Real-Time Image Privacy Preservation using AES with Salt key and Gaussian Blur Algorithms with the application of Data Perturbation in Cloud

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Rapid increase in image data produced by individuals and companies provoke privacy hitches such as unauthorized revelation of personal data and person's individuality stealing, but it can be used to protect privacy of the user and also personal information. Data provider and Cloud Administrator are two types of users who have privilege and access. However, there is absence of research examining the effectiveness of implementing techniques to images as a technology that protects privacy. The
more » ... nced Encryption Standard (AES) algorithm is selected for the login authentication process, which ensures the protection of information from unauthorized access and is proposed to create a random key generation. Data perturbation is used to add noise in databases, and Gaussian blur is done to introduce some degree of degradation in the original image. The obtained test results show that an AES with salt key can be randomly generated. In this process, security authentication is reinforced in the ciphertext changes that make up the key words for each encryption process. The result shows that the model is relatively fast with a time average of 0.034 s occupying less than 100kB of memory space.
doi:10.35940/ijitee.b7176.019320 fatcat:kjexynrepbc55mn4az6vxcirna