman, Nazrul Islam, Mehedy Hasan Rafsan Jany, Shariful, Mohammad Motiur Rahman
{"title":"基于随机密钥生成方法的云计算多媒体内容安全","authors":"Habibur Rahman, Nazrul Islam, Mehedy Hasan Rafsan Jany, Shariful, Mohammad Motiur Rahman","doi":"10.1109/ICIVPR.2017.7890859","DOIUrl":null,"url":null,"abstract":"The cloud computing offers high scalability, confidentiality and the easy accessibility of the information over the Internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM can extract all information. Thus, this paper implements a double stage encryption algorithm for multimedia content security using random key generation approach. The first stage encrypted multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated asymmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover the multimedia contents. Low complexity and easy implementation make the proposed algorithm widely applicable safeguard in the cloud computing.","PeriodicalId":126745,"journal":{"name":"2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR)","volume":"12 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Multimedia content security with random key generation approach in cloud computing\",\"authors\":\"Habibur Rahman, Nazrul Islam, Mehedy Hasan Rafsan Jany, Shariful, Mohammad Motiur Rahman\",\"doi\":\"10.1109/ICIVPR.2017.7890859\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The cloud computing offers high scalability, confidentiality and the easy accessibility of the information over the Internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM can extract all information. Thus, this paper implements a double stage encryption algorithm for multimedia content security using random key generation approach. The first stage encrypted multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated asymmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover the multimedia contents. Low complexity and easy implementation make the proposed algorithm widely applicable safeguard in the cloud computing.\",\"PeriodicalId\":126745,\"journal\":{\"name\":\"2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR)\",\"volume\":\"12 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIVPR.2017.7890859\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIVPR.2017.7890859","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multimedia content security with random key generation approach in cloud computing
The cloud computing offers high scalability, confidentiality and the easy accessibility of the information over the Internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM can extract all information. Thus, this paper implements a double stage encryption algorithm for multimedia content security using random key generation approach. The first stage encrypted multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated asymmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover the multimedia contents. Low complexity and easy implementation make the proposed algorithm widely applicable safeguard in the cloud computing.