Achieving Privacy Assured Outsourcing of Data in Cloud Using Optimalvisual Cryptography

نویسندگان

  • T. Nataraj
  • S. K. Mahalingam
چکیده

Security has emerged as the most feared aspect of cloud computing and a major hindrance for the customers. In existing system for establishing secure and privacy-assured service outsourcing in cloud computing which uses Linear programming and compressed sensing techniques to transform images, which aims to take security, complexity, and efficiency into consideration from the very beginning of the service flow. But it makes more complexity because the data is sent in its raw form to one cloud. The cryptography schemes are computationally more complex. In order to enhance the security and reduce the complexity, to use data obfuscation through a novel visual cryptography. A conventional threshold (k out of n) visual secret sharing scheme encodes one secret image into transparencies (called shares) such that any group of transparencies reveals when they are superimposed, while that of less than ones cannot. In the proposed work, novel multiple secret visual cryptographic schemes are used to encode the secret s images into n shares. Convert the data into basic images and send the encrypted form of image by using multiple visual cryptographic schemes. (k, n, s) -MVCS, in which the superimposition of each group of shares reveals the first, second, s secret, respectively where s=n-k+1. The proposed system also considers visual cryptography without pixel expansion. A new scheme for visual cryptography is developed and configured for the cloud for storing and retrieving textual data. Testing the system with query execution on a cloud database indicates full accuracy in record retrievals with negligible false positives. In addition, the system is resilient to attacks from within and outside the cloud. An experimental result shows that the Complexity analysis, Security analysis, the system is tested against artificial intelligence/machine learning based attacks. Keywords— Security and privacy, Cloud computing, visual secret sharing, multiple secrets

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Access Control and File Assured Deletion for Secured Cloud Storage

This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports assured deletion of files. As we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outs...

متن کامل

FADE: Secure Overlay Cloud Storage with File Assured Deletion

While we can now outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of outsourced data. We design FADE, a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with policy-based file assured deletion. FADE is built upon st...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Data Security and Privacy for Outsourced Data In the Cloud

Although outsourcing data to cloud storage has become popular, the increasing concerns about data security and privacy in the cloud blocks broader cloud adoption. Ensuring data security and privacy, therefore, is crucial for better and broader adoption of the cloud. This tutorial provides a comprehensive analysis of the state-of-the-art in the context of data security and privacy for outsourced...

متن کامل

Preserving Privacy of Cloud Data Using Homomorphic Encryption in MapReduce

In recent years, outsourcing large amount of data in cloud and how to manage the data raises many challenges with respect to privacy. The concerns of privacy can be addressed if cloud users encrypt the data deployed in the cloud. Among the various cryptographic encryption schemes, homomorphic scheme allow to perform meaningful computations on encrypted data. In this context, the research deals ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014