Rashmita Pandey - Academia.edu (original) (raw)
Uploads
Papers by Rashmita Pandey
The cloud computing offers high scalability, confidentiality and easy accessibility of informatio... more The cloud computing offers high scalability, confidentiality and easy accessibility of information over the internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) beside targeted VM can extract all information. Thus, this paper implements double stage encryption algorithm for multimedia content security using random key generation. The first stage encrypts multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated symmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover multimedia contents. Low complexity and easy implementations make the proposed algorithm widely applicable safeguard in cloud computing.
The cloud computing offers high scalability, confidentiality and easy accessibility of informatio... more The cloud computing offers high scalability, confidentiality and easy accessibility of information over the internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) beside targeted VM can extract all information. Thus, this paper implements double stage encryption algorithm for multimedia content security using random key generation. The first stage encrypts multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated symmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover multimedia contents. Low complexity and easy implementations make the proposed algorithm widely applicable safeguard in cloud computing.