System Architecture for Secured Storage, Distribution and Delivery of Rich Multimedia information over the Content Delivery Networks and Cloud (original) (raw)
Related papers
An Analytical Review of the MultimediaData and Encryption Mechanism at Cloud Server
International Journal of Innovative Research in Computer and Communication Engineering, 2014
Cloud computing is an emerging style of IT delivery that intends to make the Internet the ultimate home of all computing resources-storage, computations, and accessibility. The next generation architecture of IT Enterprise is envisaged in Cloud Computing because of its robustness, scalability, performance, high availability, least cost and many others. The delivery of Services by cloud Service Providers is hampered because of the security concerns shown by the Enterprises and vendors as the cloud environment gives access to centralized shared hardware, software and other information. The security issues in cloud computing such as service availability, massive traffic handling, application security, and authentication. The focus of this paper would be to cover secured storage and access methods of multimedia content over the content delivery cloud edge servers. This paper also focuses on the encryption mechanism like Blow Fish, DES and the control mechanism like CHAP.
2273 |P a g e An Enhanced Security Technique for Storage of Multimedia Content over Cloud Server
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. With the development Internet multimedia computing has emerged as a technology to generate, edit, process, and search media contents, such as images, video, audio, graphics, and so on. Multimedia cloud computing has the potential for tremendous benefits, but wide scale adoption has a range of challenges like Multimedia and service heterogeneity, QoS heterogeneity, Network heterogeneity, Device heterogeneity ,Security, Power Consumption that must be met. But data security and access control is the main challenge when users outsource sensitive data for sharing on cloud servers which is not within the same trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, various methods have been proposed in the literature. This paper explores a new method which is a combination of roll based access control with advanced encryption algorithm (a combination of RSA and two fish),signature verification to enhance security when storing text, image ,audio ,video files onto cloud server.
K-RSA: Secure data storage technique for multimedia in cloud data server
Journal of Intelligent & Fuzzy Systems, 2020
Cloud has become one of the most demanding services for data storage. On another hand, the security of data is one of the challenging tasks for Cloud Service Provider (CSP). Cryptography is one of the ways for securing the storage data. Cryptography is not a new approach instead of the efficient utilization of cryptographical algorithms is greatly needed. In this work, we proposed a Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption. The SHL is consisting of two major modules (i) Key Management Server (KMS) and (ii) Share Holder Server (SHS) which is used for storing and sharing of cryptographic key. For this purpose, we proposed a server-side encryption algorithm, which is based on the asymmetric algorithm (RSA and CRT) for providing end-to-end security of multimedia data. The experimental results of text and video are evidence that the size of file is not much affected after the encryption and effectively stored at Cloud Storage Server (CSS)....
SECURE MULTIMEDIA DATA STORAGE IN CLOUD COMPUTING
Data is the most significant entity to every being. It is the sole ingredient of human and non – human communication in all forms, be it electronic, digital, verbal or written. And because of its importance, we adopt stringent measures to secure the storage of data and ensure its authorized access at different levels so that its usability and integrity are maintained. Security of any data deals both with its storage and retrieval. We may apply robust cryptographic algorithms in order to encode the data and/or implement several authentication checks to verify the genuineness of user attempting to access it. Here we develop an application that enables the users to exchange classified multimedia content, securely from any geographical coordinate. We aspire to apply security at all levels, in order to shield the data, right from the point of its creation to delivery. Our intention is to be different from the existent applications under this domain, in the form of latest technology, ease-of-use and scalability. In this paper we propose to provide convenience to the user through simple, understandable yet secure communication interfaces. Our goal is to shield date at all checkpoints through which it travels i.e. Sender Device Device Network Cloud Recipient Device. In this world of advanced communication, people prefer mechanisms through which data can be saved or retrieved quickly, easily and securely from any geographical coordinate. To facilitate this objective, smart phones and mobile cloud computing play an integral role. They fortify the user to use techniques for smart storage and retrieval of data using infrastructure, platform and software as a service being provided by 3rd party. Here we shall make use of the newest technologies, i.e. Android and Cloud Computing.
An Approach to Enhance Multimedia Security in Cloud Computing
Nowadays multimedia has turn out to be essential in every domain for its quality. On the other hand, due to the problems of handling petabytes of such kind of multimedia data in words of calculations, sharing, communications, as well as stowage, there is a rising request of a substructure in the direction of having on-request admission towards a distributed group of configurable calculating assets. Cloud computing is the newest rebellion in IT industry which is fundamentally connected to the budget. The increasing amount of applications as well as the quantity of data which also essential to be accomplished has prepared information centers in the direction of turn out to be an significant as well as indispensable venture in addition to public cloud calculating give the impression to be a way in the direction of controlling these prices as well as their securities. The amalgamation of multimedia as well as cloud for security enhances many technical issues for numerous media-rich applications. In multimedia, there are various types of it such as audio, video, text, image etc. But in our work, we have utilized three kinds of multimedia data i.e. Text, Audio and Image data. In this paper, our main focus is on multimedia security in cloud computing. In our proposed work, we have utilized RSA, DES and Two Fish Algorithm to get inverted data. And also we have used genetic Algorithm for optimization purpose and to classify we have utilized neural network classifier. We have used parameter Mean Square Error and Signal-Noise-Ratio to evaluate our results as well as used these parameters to compare with existing work done by researchers. The over-all work is done and accomplished in MATLAB 7.10 environment.
2018
Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure, application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level of security such as privacy, confidentiality and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as when needed.
File Storage on Cloud Using Cryptography
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Hybrid cryptography is implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user. The hybrid encryption algorithm combines the advantages of fast encryption speed of AES algorithm, easy management of RSA algorithm key, and digital signature to ensure the secure transmission of confidential documents. Data/information is the most valuable asset for the modern electronic communication system. Securing data or information has become a challenge in this competitive world. There are many techniques for securing data/information such as cryptography, stenography etc. In this paper, hybrid cryptography has been applied using AES and RSA.AES and RSA algorithms are implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This approach provides transparency to the cloud user as well as cloud service provider in order to reduce the security threats. The proposed model is implemented in C and .NET. Data security is increased up to a maximum extent and it takes less time in uploading and downloading the text file as compare to existing system. [1]
2017
Data stored in the cloud is increasingly gaining popularity for all users including personal, institutions and business purposes. The data is usually highly protected, encrypted and replicated depending on the security and scalability needs. Despite the advances in technology, the practical usefulness and longevity of cloud storage is limited in today’s systems. This paper provides a solution to the problem of securely storing the client’s data by maintaining the confidentiality and integrity of the data within the cloud. This paper addresses the problem of ensuring data confidentiality against cloud and against accesses beyond authorized rights. To resolve these issues, we designed a data encryption model that is in charge of storing data in an encrypted format in the cloud. To improve the efficiency of the designed architecture, the service in form of the model designed allows the users to choose the level of security of the data and according to this level different encryption al...
Secure File Storage on Cloud Using Cryptography
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Hacking became a serious drawback lately. Transference of secure knowledge or communication through the web turns out to be difficult because of security considerations. to anticipate these security hurdles, we tend to use Cryptography, and Image Steganography. Day's cloud computing is currently employed in several areas like business, colleges, and Universities to store a great amount of knowledge. We will extract knowledge from the cloud for the asking of users. To store knowledge on the cloud we've to face several errors and issues. Cryptography and steganography techniques area unit well-liked currently a day's for knowledge security. using one algorithmic rule isn't effective for prime-level security to knowledge in cloud computing. during this paper, we initiated a new security mechanism using symmetrical key cryptography algorithmic rules and steganography. during this projected system AES, blowfish, RC6, and 3DES algorithms area units were used to supply blockwise security to knowledge. All algorithms have a key size of 128 bits. Key data contains that a part of the file is encrypted using that algorithmic rule and key. The file is split into eight components. every part of the file is encrypted using different algorithmic rules. All components of the file area unit are encrypted at the same time with the assistance of the multithreading technique. encoding Keys area unit inserted into cowl image using LSB technique. Steganography image is sent to a valid receiver using email. For file secret writing purposes reverse method of cryptography is applied.
Secure the File Storage on Cloud Computing Using Hybrid Cryptography Algorithm
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
The proposed of this paper is for the security needs of the cloud data center. Blowfish is used to convert encrypt file cuts, takes the minimum amount of time, and has the extreme throughput for encryption and decryption from other compatible algorithms. The idea of spreading and mixing meets the principle of information security. The hybrid approach makes the remote servers more secure when deployed in a cloud environment and, thus helps cloud providers gain more trust from their users. Used for data safety and privacy issues, the basic challenge of separating sensitive data and access control has been met. Cryptography techniques translate original data into an unreadable format. The encryption technique is divided into private key encryption and public-key encryption. Here we will use AES 128-algorithm, DES, RC, and LSB encryption techniques. This technique uses keys to translate data into an unreadable format. Therefore only authorized persons can access data from the cloud server. Ciphertext data is visible to all.