Bioscience Biotechnology Research Communications

An International  Peer Reviewed Refereed Open Access Journal

P-ISSN: 0974-6455 E-ISSN: 2321-4007

Bioscience Biotechnology Research Communications

An Open Access International Journal

Pallavi Kulkarni1*, Rajashri Khanai2 and Gururaj Bindagi3

1Department of Electronics and Communication Engineering, KLE Dr. M.S. Sheshgiri College of Engineering and Technology, Belgaum, India

2Department of Electronics and Communication Engineering, KLE Dr. M.S. Sheshgiri College of Engineering and Technology, Belgaum, India

3Solution Architect, Bengaluru, India

Corresponding author email: pallavik15@gmail.com

Article Publishing History

Received: 05/10/2020

Accepted After Revision: 29/12/2020

ABSTRACT:

Cloud computing has revolutionized the world of computing. Cloud storage enables consumers to remotely store their data and enjoy the flexible, pay-as-you-go on-demand high quality cloud applications. Cloud computing gained popularity as users need not take the burden of hardware and software management. So the new trend is to outsource the multimedia information to cloud. Today, the rate at which the image data set produced is exponential in nature. Hosting of data including multimedia by third party gives rise to many questions related to the privacy and security since the cloud environment makes use of shared resources over internet. To address the above mentioned problem, we propose a new method to secure the images in the cloud environment.

We are using Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithm for encryption and the symmetric key used by these algorithms is generated by Elliptic Curve Cryptography Diffie Hellman (ECCDH) /Neural network. The actual key used for encryption is different from the key shared between the two parties. If the key1 which is shared between the two parties is compromised, the actual key used for encryption will not be known to the unauthorized person. Hence the greater level of security is provided by the proposed technique. The comparative analysis of the existing system and proposed system is carried out by considering Performance and Security parameters.

KEYWORDS:

Aes, Cloud Computing, Des, Ecc, Image, Tpm.

Download this article as:

Copy the following to cite this article:


Copy the following to cite this URL: