SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7031
Multimedia Content Security with Random Key
Generation Approach in Cloud Computing
Chandan Thakur1, Rashmita Pandey2, Nusrat Parveen3
1,2Student, Computer Department, Datta Meghe College of Engineering, Maharashtra, India
3Professor, Computer Department, Datta Meghe College of Engineering, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The cloud computing offers high scalability,
confidentiality and easy accessibility of informationoverthe
internet. Though the conventional encryption system
provides security, the most concerned issue is the regular
side channel attack for capturing ones sensitive and
confidential image, audio and video. A malicious Virtual
Machine (VM) beside targeted VM can extract all
information. Thus, this paper implements double stage
encryption algorithm for multimedia content security using
random key generation. The first stage encrypts multimedia
content into ciphertext-1 using a symmetric public key. The
ciphertext-1 is again encrypted in the cloud using a
randomly generated symmetric private key. If anyone gets
the cipher text, he could not extract the encryption key to
recover multimedia contents. Low complexity and easy
implementations make the proposed algorithm widely
applicable safeguard in cloud computing.
Keyword: Cipher text, Encryption, Multimedia, Virtual
Machine, random Key generation
1.INTRODUCTION
1.1 Cloud Computing:
Cloud computing is freedom of processingandstoringdata
of consumers in the third-party data center using remote
computing resources over the Internet. The cloud is the
combination of three services. Thegoal ofcloudcomputing
is to allow users to take benefit from all thesetechnologies,
without the need for deep knowledge. The cloud
computing aims to cut costs, and helps the users to focus
on their core business instead of being impeded by IT
obstacles. Cloud computing and storagesolutionsprovides
services to users and enterprises with various capabilities
to store and process their data in third party data centers
that may be located far from user-rangingindistancefrom
across a city to across the world. A third partymanagesthe
data and multimedia contents and has the liabilities to
make certain security for the protection of data and
multimedia contents and provide uninterrupted services.
Unless there may be arise in security question and
trustworthiness of third party.Beside the third party
deliberately or inadvertently discloses the data.
1.2 Security issues in Cloud:
While it is generally agreed that encryption is necessaryto
protect data security, working with encrypted data proves
to be challenging in cloud. The problem of using public
cloud is the cloud owner can’t be trusted with the data. to
be challenging in cloud. The problem of using public cloud
is the cloud owner can’t be trusted with the data. Hence a
solution is required to safeguardthedata.Asolutionwould
be to download and decrypt all the documents to extract
the relevant information.
1.2.1 Data Integrity:
A secured system ensures that the data it contains is valid.
Data integrity implies that knowledge is protected against
deletion and corruption each once it's among the
information, and whereas it's being transmitted over the
network.
1.2.2 Data Confidentiality:
A secure system ensures the confidentiality of data. This
means that it allows users to see only those data which
they are supposed to see. Whenever possible, confidential
data should be encrypted and decrypted during on-
premises or end-pointprocessingbeforeitistransferred to
the cloud. The key concern is protecting data
confidentiality in end-to-end fashion.
1.2.3 Access Control:
Access control states that information shared over cloud
must be accessible to authorized users. Access should be
given to only those users who have authority to gain the
access to the shared data.
1.2.4 Data Manipulation:
It is an effort to make data more easier to read or to be
more organized.
2. LITERATURE SURVEY
In cloud computing, since it is a new area, the
developers are concentrating more on computation speed
and storage issue. Users are going for unreliable networks
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7032
without their knowledge to share the media content even
though there are availability of more promising streaming
technology and increased broadbandspeed.Atpresent,the
security of the multimedia contents such as image, audio
and video become a rising issue. A survey on recently
performed analysis activities on multimedia system
security and intersected four burning queries like
knowledge integrity, data confidentiality, access control
and data manipulation.
Several studies are done on the protection of the
multimedia system contents within the cloud. The paper
replaces the DES algorithm by theAESalgorithmduetothe
inbuilt scarcity of strength and combined the AES with the
RSA. Gupta et al. also projected a sophisticated algorithmic
rule combining the RSA with 2 fish. These studies targeted
on the mix of 2 totally different algorithmsandgenerated a
security key for shoppers as a key to access the cloud. The
mitigation of the facet channel attack was shown and also
the projected algorithmic rule targeted solely on the 2
prime numbers. The on top of study leads USA to
implement a double stageencodingalgorithmic ruleforthe
protection of multimedia system contents against a
negligent third party and facet channel attack. The
projected every which way generated key algorithmicrule
produces when a novel isosceles key that lets the
information be encrypted with success.Aliteraturereview
is performed to search out a good algorithmic rule having
minimum complexness and wide applicablecloudsecurity
for the multimedia system contents against the facet
channel attack. Since it is more difficult to stop or identify
the side channel attack, hence the double stage encryption
allows cipher text to store in the VM. The double stage
decryption transmits the original data from the VM. Based
on the literature study the specified languages, tools and
hardware area unit chosen to develop the projected
algorithm.
2.1 Existing System:
The security of multimedia contents in the cloud. The
replaces the DES algorithm by theAESalgorithmduetothe
inbuilt scarcity of strength and combined the AES with the
RSA. Also projected a sophisticated algorithmic rule
combining the RSA with two fish. These studies focusedon
the combination of two completely different algorithms
and generated security key for users as a key to access the
cloud. The mitigation of aspect channel attack was shown
and therefore the proposed algorithm focused solely on
the two prime numbers.
Disadvantages of existing system
I. Encryption Singular Symmetric Method key and
asymmetric key.
II. Key Type Fixed.
III. Key exposition possibility high.
2.2 Proposed System:
This project double stage encryption algorithm that
provides the security of multimedia contents such as
image, audio and video in the cloud. In first stage data is
encrypted using AES or Blow fish algorithm. Both AES and
Blowfish algorithm is used in this system. AES algorithmis
used as first encryptionalgorithm.Theproposedalgorithm
is critical in the second stage. The randomly generatedkey
provides additional security than the traditional
encryption system. The 94-bit converter generates the
multimedia contents into the cipher text. The ciphertextis
stored in the cloud instead of original multimedia content.
The cipher text is undoubtedly hard to recover theoriginal
content for random asymmetric key. Wide application of
the proposed algorithm protects the information from the
side channel attacker to grab the multimedia data into the
cloud. Thus, the multimedia is safe within the cloud.
Advantages of Proposed system:
I. Encryption Double Symmetric Method key and
asymmetric key.
II. Key Type Random.
III. Key exposition possibility low.
3.METHODOLOGY & IMPLEMENTATIONS
3.1 System Architecture:
The system Architecture model involves threeparties:the
data owner, the cloud server and the user. The fig.1
illustrates the Architecture of System which includes
encryption and decryption process flow.
Fig - 1: System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7033
3.2 Proposed Algorithm:
The proposed randomlygeneratedkeyalgorithmproduces
every time a unique symmetric key that lets the data be
encrypted successfully. In this system hybrid encryption
technique is apply on the data file using AES and Blowfish
algorithm to securely store file data in cloud.Filesharingis
possible using this cloud computing database. File data
share between user and owner is secure using hybrid
encryption technique. In the firststagemultimedia content
is encrypted into ciphertext-1 using a AES symmetric key.
The ciphertext-1 is again encrypted using a Blowfish
algorithm. The decryption is done in reverse order as
shown in fig. 2
Fig - 2: Dual encryption and Decryption process
3.2.1 AES Algorithm:
The AES stands for Advanced Encryption Standard is a
symmetric key algorithm. The AES has three fixed 128-bit
block ciphers with cryptographic key sizes of 128,192 and
256 bits. Key size is unlimited, while maximum block size
is 256 bits. The AES design is based on a substitution-
permutation network (SPN) and does not use the Data
Encryption Standard (DES) network.
1. Key Expansion- each and every round keys are derived
from the cipher key using AES key schedule.AESrequiresa
separate 128-bit key block for each round plus one more.
2. Initial Round Add Round Key—each byte of the state is
combined with a block of the round key using bitwise xor.
3. Rounds a. Sub Bytes—
a. non-linear substitution step wherever every computer
memory unit is replaced with another per a search table.
b. Shift Rows- a transposition step where lastthreerows of
state are shifted cyclically in a certain number of steps.
c. Mixed Columns- a compound operation that operateson
the columns of the state,
combining the four bytes in each column.
d. Add Round Key
4. Final Round (no Mix Columns)
a. Sub Bytes
b. Shift Rows
c. Add Round Key.
3.2.2 Blowfish Algorithm:
Blowfish is a symmetric block encryption algorithm
designed in consideration with,
I. Fast: It encrypts data on large 32-bit microprocessors at
a rate of 26 clock cycles per byte.
II. Compact: It can run in less than 5K of memory.
III. Simple: It uses addition, XOR, lookup table with 32-bit
operands.
IV. Secure: The key length is variable and it can be in the
range of 32-448 bits. (Default 128 bits key length).
Blowfish block cipher algorithm encrypts block data of64-
bits at a time.it will follows the festal network and this
algorithm is divided into two parts.
Key-expansion:
It will convert a key of at most 448 bits intoseveral subkey
arrays totaling 4168 bytes. Blowfish uses large number of
sub keys. These keys are generated earlier of any data
encripherment or decipherment. The p-array consists of
18, 32-bit sub keys:
P1,P2,………….,P18
Four 32-bit S-Boxes consists of 256 entries each:
S1,0, S1,1,………. S1,255
S2,0, S2,1,……….. S2,255
S3,0, S3,1,……….. S3,255
S4,0, S4,1,..............S4,255
Generating the Sub keys:
The sub keys are calculated using the Blowfish algorithm:
i. Initialize first the P-array and then the four S-boxes, in
order, with a fixed string. This string consists of the
hexadecimal representation of pi (less the initial 3): P1 =
0x243f6a88, P2 = 0x85a308d3, P3 = 0x13198a2e, P4 =
0x03707344, etc.
ii. XOR P1 with the first 32 bits of the key, XOR P2 with the
second 32-bits of the key, and so on for all bits of the key
(possibly up to P14). Repeatedly cycle through thekeybits
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7034
till the whole P-array has been XORed with key bits. (For
each and every short key, there is at least one equivalent
longer key; for example, if A is a 64-bit key, then AA, AAA,
etc., are equivalent keys.)
iii. Encrypt the all-zero string with the Blowfish algorithm,
using the sub keys described in steps (1) and (2).
iv. Replace P1 and P2 with the output of step (3).
v. Encrypt the output of step (3) using the Blowfish
algorithm with the modified sub keys.
vi. Replace P3 and P4 with the output of step (5).
vii. Continue the process, replacing all entries of the P
array, and then all four S-boxes in order, with the outputof
the continuously changing Blowfish algorithm.
In total, 521 iterations are needed to create all needed sub
keys. Applications will store the sub keys instead of
executing this derivation process multiple times.
It is having a function of 16 iterations of network. Each
round consists of key-dependent permutation and data-
dependent substitution. All operations are XORed and
additions on 32-bit words. The only further operationsare
four indexed array data lookup tables for each round.
Fig - 3: Blowfish Encryption
Algorithm: Blowfish Encryption
Divide x into two 32-bit halves: xL, xR
For i = 1to 16
xL = XL XOR Pi
xR = F(XL) XOR xR
Swap XL and xR
Swap XL and xR (Undo the last swap.
xR = xR XOR P17
xL = xL XOR P18
Recombine xL and xR
4. CONCLUSION
This project represents a double stage encryption
algorithm that provides the security of multimedia
contents such as image, audio and video in the cloud. The
proposed algorithm is critical in the second stage. The
randomly generated key provides additional securitythan
the traditional encryption system. The 64-bit converter
generates the multimedia contents into theciphertext.The
ciphertext is stored in the cloud rather than in original
multimedia content. The ciphertextisundoubtedlyhard to
recover the original content for random asymmetric key.
Wide application of the proposed algorithm protects the
information from the side channel attacker to grab the
multimedia data into the cloud. Thus, the multimedia data
is secure in the cloud.
But as we know many of us uses smartphones frequently
to upload content on cloud as a fast backup option. Hence
there should also be security for content while uploading
or downloading using cloud storagevia smartphones.Soin
future we will be expanding our domain to other systems
such as android and ios. Because of this many user who
don’t use computers all the time or don’t have computer
access frequently can use cloud without fear of getting
their stuff deleted or stolen. By using this system on a
smartphone there will be more portability and safety for
cloud consumers.
5. REFERENCES
[1] P. Gupta and A. K. Brar, "An Enhanced Security
Technique for Storage of Multimedia Content over
Cloud Server," International Journal of Engineering
Research and Applications (lJERA), vol. 3, no. 4, pp.
2273-2277, ACM, 2013.
[2] Sonal Guleria and DR. Sonia vatta, “To enhance
multimedia security in cloud computing environment
using Crossbreed Algorithm.” International Journal of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7035
Application or Innovation in Engineering and
Management, vol. 2, 6 June 2013.
[3] Md. Habibur Rahman, Nazrul Islam, Mehedy Hasan
Rafsan Jany, Shariful and Mohammad Motiur Rahman,
“Multimedia Content Security with Random Key
Generation Approach inCloudComputing.”IEEEcyber
security and privacy,vol 4, may 2017.
[4] W. Kim, "Cloud Computing: Today and Tomorrow."
Journal of object technology, vol. 8, no. 1, pp. 65-72,
2009.
[5] H. Takabi, 1. B. Joshi, and G.-J. Abn, "Security and
Privacy Challenges in Cloud Computing
Environments;' IEEE Security & Privacy, no. 6, pp. 24-
31, IEEE, 2010.
[6] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A.
Ghalsasi, "CloudComputing-theBusinessPerspective,"
Decision support systems, vol. 51, no. 1, pp. 176-189,
Elsevier, 2011.

Más contenido relacionado

La actualidad más candente

Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
IAEME Publication
 

La actualidad más candente (19)

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
76 s201918
76 s20191876 s201918
76 s201918
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 

Similar a IRJET- Multimedia Content Security with Random Key Generation Approach in Cloud Computing

A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Editor IJCATR
 

Similar a IRJET- Multimedia Content Security with Random Key Generation Approach in Cloud Computing (20)

IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 

Más de IRJET Journal

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Último (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

IRJET- Multimedia Content Security with Random Key Generation Approach in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7031 Multimedia Content Security with Random Key Generation Approach in Cloud Computing Chandan Thakur1, Rashmita Pandey2, Nusrat Parveen3 1,2Student, Computer Department, Datta Meghe College of Engineering, Maharashtra, India 3Professor, Computer Department, Datta Meghe College of Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The cloud computing offers high scalability, confidentiality and easy accessibility of informationoverthe internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) beside targeted VM can extract all information. Thus, this paper implements double stage encryption algorithm for multimedia content security using random key generation. The first stage encrypts multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated symmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover multimedia contents. Low complexity and easy implementations make the proposed algorithm widely applicable safeguard in cloud computing. Keyword: Cipher text, Encryption, Multimedia, Virtual Machine, random Key generation 1.INTRODUCTION 1.1 Cloud Computing: Cloud computing is freedom of processingandstoringdata of consumers in the third-party data center using remote computing resources over the Internet. The cloud is the combination of three services. Thegoal ofcloudcomputing is to allow users to take benefit from all thesetechnologies, without the need for deep knowledge. The cloud computing aims to cut costs, and helps the users to focus on their core business instead of being impeded by IT obstacles. Cloud computing and storagesolutionsprovides services to users and enterprises with various capabilities to store and process their data in third party data centers that may be located far from user-rangingindistancefrom across a city to across the world. A third partymanagesthe data and multimedia contents and has the liabilities to make certain security for the protection of data and multimedia contents and provide uninterrupted services. Unless there may be arise in security question and trustworthiness of third party.Beside the third party deliberately or inadvertently discloses the data. 1.2 Security issues in Cloud: While it is generally agreed that encryption is necessaryto protect data security, working with encrypted data proves to be challenging in cloud. The problem of using public cloud is the cloud owner can’t be trusted with the data. to be challenging in cloud. The problem of using public cloud is the cloud owner can’t be trusted with the data. Hence a solution is required to safeguardthedata.Asolutionwould be to download and decrypt all the documents to extract the relevant information. 1.2.1 Data Integrity: A secured system ensures that the data it contains is valid. Data integrity implies that knowledge is protected against deletion and corruption each once it's among the information, and whereas it's being transmitted over the network. 1.2.2 Data Confidentiality: A secure system ensures the confidentiality of data. This means that it allows users to see only those data which they are supposed to see. Whenever possible, confidential data should be encrypted and decrypted during on- premises or end-pointprocessingbeforeitistransferred to the cloud. The key concern is protecting data confidentiality in end-to-end fashion. 1.2.3 Access Control: Access control states that information shared over cloud must be accessible to authorized users. Access should be given to only those users who have authority to gain the access to the shared data. 1.2.4 Data Manipulation: It is an effort to make data more easier to read or to be more organized. 2. LITERATURE SURVEY In cloud computing, since it is a new area, the developers are concentrating more on computation speed and storage issue. Users are going for unreliable networks
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7032 without their knowledge to share the media content even though there are availability of more promising streaming technology and increased broadbandspeed.Atpresent,the security of the multimedia contents such as image, audio and video become a rising issue. A survey on recently performed analysis activities on multimedia system security and intersected four burning queries like knowledge integrity, data confidentiality, access control and data manipulation. Several studies are done on the protection of the multimedia system contents within the cloud. The paper replaces the DES algorithm by theAESalgorithmduetothe inbuilt scarcity of strength and combined the AES with the RSA. Gupta et al. also projected a sophisticated algorithmic rule combining the RSA with 2 fish. These studies targeted on the mix of 2 totally different algorithmsandgenerated a security key for shoppers as a key to access the cloud. The mitigation of the facet channel attack was shown and also the projected algorithmic rule targeted solely on the 2 prime numbers. The on top of study leads USA to implement a double stageencodingalgorithmic ruleforthe protection of multimedia system contents against a negligent third party and facet channel attack. The projected every which way generated key algorithmicrule produces when a novel isosceles key that lets the information be encrypted with success.Aliteraturereview is performed to search out a good algorithmic rule having minimum complexness and wide applicablecloudsecurity for the multimedia system contents against the facet channel attack. Since it is more difficult to stop or identify the side channel attack, hence the double stage encryption allows cipher text to store in the VM. The double stage decryption transmits the original data from the VM. Based on the literature study the specified languages, tools and hardware area unit chosen to develop the projected algorithm. 2.1 Existing System: The security of multimedia contents in the cloud. The replaces the DES algorithm by theAESalgorithmduetothe inbuilt scarcity of strength and combined the AES with the RSA. Also projected a sophisticated algorithmic rule combining the RSA with two fish. These studies focusedon the combination of two completely different algorithms and generated security key for users as a key to access the cloud. The mitigation of aspect channel attack was shown and therefore the proposed algorithm focused solely on the two prime numbers. Disadvantages of existing system I. Encryption Singular Symmetric Method key and asymmetric key. II. Key Type Fixed. III. Key exposition possibility high. 2.2 Proposed System: This project double stage encryption algorithm that provides the security of multimedia contents such as image, audio and video in the cloud. In first stage data is encrypted using AES or Blow fish algorithm. Both AES and Blowfish algorithm is used in this system. AES algorithmis used as first encryptionalgorithm.Theproposedalgorithm is critical in the second stage. The randomly generatedkey provides additional security than the traditional encryption system. The 94-bit converter generates the multimedia contents into the cipher text. The ciphertextis stored in the cloud instead of original multimedia content. The cipher text is undoubtedly hard to recover theoriginal content for random asymmetric key. Wide application of the proposed algorithm protects the information from the side channel attacker to grab the multimedia data into the cloud. Thus, the multimedia is safe within the cloud. Advantages of Proposed system: I. Encryption Double Symmetric Method key and asymmetric key. II. Key Type Random. III. Key exposition possibility low. 3.METHODOLOGY & IMPLEMENTATIONS 3.1 System Architecture: The system Architecture model involves threeparties:the data owner, the cloud server and the user. The fig.1 illustrates the Architecture of System which includes encryption and decryption process flow. Fig - 1: System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7033 3.2 Proposed Algorithm: The proposed randomlygeneratedkeyalgorithmproduces every time a unique symmetric key that lets the data be encrypted successfully. In this system hybrid encryption technique is apply on the data file using AES and Blowfish algorithm to securely store file data in cloud.Filesharingis possible using this cloud computing database. File data share between user and owner is secure using hybrid encryption technique. In the firststagemultimedia content is encrypted into ciphertext-1 using a AES symmetric key. The ciphertext-1 is again encrypted using a Blowfish algorithm. The decryption is done in reverse order as shown in fig. 2 Fig - 2: Dual encryption and Decryption process 3.2.1 AES Algorithm: The AES stands for Advanced Encryption Standard is a symmetric key algorithm. The AES has three fixed 128-bit block ciphers with cryptographic key sizes of 128,192 and 256 bits. Key size is unlimited, while maximum block size is 256 bits. The AES design is based on a substitution- permutation network (SPN) and does not use the Data Encryption Standard (DES) network. 1. Key Expansion- each and every round keys are derived from the cipher key using AES key schedule.AESrequiresa separate 128-bit key block for each round plus one more. 2. Initial Round Add Round Key—each byte of the state is combined with a block of the round key using bitwise xor. 3. Rounds a. Sub Bytes— a. non-linear substitution step wherever every computer memory unit is replaced with another per a search table. b. Shift Rows- a transposition step where lastthreerows of state are shifted cyclically in a certain number of steps. c. Mixed Columns- a compound operation that operateson the columns of the state, combining the four bytes in each column. d. Add Round Key 4. Final Round (no Mix Columns) a. Sub Bytes b. Shift Rows c. Add Round Key. 3.2.2 Blowfish Algorithm: Blowfish is a symmetric block encryption algorithm designed in consideration with, I. Fast: It encrypts data on large 32-bit microprocessors at a rate of 26 clock cycles per byte. II. Compact: It can run in less than 5K of memory. III. Simple: It uses addition, XOR, lookup table with 32-bit operands. IV. Secure: The key length is variable and it can be in the range of 32-448 bits. (Default 128 bits key length). Blowfish block cipher algorithm encrypts block data of64- bits at a time.it will follows the festal network and this algorithm is divided into two parts. Key-expansion: It will convert a key of at most 448 bits intoseveral subkey arrays totaling 4168 bytes. Blowfish uses large number of sub keys. These keys are generated earlier of any data encripherment or decipherment. The p-array consists of 18, 32-bit sub keys: P1,P2,………….,P18 Four 32-bit S-Boxes consists of 256 entries each: S1,0, S1,1,………. S1,255 S2,0, S2,1,……….. S2,255 S3,0, S3,1,……….. S3,255 S4,0, S4,1,..............S4,255 Generating the Sub keys: The sub keys are calculated using the Blowfish algorithm: i. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string consists of the hexadecimal representation of pi (less the initial 3): P1 = 0x243f6a88, P2 = 0x85a308d3, P3 = 0x13198a2e, P4 = 0x03707344, etc. ii. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through thekeybits
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7034 till the whole P-array has been XORed with key bits. (For each and every short key, there is at least one equivalent longer key; for example, if A is a 64-bit key, then AA, AAA, etc., are equivalent keys.) iii. Encrypt the all-zero string with the Blowfish algorithm, using the sub keys described in steps (1) and (2). iv. Replace P1 and P2 with the output of step (3). v. Encrypt the output of step (3) using the Blowfish algorithm with the modified sub keys. vi. Replace P3 and P4 with the output of step (5). vii. Continue the process, replacing all entries of the P array, and then all four S-boxes in order, with the outputof the continuously changing Blowfish algorithm. In total, 521 iterations are needed to create all needed sub keys. Applications will store the sub keys instead of executing this derivation process multiple times. It is having a function of 16 iterations of network. Each round consists of key-dependent permutation and data- dependent substitution. All operations are XORed and additions on 32-bit words. The only further operationsare four indexed array data lookup tables for each round. Fig - 3: Blowfish Encryption Algorithm: Blowfish Encryption Divide x into two 32-bit halves: xL, xR For i = 1to 16 xL = XL XOR Pi xR = F(XL) XOR xR Swap XL and xR Swap XL and xR (Undo the last swap. xR = xR XOR P17 xL = xL XOR P18 Recombine xL and xR 4. CONCLUSION This project represents a double stage encryption algorithm that provides the security of multimedia contents such as image, audio and video in the cloud. The proposed algorithm is critical in the second stage. The randomly generated key provides additional securitythan the traditional encryption system. The 64-bit converter generates the multimedia contents into theciphertext.The ciphertext is stored in the cloud rather than in original multimedia content. The ciphertextisundoubtedlyhard to recover the original content for random asymmetric key. Wide application of the proposed algorithm protects the information from the side channel attacker to grab the multimedia data into the cloud. Thus, the multimedia data is secure in the cloud. But as we know many of us uses smartphones frequently to upload content on cloud as a fast backup option. Hence there should also be security for content while uploading or downloading using cloud storagevia smartphones.Soin future we will be expanding our domain to other systems such as android and ios. Because of this many user who don’t use computers all the time or don’t have computer access frequently can use cloud without fear of getting their stuff deleted or stolen. By using this system on a smartphone there will be more portability and safety for cloud consumers. 5. REFERENCES [1] P. Gupta and A. K. Brar, "An Enhanced Security Technique for Storage of Multimedia Content over Cloud Server," International Journal of Engineering Research and Applications (lJERA), vol. 3, no. 4, pp. 2273-2277, ACM, 2013. [2] Sonal Guleria and DR. Sonia vatta, “To enhance multimedia security in cloud computing environment using Crossbreed Algorithm.” International Journal of
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7035 Application or Innovation in Engineering and Management, vol. 2, 6 June 2013. [3] Md. Habibur Rahman, Nazrul Islam, Mehedy Hasan Rafsan Jany, Shariful and Mohammad Motiur Rahman, “Multimedia Content Security with Random Key Generation Approach inCloudComputing.”IEEEcyber security and privacy,vol 4, may 2017. [4] W. Kim, "Cloud Computing: Today and Tomorrow." Journal of object technology, vol. 8, no. 1, pp. 65-72, 2009. [5] H. Takabi, 1. B. Joshi, and G.-J. Abn, "Security and Privacy Challenges in Cloud Computing Environments;' IEEE Security & Privacy, no. 6, pp. 24- 31, IEEE, 2010. [6] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "CloudComputing-theBusinessPerspective," Decision support systems, vol. 51, no. 1, pp. 176-189, Elsevier, 2011.