CFP last date
20 December 2024
Reseach Article

Securing Images in Cloud using Hyper Chaos with User Authentication

by Shaheen Ayyub, Praveen Kaushik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 17
Year of Publication: 2015
Authors: Shaheen Ayyub, Praveen Kaushik
10.5120/21632-4951

Shaheen Ayyub, Praveen Kaushik . Securing Images in Cloud using Hyper Chaos with User Authentication. International Journal of Computer Applications. 121, 17 ( July 2015), 18-23. DOI=10.5120/21632-4951

@article{ 10.5120/21632-4951,
author = { Shaheen Ayyub, Praveen Kaushik },
title = { Securing Images in Cloud using Hyper Chaos with User Authentication },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 17 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number17/21632-4951/ },
doi = { 10.5120/21632-4951 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:08:40.865728+05:30
%A Shaheen Ayyub
%A Praveen Kaushik
%T Securing Images in Cloud using Hyper Chaos with User Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 17
%P 18-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in the cloud is the top most concern. To achieve trust and preserve the privacy of data stored in third-party cloud storage has emerged as a key research area. To achieve this, several different techniques have been proposed based on cryptography. Secret sharing schemes and chaos based encryption have also been considered to address these issues of trust and privacy by various researchers. In this paper, we are proposing a new scheme to encrypt the private and sensitive images of users in the third party storage named as "Securing images in cloud using hyper chaos with user authentication" to solve the problem of authenticating users. Chaos based encryption with image captcha authentication using VCS is a major advantage of this scheme. Chaos based encryption is a very secure method for encryption. Many researchers have used the above technique but user authentication or authorization is not mentioned in their schemes. To increase more security we have included the authentication in the scheme. In this paper the authentication process is explored in depth and only the overview of encryption process is given. For securing the authentication logistic map is used to divide and shuffle the original image captcha into many blocks. The use of visual cryptography technique is explored to preserve the privacy of image captcha. Part of the image share will be kept with the image owner such that the original image captcha can be revealed only when both (user, owner) of the shares are simultaneously available. The individual share images do not reveal the identity of the original image captcha. Once the original image captcha is revealed after merging different shares, the user will be considered as authenticated user. Then only the encrypted key for the images will be transferred to the user. Dynamically generating the Captcha image by the system is one of the major advantage of the system.

References
  1. J. Srinivas, K. Venkata Subba Reddy and Dr. A. Moiz Qyser, "Cloud Computing Basics", International Journal of Advanced Research in Computer and Communication EngineeringVol. 1, Issue 5, pp 343-347, 2012.
  2. Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Henghu Gong, "The Characteristics of Cloud Computing", 39th International Conference on Parallel Processing Workshops, IEEE XPlore, 1530- 2016/10, pp 275-279, 2010.
  3. Karen Scarfone, Murugiah Souppaya, Paul Hoffman, "Guide to Security for Full Virtualization Technologies ",http://csrc. nist. gov/publications/nistpubs/800-125/SP800-125- final. pdf , NIST, 2011.
  4. Stratus Technologies, "white paper on Server Virtualization and CloudComputing:Four hidden impacts on uptime and availability",http://www. stratus. com/~/media/Stratus/Files/Library/WhitePapers /ServerVirtualizationandCloudComputing. pdf , 2011.
  5. Eman M. Mohamed, Hatem S. Abdelkader and Sherif El-Etriby,"Data Security Model for Cloud Computing", The Twelfth International Conference on Networks, ISBN: 978-1-61208-245-5, pp 66-74, 2013.
  6. Peter Mell, Tim Grance, "Effectively and Securely Using the Cloud Computing Paradigm", NIST, Information Technology Laboratory, http://www. csrc. nist. gov/groups/SNS/cloud-comput ing/cloudcomputing- v26. ppt. 2009.
  7. Frank Gens et al. , "Cloud Computing 2010 An IDC Update "http://www. cionet. com/Data/files/groups/Cloud%20Computing%2 02010%20-%20An%20IDC%20Update. pdf ,2010.
  8. D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches in encrypted data," in Proc. IEEE Int. Symp. Res. Security Privacy, May 2000, pp. 44–55.
  9. A. Swaminathan, Y. Mao, G. -M. Su, H. Gou, A. L. Varna, S. He,M. Wu,and D. W. Oard, "Confidentiality preserving rank-ordered search," in Proc. ACM Workshop Storage, Security, Survivabil. , 2007, pp. 7–12.
  10. W. Lu, A. Swaminathan, A. L. Varna, and M. Wu, "Enabling search over encrypted multimedia databases," Proc. SPIE, vol. 7254, pp. 1–11, Jan. 2009.
  11. J. Shashank, P. Kowshik, K. Srinathan, and C. Jawahar, "Private content based image retrieval," in Proc. IEEE Conf. Comput. Vis. PatternRecognit. , Jun. 2008, pp. 1–8.
  12. E. Goh, H. Shacham, N. Modadugu, and D. Boneh. Sirius, " Securing remote untrusted storage". In Proceedings of Network and Distributed Systems Security (NDSS) Symposium, pages 131–145, 2003.
  13. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus, "Scalable secure file sharing on untrusted storage". In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pages 29–42, 2003.
  14. Z. Lin and H. Wang, "Image encryption based on chaos with PWL memristor in Chua's circuit," in Proc. of the Int. Conf. on Commun. ,Circuits and Systems, July 2009, pp. 964-968.
  15. C. Fu and Z. Zhu, "A chaotic image encryption scheme based on circular bit shift method," in Proc. of the 9th Int. Conf. for Young Computer Scientists, (ICYCS 2008), Nov. 2008, pp. 3057-3061.
  16. G. M. B. S. S. Kumar and V. Chandrasekaran, "A novel image encryption scheme using Lorenz attractor," in Proc. of the 4th IEEE Conf. on Industrial Electronics and Applications, (ICIEA 2009), May, 2009, pp. 3662- 3666.
  17. Omid Mirzaei • Mahdi Yaghoobi • Hassan Irani,"A new image encryption method: parallel sub-image encryption with hyper chaos", Springer Science+Business Media B. V. 2011.
  18. Arash Nourian, Muthucumaru Maheswaran "Towards Privacy Enhanced Limited Image Processing in the Clouds", Doctoral Symposium, Dec 3 2012 Montreal Quebec, Canada 978-1-4503-1611-8/2012 ACM.
  19. A. Shamir, . How to Share a Secret,. Communication ACM, vol. 22, 1979, pp. 612-613.
  20. G. R. Blakley, . Safeguarding Cryptographic Keys,. Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.
  21. A. Menezes, P. Van Oorschot and S. Vanstone, . Handbook of Applied Cryptography,. CRC Press, Boca Raton, FL, 1997.
  22. Von Ahn, Luis? Blum, Manuel? Hopper, Nicholas J. ? Langford, John (May 2003). CAPTCHA: Using Hard AI Problems for Security. EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques.
  23. CAPTCHA:Using Hard AI Problems For Security Luis von Ahn1, Manuel Blum1, Nicholas J. Hopper1, and John Langford.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud security Images Visual cryptography Captcha Logistic map