We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Securing Cloud Data and Cheque Truncation System with Visual Cryptography

by Jaya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 2
Year of Publication: 2013
Authors: Jaya
10.5120/11934-7721

Jaya . Securing Cloud Data and Cheque Truncation System with Visual Cryptography. International Journal of Computer Applications. 70, 2 ( May 2013), 16-21. DOI=10.5120/11934-7721

@article{ 10.5120/11934-7721,
author = { Jaya },
title = { Securing Cloud Data and Cheque Truncation System with Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 2 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number2/11934-7721/ },
doi = { 10.5120/11934-7721 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:48.060540+05:30
%A Jaya
%T Securing Cloud Data and Cheque Truncation System with Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 2
%P 16-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is growing day-by-day in the current world scenario. Organizations are excited and worried at the same time to use cloud computing features as it will require for them to move their data on public cloud. Resource utilization is the main advantage of cloud computing which results in storing data of multiple clients in one place. Private cloud is preferred by the companies but it does not provide all the advantages of cloud computing. Cloud providers are working hard to secure their infrastructure and the stored data in cloud. To secure data, encryption is the most preferred solution. But the problem with traditional cryptographic methods is that they take huge amount of computation power and time in processing the encrypted data. Visual Cryptography is a cryptographic method which takes less amount of time to encrypt or decrypt data and can be applied in the field of cloud to improve its security parameters. It can also be used in the financial field such as Cheque Truncation System to transfer the images securely.

References
  1. Naor, M. and Shamir, A. , "Visual cryptography", EUROCRYPT, LNCS, vol. 950. Springer, Heidelberg (1995), 1-12.
  2. Droste, S. , "New results on visual cryptography", CRYPTO, LNCS, vol. 1109, Springer, Heidelberg (1996), 401-415.
  3. Wu, H. -C. and Chang, C. -C. , "Sharing visual multi-secrets using circle shares", Computer Standards & Interfaces 28 (2005), 123-135.
  4. Shyu, S. J. , Huang, S. -Y. , Lee, Y. -K. , Wang, R. -Z. , Chen, K. , "Sharing multiple secrets in visual cryptography", Pattern Recognition 40 (2007), 3633–3651.
  5. Feng, J. -B. , Wu, H. -C. , Tsai, C. -S. , Chang, Y. -F. , Chu, Y. -P. , "Visual secret sharing for multiple secrets", Pattern Recognition 41 (2008), 3572–3581.
  6. Jaya and Sardana, A. , "Multiple Secrets Sharing With Meaningful Shares", In: International Conference on Advances in Computing and Communications. Springer Heidelberg, Part IV, CCIS 193 (2011), 233-243.
  7. Hou, Y. C. , Tu, S. -F. , "A Visual Cryptographic Technique for Chromatic Images Using Multi-pixel Encoding Method", Journal of Research and Practice in Information Technology, vol. 37, (2005), 179- 191.
  8. Zhang, H. , Wang, X. , Cao, W. , Huang, Y. , "Visual Cryptographic for General Access Structure by Multi-pixel Encoding with Variable Block Size", International Symposium on Knowledge Acqusition and Modeling (2008).
  9. csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf
  10. https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf
  11. http://blogs. zdnet. com/security/?p=5110
  12. http://voices. washingtonpost. com/securityfix/2008/07/amazon_hey_spammers_get_off_my. html
  13. http://securitylabs. websense. com/content/Blogs/3402. aspx
  14. http://www. esecurityplanet. com/hackers/lessons-from-the-linkedin-password-attack. html
  15. http://www. bankinfosecurity. com/blogs. php?postID=140
  16. http://bits. blogs. nytimes. com/2012/08/01/dropbox-spam-attack-tied-to-stolen-employee-password/
  17. http://en. wikipedia. org/wiki/Cheque_truncation_system
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing visual cryptography schemes (VCS) share pixel expansion stacking