云环境下增强图像安全的混合三数据加密标准和河豚算法的实现

Mohan Nagamunthala, Ramakrishnan Manjula
{"title":"云环境下增强图像安全的混合三数据加密标准和河豚算法的实现","authors":"Mohan Nagamunthala, Ramakrishnan Manjula","doi":"10.4236/jcc.2023.1110009","DOIUrl":null,"url":null,"abstract":"In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment\",\"authors\":\"Mohan Nagamunthala, Ramakrishnan Manjula\",\"doi\":\"10.4236/jcc.2023.1110009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method.\",\"PeriodicalId\":67799,\"journal\":{\"name\":\"电脑和通信(英文)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"电脑和通信(英文)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4236/jcc.2023.1110009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"电脑和通信(英文)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4236/jcc.2023.1110009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

近年来,技术的进步为世界提供了云计算,它可以高效地传输、存储和处理视频、音频、图像和文本形式的巨大数据块。尽管整个信息技术界都在大肆宣传这个话题,但保护存储在云服务器上的敏感数据是关键问题之一。网络攻击的数量之大、技术之复杂表明,与云上其他形式的数据相比,私人图片需要格外小心。由于将私人图片存储在云中的用户无法控制数据的隐私保护,因此云供应商必须在身份验证和防止网络攻击方面确保更高级别的安全性。图像加密算法通过将图片转换为难以理解的形式来保护视觉数据,从而在可靠的不受限制的社交媒体上保护图片的机密性。本工作旨在开发一种通过加密算法增强云平台上用户照片安全性的方法。提出的混合技术提出了两个简单的步骤保护图像的想法。首先,我们通过提供明文和密钥作为输入,使用三重数据加密标准(TDES)生成芯片文本(即密钥)。然后,将从TDES中获得的密文交给Blowfish算法对用户图像进行加密。然后将加密的图像上传到云服务器的数据库,并且可以在用户请求时检索它。基于云存储时间、加密时间、解密时间和加密吞吐量等性能指标,对图像加密和解密过程进行分析和评估。与传统图像加密方法的比较研究将证明我们提出的方法的有效性和鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment
In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
784
期刊最新文献
Evaluation of the Global Horizontal Irradiation (GHI) on the Ground from the Images of the Second Generation European Meteorological Satellites MSG Improving Resilience Models of Health Systems before COVID-19 Pandemic in Côte d’Ivoire COST 231-Hata Propagation Model Optimization in 1800 MHz Band Based on Magnetic Optimization Algorithm: Application to the City of Limbé Machine Learning-Based Approach for Identification of SIM Box Bypass Fraud in a Telecom Network Based on CDR Analysis: Case of a Fixed and Mobile Operator in Cameroon Supervised Learning Algorithm on Unstructured Documents for the Classification of Job Offers: Case of Cameroun
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1