

An Analysis of Multimedia Security
Abstract
The basic availability of online learning is made possible by cloud computing's high quantifiability and classification. though' the regular secret creating system gives security, the chief included issue is that the typical perspective channel attack for getting ones sensitive and ordered picture, sound and video. A malignant Virtual Machine (VM) other than a zeroed in on VM will isolate all data. Thusly, this paper executes a twofold stage secret making rule for the mixed media system content security abuse sporadic key age approach. Using a trigonal open key, the primary stage encrypted multimedia framework content into ciphertex-l. The ciphertext-l is again scrambled inside the cloud abuse a willy nilly delivered lopsided non-open key. If anyone gets the figure content, he was unable to isolate the secret creating key to recover the mixed media structure substance. The arranged guideline's broad relevance as a cloud computing security measure is due to its simple implementation and low complexity.
References
Sultan, N. (2010). Cloud computing for education: A new dawn?. International Journal of Information Management, 30(2), 109-116.
Gupta, P., & Brar, A. K. (2013). An Enhanced Security Technique for Storage of Multimedia Content over Cloud Server. International Journal of Engineering Research and Applications (IJERA), 3(4), 2273-2277.
Al Hamid, H. A., Rahman, S. M. M., Hossain, M. S., Almogren, A., & Alamri, A. (2017). A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access, 5, 22313-22328.
Islam, T., Manivannan, D., & Zeadally, S. (2016). A classification and characterization of security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1), 268-285.
Alvarez, E., Fernández, A., Garcıa, P., Jiménez, J., & Marcano, A. (1999). New approach to chaotic encryption. Physics Letters A, 263(4-6), 373-375.
Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011, July). Image encryption using affine transform and XOR operation. In 2011 International conference on signal processing, communication, computing and networking technologies (pp. 309-312). IEEE.
Furht, B., Socek, D. (2003). Multimedia Security: Encryption Techniques. IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL.
Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John wiley & sons.
Refbacks
- There are currently no refbacks.