Open Access Open Access  Restricted Access Subscription Access

Multimedia a Concern for Security: A Review

Sharad Malhotra, Aditya Chauhan

Abstract


The cloud computing offers high measurability, classification and on these lines the fundamental availableness of the educational over World Wide Web. Though the standard mystery composing framework provides security, the principal enclosed issue is that the conventional viewpoint channel assault for catching ones delicate and classified image, sound and video. A pernicious Virtual Machine (VM) apart from a targeted on VM can separate all info. On these lines, this paper executes a twofold stage mystery composing rule for the transmission framework content security misuse irregular key age approach. The essential stage encrypted transmission framework content into ciphertex - l utilizing a symmetrical open key. The ciphertext-l is once more encrypted within the cloud misuse an uneven non-open key. Within the event that anybody gets the figure content, he could not separate the mystery composing key to recuperate the transmission framework substance. Low many-sided nature and basic execution create the organized guideline wide pertinent defend within the cloud computing.

Full Text:

PDF

References


W. Kim. Cloud Computing: nowadays and tomorrow. Journal of article innovation. 2009.8(1):65-72p.

P. Gupta and A. K. Brar. An expanded Security Technique for Storage of multimedia framework Content over Cloud Server," International Journal of Engineering investigation and Applications (lJERA).2013.3(4):2273-2277p.

Er. Mandeep Singh Sandhu Er. Radiant Singla. Associate in Nursing Approach to expanded Security of multimedia framework data Model Technology bolstered Cloud Computing.

Sonal Guleria and Sonia Vatta. To upgrade multimedia framework security in cloud computing surroundings abuse Crossbreed rule. International Journal of Application or

Innovation in Engineering and Management. 2013.2.

Alvarez E, Fernández A, García P, Jiménez J, Marcano (1999). A New approach to chaotic encryption. A Physics Letters , 263(4–6),373–375p.

Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar Partha Pratim Sarkar. “Image Encryption Using Affine Transform and XOR Operation ”,International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011),2011.309-312p.

Borko Furht, Daniel Socek,(2003),“Multimedia Security: Encryption Techniques,” IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL, 2003.

Bruce Schneier, (1996) “Applied cryptography: protocols algorithms and source code in C”. Second Edition, Wiley Publications.

Bruce Schneier, John Kelsey , Doug Whiting , David Wagner , Chris Hall , Niels Ferguson, (1998)“Twofish: A 128-Bit Block Cipher”, June 1998. AES submission.

Bruce Schneier,(1994) Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) Proceedings of Fast Software Encryption, Cambridge Security Workshop (December 1993), Springer-Verlag, , 191-204o


Refbacks

  • There are currently no refbacks.