Towards The Secure Storage Of Images On Multi Cloud System

1568 words - 7 pages

1. INTRODUCTION
Cloud computing has been defined as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. But there is a risk of widespread data loss or downtime due to internet connectivity problems or a localized component failure in a cloud computing environment. In order to reduce the service availability risk or loss of data, a multi cloud system where data is replicated into multiple clouds offered by different cloud providers are used. Once the assets are in the cloud, the clients lose control over them, as data in the cloud typically resides in a shared environment. With the growth of a large number of cloud service providers, there is a need to protect confidential images stored in the cloud from unauthorized users and also from the cloud service providers. This paper proposes an integrated encryption scheme based on DNA sequences and scrambling using zigzag pattern or Magic Square of doubly even order pattern to ensure double-fold security for the secure storage of confidential images on multi-cloud.
2. DEFINITIONS FOR THE PROPOSED SYSTEM
2.1. Cryptosystem : A cryptosystem is a five tuple (M, C, , , D) where
i. M is a finite set of plain-text (images).
ii. C is a finite set of possible cipher-text.
iii.  is a finite set of possible keys.
iv. For each K  , there is an encryption rule, EK   and a corresponding decryption rule, DK  D.
Each EK : M  C and DK : C  M are functions such that DK (EK (x)) = x, for every plain-text x  M.
2.2. Synthesis: Creation of DNA sequences for the image data is referred to as Synthesis. DNA sequences are made up of four bases – A, C, T and G. According to the DNA Digital Coding Technology [6], C denotes 00, A – 01, T - 10 and G – 11.
2.3. Translation: When the positions of sequences are translated, the sequences are interchanged.
P1P2P3P4  P5P6P7P8
2.4. Substitution: Each quadruple nucleotide sequence is substituted by the value returned by the DNA Sequence Crypt function.
V DNASequenceCryptfn(P1P2P3P4)
2.5. Detect: Detect searches for a quadruple nucleotide sequence of the image starting from a random position in the DNA sequence file and returns true if a match is found and false otherwise.
Boolean  Detect(P1P2P3P4)
2.6. DNA Sequence Crypt function: A DNA Sequence Crypt function is a one-to-many function d(x) that returns one of the many positions of the quadruple DNA sequence in the key DNA sequence file.
2.7. Rev-Synthesis: Rev-synthesis is the process of converting each sequence into its digital form.
2.8. Magic Square: A magic square of order n is a square matrix or array of n2 numbers such that the sum of the elements of each row and column, as well as the main diagonals, is the same number, called the magic constant, (M). Figure 1 displays magic squares of order 8 arranged in eight...

Find Another Essay On Towards the Secure Storage of Images on Multi-Cloud System

Adoption of Cloud Computing relating to Data Storage

2267 words - 9 pages procedures of having in-house hardware and data storage and instil efficacy. Cloud data storage is reaching small to medium sized companies, this is being achieved by flexible costs which is assisting manageability of data capacity. The more data stored, the lower the price. This is encouraging the strategic side of companies to look at this new phenomenon closely. As this is geared towards bringing enterprise scale infrastructure to small and

The Paradox of Cooperation and Competition in Strategic Alliances - Towards a Multi-paradigm Approach

7012 words - 28 pages , a dynamic perspective need be incorporated into the multi-paradigms. One side of paradox is assumed to hold at one time and the other at a different time. There may also be mutual influence over time, with swings from one side to another, as in morphogenesis theory of system development (Van de Ven & Poole, 1988). Our methodology is to employ a perspective with a time dimension or with an emphasis on the interactions of the opposites.A Multi

The Paradox of Cooperation and Competition in Strategic Alliances: Towards a Multi-paradigm Approach

7258 words - 29 pages dynamic perspective need be incorporated into the multi-paradigms. One side of paradox is assumed to hold at one time and the other at a different time. There may also be mutual influence over time, with swings from one side to another, as in morphogenesis theory of system development (Van de Ven & Poole, 1988). Our methodology is to employ a perspective with a time dimension or with an emphasis on the interactions of the opposites.A Multi

MULTI-SCALE MATCHING FOR THE AUTOMATIC LOCATION OF CONTROL POINTS IN LARGE SCALE AERIAL IMAGES USING TERRESTRIAL SCENES

2263 words - 10 pages 1. INTRODUCTION The proposed technique aims at the automatic location and measurement of Ground Control Points (GCPs) in aerial images using vertical terrestrial chips and considering large search spaces. The availability of data derived by integrated Global Navigation Satellite System (GNSS) and Inertial Navigation System (INS) systems have been used for the direct sensor orientation (DSO) in photogrammetric processes. The correction of

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

The Effect of Images

1566 words - 6 pages along with the help of ideas expressed by authors Mitchell Stephens and Ward Churchill in their essays "By Means of the Visible" and Crimes Against Humanity" show the great power possessed by the union of images and words. "The Blair Witch Project" is a horror film made on a shoestring budget by a few no name producers. The film presents itself as a documentary made up entirely of footage shot by three missing student filmmakers who

The Power of Images

1284 words - 5 pages now desire the opposite, to be younger again and to not have the responsibility and expectations that have been bestowed upon me. Ironically enough, I have no recollection when or where this photograph was taken. However, contrary to popular belief, I feel my ignorance towards the details of the situation actually benefit me as an onlooker to the events portrayed in the photograph. In the photograph, my brother and I are sitting on a granite table

The impacts of images

1131 words - 5 pages sympathy which was grabbed by the people. As quoted in the advertisement “As cannon sees it, images have the power to raise awareness of the threats facing the endangered species and the natural environment, helping us make the world a better place.” This very statement tries to push in ethos into the audiences by making them feel like images actually have an impact on the environment. The statement has put in a certain feeling into the people which

Images of the Church

808 words - 4 pages The images of the Church are extremely important in Church history. They explain how and why the people of a certain time viewed the church. There are many different images that people associate the church with. Most of these images are based on a time period, whether it’s a time of suffering or a time of triumph. The first image is one of the earliest images to describe the Church and it comes from the New Testament. In the first century

The Power of Images

1031 words - 4 pages the emotional scars of that day will never heal. Finally, pictures are able to capture a single moment of life. When a moment is captured, it defines the meaning of the purpose of the events. Every picture, whether it is a passionate kiss, a poverty-stricken family during the Depression era, or the look of sorrow on my grandfather’s face, ignites its own sentiment. Although, according to Stephens, “These images, are intended to take the

Images of the Future

1036 words - 5 pages Ramachandran is an extremely successful professor with the Psychology Department and Neurosciences Program at the University of California, San Diego. Among many other achievements, he has published over 180 papers in scientific journals and wrote two best-selling novels. The Tell-Tale Brain provides in depth case studies on patients with bizarre neurological symptoms. He works with them to find an explanation and solution to their problem. In some

Similar Essays

Multi Replica Data In Cloud Storage Essay

1222 words - 5 pages case of multiple-copy auditing and outputs TRUE if the verification equation passed, or FALSE otherwise. Recover: To repair a corruption on the l- storage server, the TPA uses the corresponding coding vectors {∆_lj }_(1≤j≤n) to generate the encoded blocks {m_lj }_(1≤j≤n). m_ljis generated by the XOR combination of |∆_lj| original blocks as m_lj=M_l1 ⨁▒…⊕ M_(l |∆_lj |). (8) The data management sub-system is concerned with maintaining data dynamics

The Cloud Storage Essay

988 words - 4 pages . ATTENTION : Leo Genbeta Sugarsync plans that eliminate free plans for 2.8.14. Just in case, I recommend you go saving the content of the cloud to keep him. Dropbox -. A pioneer and perhaps the best known of all. Although start your free offer is more limited (only 2 GB), lets go up to 18 GB to expand base to send recommendations. Its interface is translated into Spanish thanks. It has apps for mobile operating systems and is known for its ability to share files and folders. These are just a small sample of the many platforms of free storage, but if you know any more worthwhile, do not hesitate to comment on it.

Retrieving The Top K Ranked Secure Sensor Data In Cloud

762 words - 4 pages , outdates the traditional data exploitation service based on plaintext keyword search. The simple solution of downloading all the data and decrypting locally is clearly incompetent, due to the large amount of bandwidth cost in cloud scale system. Moreover, aside from excluding the local storage, storing data into the cloud server serves no intention unless they can be easily searched and utilized. Thus, discovering privacy-preserving and

Security, Storage And Transmission Of Electronic Digital Images

2439 words - 10 pages 1. 1 Overview Many digital services require reliable security in storage and transmission of electronic digital images. Due to the rapid growth with the internet in the electronic digital world today, the protection of digital images is becoming more important and enticed much attention. The prevalence of multimedia technology in this society has promoted electronic digital images to play a far more significant role than the traditional texts