Full Paper View Go Back

Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud

A. Sharma1 , RS Thakur2 , S. Jaloree3

Section:Research Paper, Product Type: Isroset-Journal
Vol.4 , Issue.5 , pp.5-11, Oct-2016


Online published on Oct 28, 2016


Copyright © A. Sharma, RS Thakur, S. Jaloree . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud,” International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.

MLA Style Citation: A. Sharma, RS Thakur, S. Jaloree "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud." International Journal of Scientific Research in Computer Science and Engineering 4.5 (2016): 5-11.

APA Style Citation: A. Sharma, RS Thakur, S. Jaloree, (2016). Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud. International Journal of Scientific Research in Computer Science and Engineering, 4(5), 5-11.

BibTex Style Citation:
@article{Sharma_2016,
author = {A. Sharma, RS Thakur, S. Jaloree},
title = {Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2016},
volume = {4},
Issue = {5},
month = {10},
year = {2016},
issn = {2347-2693},
pages = {5-11},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=305},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=305
TI - Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - A. Sharma, RS Thakur, S. Jaloree
PY - 2016
DA - 2016/10/28
PB - IJCSE, Indore, INDIA
SP - 5-11
IS - 5
VL - 4
SN - 2347-2693
ER -

1659 Views    1406 Downloads    1158 Downloads
  
  

Abstract :
With the increasing demand of Cloud based resources, the customers have been attracted to the various offerings of cloud computing and mainly it has been seen that the Cloud storages have been centre of attraction because of free limited storage for users. Customers are moving their documents into cloud storages because of various options in cloud storages. We are using various mobile based apps to store images in our system but due to limited storage capacity of our system we prefer cloud storages for storing different files specially images. The image files include files of various formats like JPG Image Files, GIF Images, JPEG Files etc. The image documents on Cloud or server repository is increasing rapidly. Therefore, it becomes necessary to ensure confidentiality, integrity and authenticity of document or information over cloud storage and in addition, there must be some mechanism that helps users for fast encryption of their image to be stored in cloud and fast decryption of same image from cloud to their devices. Since the service level, agreements are very strong and there is no fear to keep the data in cloud because of strong SLA implementation policies. Therefore, we must investigate Conventional algorithm’s efficiency over cloud in terms encryption time, decryption time, key sizes. In this paper we will analyse the performance for exchange of Images with various block cipher SKC algorithms specially 3DES, AES and Blowfish to find more efficient symmetric block cipher algorithm in the term of encipherment and decipherment time at different settings like variable file sizes with fixed key sizes, variable file sizes with variable key size, Fixed file sizes with fixed key size and Fixed file sizes with variable key sizes.

Key-Words / Index Term :
Cloud Computing, Cryptography, Encryption, Crypter Tool, Decryption, encipherment and decipherment

References :
[1] Ashok Sharma, Ramjeevan Thakur, Shailesh Jaloree, “Investigation of Efficient cryptic Algorithm for cloud storage”, Fourth International Conference on Recent Trends in Communication and Computer Networks, India, pp.23-30, 2016.
[2] Dimitrios Zissis, Dimitrios Lekkas, “Addressing cloud computing security issues”, Future Generation Computer Systems, Vol. 28, pp.583–592, 2012.
[3] Vivek Raich, Pradeep Sharma, Shivlal Mewada, Makhan Kumbhkar, "Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
[4] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, IEEE 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp.1-5, 2016.
[5] Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms”, IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), Delhi, pp.663–666, 2016.
[6] Dorthy Elizabeth, Robling Denning, “Cryptography and Data Security”, Addison-Wesley Publishing Company, Massachusetts, pp.301-340, 1982.
[7] D.W. Davies, W.L. Price, “Security for Computer networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer”, Second Edition John Wiley & Sons, New York, pp.1-450, 1989.
[8] Noura Aleisa, “A Comparison of the 3DES and AES Encryption Standards ”, International Journal of Security and Its Applications Vol.9, No.7, pp.241-246, 2015.
[9] Shivlal Mewada, Sharma Pradeep, SS. Gautam, “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security (IJCSIS), Vol.14, No.2, pp.105-110, 2016.
[10] Shaligram Prajapat, Gaurav Parmar, R. S. Thakur, "Towards investigation of efficient Cryptosystem using Sgcrypter", International Journal of Applied Engineering and Research (IJAER), Vol. 10, Issue.79, pp. 853-858, 2015.
[11] Prajapat, Shaligram, D. Rajput, Ramjeevan Singh Thakur, "Time variant approach towards symmetric key", in proceedings of IEEE Science and Information Conference (SAI), London , pp.398-405, 2013.
[12] Prajapat, Shaligram, Ramjeevan Singh Thakur. "Optimal Key Size of the AVK for Symmetric Key Encryption", in Covenant Journal of Information & Communication Technology, Vol.3, Issue.2, pp.71-81. 2015.
[13] Prajapat, Shaligram, Ramjeevan Singh Thakur, "Various Approaches towards Crypt-analysis", International
Journal of Computer Applications, Vol.127, Issue.14, pp.15-24, 2015.
[14] Prajapat, Shaligram, Ramjeevan Singh Thakur, “Cryptic Mining for Automatic Variable Key Based Cryptosystem”, Elsevier Procedia Computer Science, Vol.78, Issue.78C, pp. 199-209, 2016.
[15] A. A. Yassin, A. A. Hussain, K. A. A. Mutlaq, "Cloud authentication based on encryption of digital image using edge detection", AISP, India, pp.15-23, 2015.
[16] S. Prajapat, RS. Thakur, "Realization of information exchange with Fibo-Q based Symmetric Cryptosystem", International Journal of Computer Science and Information Security, Vol.14, Issue.2, pp.216-223, 2016.
[17] Prajapat, Shaligram, Jain A. Ramjeevan Singh Thakur, “A Novel Approach For Information Security with Automatic Variable Key Using Fibonacci Q-Matrix”, IJCCT, Vol-3(3), 2012, p.p. No. 54-57, 2012.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation