Security Model for Preserving Privacy of Image in Cloud

  • Prasanta Kumar MahapatraEmail author
  • Alok Ranjan Tripathy
  • Alakananda Tripathy
  • Biraja Mishra
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 37)


Cloud can be referred to as a public or semi-public interface between network nodes, based on certain contractual agreement. Data transmits across networks within different connected nodes. Cloud provides on-demand self-service. It also provides broad network access means from any standard device such as PC, laptop, and so on, where connection can be made with the network cloud. Cloud provides broad network access and uses resource pooling. As many companies are facing insecurities while dealing with data within the cloud, security models plays a major role in the security of cloud. This paper will offer a comparative analysis of some of the widely accepted algorithms that are used, considering data reliability, scalability, and integrity it provides on the cloud from unauthorized access based on image encryption/decryption method.


Cloud Cloud security AES RSA Image encryption 


  1. 1.
    H.A. Al Hamid, S.M. Rahman, M.S. Hossain, A. Almogren, A. Alamri, A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5, 22313–22328 (2017)CrossRefGoogle Scholar
  2. 2.
    J.Z. Luo, J.H. Jin, A.B. Song, F. Dong, Cloud computing: architecture and key technologies. 32(7), 3–21 (2011)Google Scholar
  3. 3.
    P. Fremantle, P. Scott, A survey of secure middleware for the Internet of Things. PeerJ Comput. Sci. 3 (2017)CrossRefGoogle Scholar
  4. 4.
    R. Nigoti, M. Jhuria, S. Singh, A survey of cryptographic algorithms for cloud computing (2013)Google Scholar
  5. 5.
    U.R. Jadhav, A review of cloud computing and security algorithms 7(1) (2015)Google Scholar
  6. 6.
    R. Arora, A. Parashar, Secure user data in cloud computing using encryption algorithms. Int. J. Eng. Res. Appl. 3(4), 1922–1926 (2013)Google Scholar
  7. 7.
    U. Somani, K. Lakhani, M. Mundra, Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing, in 1st International Conference on Parallel, Distributed and Grid Computing. IEEE (2010)Google Scholar
  8. 8.
    H.-T. Cui, Research on the model of big data serves security in cloud environment, in Computer Communication and the Internet (ICCCI) (2016)Google Scholar
  9. 9.
    H. Rong, H.M. Wang, J. Liu, M. Xian, Privacy-preserving k-nearest neighbor computation in multiple cloud environments. IEEE Access 4, 9589–9603 (2016)CrossRefGoogle Scholar
  10. 10.
    N. Shimbre, P. Deshpande, Enhancing distributed data storage security for cloud computing using TPA and AES algorithm, in International Conference on (ICCUBEA). IEEE (2015)Google Scholar
  11. 11.
    B.I. Santoso, M.R. Idrus, I.P. Gunawan, Designing network intrusion and detection system using signature based method for protecting open stack private cloud, in International Annual Engineering Seminar (InAES). IEEE (2016)Google Scholar
  12. 12.
    R. Machova, J. Komarkova, M. Lnenicka, Processing of big educational data in the cloud using Apache Hadoop, in 2016 International Conference on Information Society (i-Society). IEEE (2016)Google Scholar
  13. 13.
  14. 14.
    P. Kalpana, S. Singaraju Data security in cloud computing using RSA algorithm. IJRCCT 1(4), 143–146 (2012)Google Scholar
  15. 15.
    L. Abraham, N. Daniel, Int. J. Sci. Technol. Res. 2(4) (2013)Google Scholar
  16. 16.
    Z. Huang, Towards a better computing cluster for big-data analytic systems. Ph.D. Dissertation (2015)Google Scholar
  17. 17.
    C.A. Da Silva, A.S. Ferreir, P.L. de Geus, A methodology for management of cloud computing using security criteria, in IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud). IEEE (2012)Google Scholar
  18. 18.
    K. Loukhaoukha, J.Y. Chouinard, A. Berdai, A secure image encryption algorithm based on Rubik’s cube principle. J. Electr. Comput. Eng. (2012)Google Scholar
  19. 19.
    T. Nie, T. Zhang, A study of DES and Blowfish encryption algorithm, in Tencon 2009–2009 IEEE Region 10 Conference. IEEE (2009)Google Scholar
  20. 20.
    Suryateja: A comparative analysis of cloud simulators. Int. J. Modern Educ. Comput. Sci. 8(4) (2016)CrossRefGoogle Scholar
  21. 21.
    R. Kaur, S. Kinger, Analysis of security algorithms in cloud computing 3(3), 171–176 (2014)Google Scholar
  22. 22.
    R. Afreen, S.C. Mehrotra, A review on elliptic curve cryptography for embedded systems. arXiv preprint arXiv:1107.3631 (2011)
  23. 23.
    N. Tyagi, A. Ganpati, Comparative analysis of symmetric key encryption algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(8), 348–354 (2014)Google Scholar
  24. 24.
    J. Thakur, N. Kumar, DES, AES and symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. l(2), 6–12 (2011)Google Scholar
  25. 25.
    H. B. Nguyen, An overview of the NTRU cryptographic system, M.S. thesis, Department of Mathematics and Statistics, University of San Diego, San Diego, CA, USA (2014)Google Scholar
  26. 26.
    N. Gura, A. Patel, A. Wander, H. Eberle, S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 3156. Springer, Berlin (2004)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Prasanta Kumar Mahapatra
    • 1
    Email author
  • Alok Ranjan Tripathy
    • 1
  • Alakananda Tripathy
    • 2
  • Biraja Mishra
    • 1
  1. 1.Department of Computer ScienceRavenshaw UniversityCuttackIndia
  2. 2.Department of Computer Science and EngineeringSOA UniversityBhubaneswarIndia

Personalised recommendations