Rashmita Pandey - Academia.edu (original) (raw)

Rashmita Pandey

Uploads

Papers by Rashmita Pandey

Research paper thumbnail of Multimedia Content Security with Random Key Generation Approach in Cloud Computing

The cloud computing offers high scalability, confidentiality and easy accessibility of informatio... more The cloud computing offers high scalability, confidentiality and easy accessibility of information over the internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) beside targeted VM can extract all information. Thus, this paper implements double stage encryption algorithm for multimedia content security using random key generation. The first stage encrypts multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated symmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover multimedia contents. Low complexity and easy implementations make the proposed algorithm widely applicable safeguard in cloud computing.

Research paper thumbnail of Multimedia Content Security with Random Key Generation Approach in Cloud Computing

The cloud computing offers high scalability, confidentiality and easy accessibility of informatio... more The cloud computing offers high scalability, confidentiality and easy accessibility of information over the internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) beside targeted VM can extract all information. Thus, this paper implements double stage encryption algorithm for multimedia content security using random key generation. The first stage encrypts multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated symmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover multimedia contents. Low complexity and easy implementations make the proposed algorithm widely applicable safeguard in cloud computing.

Log In