Beruflich Dokumente
Kultur Dokumente
166
TABLE NO. 1: THE KEY SIZE AND PACKET SIZE IN
PROPOSED SYSTEM
Simulation Key Packet Size(Kb) with
Size image
SIM 1 5 14
SIM 2 8 18
SIM 3 6 12
SIM 4 7 11
SIM 5 9 14
SIM 6 4 18
SIM 7 8 16
Fig.4. Beginning Screen of Simulation
SIM 8 5 12 The user can select the image for encryption as shown by
clicking on the browse button
SIM 9 8 15
SIM 10 11 17
167
Encryption algorithms play an important role in data security
on Optical medium and by comparison of different
parameters used in algorithms, it has been found that AES
algorithm uses least time to execute Optical medium data.
Blowfish algorithm has least memory requirement. DES
algorithm consumes least encryption time. RSA consumes
longest memory size and encryption time. The future scope
of this work is to find out an efficient algorithm to make the
data secure by combining homomorphic encryption and MD5
algorithm and use some compression algorithm to protect the
data. In the future we will work on improvement of optical
stegnography to be utilized along with Optical medium.
REFERENCES
1. Kai He, Chuanhe Huang, Hao Zhou, Jiaoli Shi, Xiaomao Wang, Feng
Dan, "Public auditing for encrypted data with client-side
deduplication in cloud storage, " Wuhan University Journal of Natural
Sciences, Volume 20, Issue 4, pp 291– 298,August 2015.
2. Fips N. Announcing the ADVANCED ENCRYPTION STANDARD
Fig.6. After Data Hiding Process (AES ). Byte. 2001; 2009(12):8–12.
3. Ninni Singh, Nitin Kumar Singh, "Information Security in Cloud
The proposed model in terms of simulation is created within
Computing using Encryption Techniques , " International Journal of
model factory in MATLAB Scientific & Engineering Research, Volume 5, Issue 4, ISSN 2229-
5518, April-2014.
4. Maha TEBAA, Said EL HAJII, "Secure Cloud Computing Through
Homomorphic Encryption, " International Journal of Advancements
in Computing Technology (IJACT), Volume5, Number16, December
2013.
5. Wang C, Wang Q, Ren K, "Towards Secure and Effective Utilization
over Encrypted Cloud Data, 31st International Conference on
Distributed Computing Systems Workshops IEEE, ISSN 15450678,
pp. 282–286, 2011.
6. Cao N, Wang C, Li M, Ren K, Lou W, "Privacy Preserving Multi-
Keyword Ranked Search over Encrypted Cloud Data, IEEE Trans
Parallel Distributed Systems, Vol. 25, No. 1, pp. 222-233, January
2014.
7. Xu Chen, “Decentralized Computation Offloading Game for Mobile
Optical medium,” IEEE Transactions on Parallel and Distributed
Systems 26(4):974–983, March 26, 2015.
8. Steve Hanna, Juniper Networks, " Cloud Computing: Finding the
Silver Lining, 2009.
9. GL Prakash, Manish Prateek , Inder Singh, "Data encryption and
decryption algorithms using key rotations for data security in cloud
system, International Conference on Signal Propagation and
Fig.7. Proposed Model Computer Technology (ICSPCT 2014) 3(4):624–629, 2014.
10. Xia Z, Wang X, Sun X, Wang Q, "A Secure and Dynamic Multi-
V. CONCLUSION Keyword Ranked Search Scheme over Encrypted Cloud Data, IEEE
Trans Parallel Distrib Syst, 27(2):340–52, Feb 2016.
The dissolution of security concerns within the Optical 11. Cloud security alliance. Category 8// Encryption. 2012; (September):
medium is reviewed in this paper. The security mechanisms 1–28.
which are discussed in this paper are efficient. The 12. Jie Xu, Qiaoyan Wen, Wenmin Li and Zhengping Jin, “Circuit
collaboration of Optical medium with optical stegnography is Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
Delegation in Optical medium,” IEEE Transactions on Parallel and
also studied. In other words, this three way protocol is Distributed Systems 27(1):119–129, 2016.
considered to be best one analyzed different methods for data 13. S.S. Bedi, ShekharVerma & G.S. Tomar, “An Adaptive Data Hiding
security in Optical medium. Various encryption algorithms Technique for Digital Image Authentication”, International Journal of
have been proposed to make Optical medium data secure, Computer Theory and Engineering, Vol. 2, No. 3, pp 338-344, June,
vulnerable and gave concern to security issues, challenges 2010.
and also comparisons have been made between AES, DES
and RSA algorithms to find the best one security algorithm,
which has to be used in Optical medium for making Optical
medium data secure and not to be hacked by attackers.
168