Practical Privacy-Preserving in Cloud Image Repositories
M. Sivaprakash1, R. Vidyavathi2, G. Nagarajan3
1R. Vidyavathi, Department of Computer Science, K.S.R. College of Engineering(A), Tiruchengode, India.
2M. Sivaprakash, Department of Computer Science, K.S.R. College of Engineering(A), Tiruchengode, India.
3G. Nagarajan, Department of Computer Science, K.S.R. College of Engineering(A), Tiruchengode, India.
Manuscript received on 29 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 656-660 | Volume-8 Issue-9, July 2019 | Retrieval Number: I7715078919/19©BEIESP | DOI: 10.35940/ijitee.I7715.078919
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing is an emerging technology utilized widely due to its various advantages. However the major issue faced here is security in maintaining files. Our proposed work focuses on storing and retrieving of image data in secure way in cloud through double step verification. In general, cryptography is utilized to store data in secure way. The key logic is when there is less security automatically data will be reveal to unauthorized users. In our proposed method, these issues are overcome through double step verification. Initially image has been encrypted through Attribute Based Encryption (ABE). In addition to provide better security repository encryption has been implemented by RC4 approach. This will provide better security for user data in cloud through this two step verification. To ensure originality of user image watermarking technique has been implemented. Therefore it ensures without user knowledge an unauthorized user could not get the original image. Hence our system achieves maximum security compared to other existing approaches.
Index Terms: Security, Cloud, ABE, Repository Encryption and Watermarking.
Scope of the Article: Cloud Computing