1,807 Hits in 4.9 sec

A Secure Data Classification Model in Cloud Computing Using Machine Learning Approach

Kulwinder Kaur, Vikas Zandu
2016 International Journal of Grid and Distributed Computing  
Following that an efficient security mechanism has to be deployed by means of encryption, authentication, and authorization or by some other method to ensure the privacy of consumer's data on cloud storage  ...  This paper involves the efforts to analyze the security issues and then proposes a framework to address these security issues at the authentication and storage level in cloud computing.  ...  Acknowledgments The paper has been composed with the kind assistance, guidance and support of my department who have helped me in this work.  ... 
doi:10.14257/ijgdc.2016.9.8.02 fatcat:cd7la6xzhngxhavkbf3rc64zgu

A Framework for Leveraging Image Security in Cloud with Simultaneous Compression and Encryption Using Compressive Sensing

Naga Raju Hari Manikyam, Munisamy Shyamala Devi
2021 Revue d'intelligence artificielle : Revue des Sciences et Technologies de l'Information  
The framework has an underlying algorithm known as Hybrid Image Security Algorithm (HISA).  ...  In this paper, we proposed a framework known as Cloud Image Security Framework (CISF) leveraging outsourced image security.  ...  Privacy preserving approach is coupled with CS for outsourcing identity authentication and image storage [14] .  ... 
doi:10.18280/ria.350110 fatcat:6loab446mbavpkfrm3ppxrokuu

A Cloud-based Framework to Secure Medical Image Processing

Mbarek Marwan, Ali Kartit, Hassan Ouahmane
2018 Journal of Mobile Multimedia  
In the last few years, advanced software for processing medical images has gained a great interest in modern medicine.  ...  Nevertheless, implementing these imaging tools often requires an important capital budget in both IT applications and hardware.  ...  More specifically, Service-Level Agreement (SLA) is an official commitment used mainly to set expectations for both clients and cloud providers.  ... 
doi:10.13052/jmm1550-4646.1434 fatcat:2sg23kygirbefhi4ef3fdrabhm

Design and Implementation of Secure Multi-Authentication Data Storage in Cloud using Machine Learning Data Classification

Amanpreet Singh, Manju Bala, Supreet Kaur
2017 International Journal of Computer Applications  
Following that an efficient security mechanism must be deployed by means of encryption, authentication, and authorization or by some enhanced means of security techniques to ensure the privacy of data  ...  This paper involves the efforts to research the security risk and then proposes a framework to address these risk on the authentication and storage level in cloud computing.  ...  It exhibits an embedding algorithm for hiding ciphered messages in nonadjacent and irregular pixel areas in edges and smooth regions of images.  ... 
doi:10.5120/ijca2017913129 fatcat:n6ncoyvvfvawfg4rs6gszorhwu

Enhancing Mobile Cloud Computing Security Using Steganography

Hassan Reza, Madhuri Sonawane
2016 Journal of Information Security  
In this paper, we demonstrate how steganography, which is a secrecy method to hide information, can be used to enhance the security and privacy of data (images) maintained on the cloud by mobile applications  ...  Our proposed model works with a key, which is embedded in the image along with the data, to provide an additional layer of security, namely, confidentiality of data.  ...  This approach combines and enhances the trust in mobile computing as well as the efficiency of cloud computing.  ... 
doi:10.4236/jis.2016.74020 fatcat:zsi7e5papfd4ld2c4ngdzenmi4

A Data Security Algorithm for the Cloud Computing based on Elliptic Curve Functions and Sha3 Signature

Sonia KOTEL, Fatma SBIAA
2022 International Journal of Advanced Computer Science and Applications  
In this paper, we will study the security concept in Cloud Computing applications. Then, an ECC (Elliptical Curve Cryptography) based algorithm is designed and tested to ensure cloud security.  ...  Indeed, many techniques are used to enhance data security on cloud computing storage environment. Nevertheless, the most significant method for data protection is encryption.  ...  The main contribution consists in the hybrid approach that combines the simple mapping method to the OTP process. The final comparison will allow us to validate the appropriate scenario.  ... 
doi:10.14569/ijacsa.2022.0130355 fatcat:v4d3lvcjtnemtck2vxcpwqzoee

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

Rose Adee, Haralambos Mouratidis
2022 Sensors  
This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data  ...  This proposed approach ensures more cloud data redundancy, flexibility, efficiency, and security by protecting data confidentiality, privacy, and integrity from attackers.  ...  Special thanks to Andreas Constantinou for contributing to the early parts of the research. Finally, thanks to all our peers for providing additional constructive feedback with insightful comments.  ... 
doi:10.3390/s22031109 pmid:35161853 pmcid:PMC8839104 fatcat:kie3bre67fce3cvjv5gac4jdoq

An Image Processing-based Test Bench for Performance Evaluation in Hybrid Clouds

Rafael D.C. Santos, Bernady O. Apduhan
2013 2013 13th International Conference on Computational Science and Its Applications  
In this paper we propose an image processing-based test bench that monitors the performance of the clouds resources to gather useful statistics and to determine which resource should be used for a specific  ...  Hybrid clouds are combinations of private, community and/or public clouds, and allow the creation of "cloud bursting" deployment models, in which part of the data processing is done in a private cloud  ...  There exists several different image processing operations that are suitable either for generic processing (e.g. filtering, enhancing, detection of low-level elements) that can be applied to most images  ... 
doi:10.1109/iccsa.2013.54 dblp:conf/iccsa/SantosA13 fatcat:p52gznpwzbbonahjj6277ucura

A Review on Security Issues and their Impact on Hybrid Cloud Computing Environment

Mohsin Raza, Ayesha Imtiaz, Umar Shoaib
2019 International Journal of Advanced Computer Science and Applications  
In order to key benefit with hybrid cloud model, there are different security issues that have been shown to address.  ...  IT cloud technologies are increasingly turning to hybrid clouds.  ...  We are implementing the modified approach for the image and text encryption using method in which image is cut down into pieces and their pixel values get modified by using noise values.  ... 
doi:10.14569/ijacsa.2019.0100346 fatcat:pwgaeyddhzfv5ekxabneql5qwm

Evolutionary Computing Assisted Visually- Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment

R. Denis, P. Madhubala
2020 International Journal of Computer Networks And Applications  
However, it demands enhancement in both stages to meet cloud-specific communication efficiency.  ...  The proposed model achieved higher security, high embedding capacity as well as image quality, which is vital for cloud communication.  ...  In the proposed model these cryptography algorithms are applied in a strategic manner that ensures an enhancement in security level.  ... 
doi:10.22247/ijcna/2020/205321 fatcat:xzvlyfah3raadgvln3gcz4oahe

Scalable Privacy Preservation in Big Data a Survey

S. Vennila, J. Priyadarshini
2015 Procedia Computer Science  
Existing approaches employ local recording anonymization for privacy preserving where data are processed for analysis, mining and sharing.  ...  A survey have been taken for the MapReduce framework based big data privacy preservation in Cloud environment.  ...  ., [3] proposed an efficient scheme to address the increasing concern of data privacy in cloud for image data.  ... 
doi:10.1016/j.procs.2015.04.033 fatcat:ptyt3zbxyjdqjpmc3vcnpqvqxe

Enhancing Cloud Computing Security by Using Pixel Key Pattern

Randeep Kaur, Jagroop Kaur
After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud.  ...  We will be fixing threats in data mining to Personal/private data in cloud systems.  ...  There are some open cloud manifesto standards and few efforts made by the cloud security alliance to standardize the process in the cloud.  ... 
doi:10.24297/ijct.v14i7.1894 fatcat:aw76hkhajjbobji75ux3esyely

A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment

Garima Verma, Rupak Chakraborty
2019 Ingénierie des Systèmes d'Information  
The hybrid approach combines feature extraction and encryption techniques to enhance the security of accessing data from the cloud.  ...  To overcome this challenge, a hybrid two-phase security system for preserving the privacy of data on the cloud has been proposed.  ...  Encouraged by the stated techniques, one hybrid approach in combination with the biometric and encryption technique has been proposed to preserve better security as well as privacy in the cloud system.  ... 
doi:10.18280/isi.240315 fatcat:jecoh75njrhppf2wwabpxfxsqa

Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks

Conghuan Ye, Zenggang Xiong, Yaoming Ding, Guangwei Wang, Jiping Li, Kaibing Zhang
2014 Journal of Visual Languages and Computing  
The proposed method, to the best of our knowledge, is the first JFE method using CA and SNA in hybrid domains for security and privacy in social networks.  ...  Secondly, fingerprints are embedded in the DWT domain. Thirdly, CA is used for permutation in the DWT domain. Finally, the image is diffused with XOR operation in the spatial domain.  ...  , and none of them can be applied to hybrid domains for security and privacy in social networks.  ... 
doi:10.1016/j.jvlc.2014.10.020 fatcat:o57xsqml2zf6vdk2fr3obeubx4

Privacy and Security Aware Cloud Storage using Double Cryptography Method

2019 International journal of recent technology and engineering  
In this paper, we proposed an improved double encryption-decryption (IDED) method for a secure cloud system.  ...  Among which the trustworthiness of third-party providers increases the attention on developing an enhanced cloud system.  ...  DhuratëHyseni et al [17] proposed an advanced model to Increase the Security of Sensitive Data in Cloud Computing. The approach is mainly designed for companies and organizations.  ... 
doi:10.35940/ijrte.d1108.1284s219 fatcat:l6tb23qvwndrxinv4ybshw6mvu
« Previous Showing results 1 — 15 out of 1,807 results