Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function
American Journal of Applied Mathematics
Volume 3, Issue 1-2, January 2015, Pages: 1-8
Received: Jul. 24, 2014; Accepted: Sep. 2, 2014; Published: Dec. 27, 2014
Views 3678      Downloads 219
Authors
Bidisha Goswami, Computer Science & Engineering, PES Institute of Technology, Bangalore South Campus, Bangalore, India
Ravichandra G., Computer Science & Engineering, PES Institute of Technology, Bangalore South Campus, Bangalore, India
Article Tools
Follow on us
Abstract
Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication and confidentiality issues. A methodology has been proposed for user authentication to make cloud server, dynamic in nature, based on the time stamp and other parameters. The confidential data are embedded randomly in images using steganography as a basic technique, in which a new method of encryption and decryption is proposed. The methodology of encryption or decryption uses odd Fibonacci series values and a hash function to prepare hash value series. This hash value series is multiplied with ASCII codes of the original data which need to embed, in decryption process and similar technique have been used here, rather than the technique of multiplying ASCII codes with hash value using division operation.
Keywords
Privacy, Cloud computing, Steganography, Encryption, Decryption, Hash Function
To cite this article
Bidisha Goswami, Ravichandra G., Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function, American Journal of Applied Mathematics. Special Issue:Frontiers in Mathematics and Computing. Vol. 3, No. 1-2, 2015, pp. 1-8. doi: 10.11648/j.ajam.s.2015030102.11
References
[1]
P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765
[2]
CryptographyandNetworkSecurity; Principles and Practices (5thEdition), William Stallings,
[3]
Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM
[4]
Biham, Eliand Shamir, Adi(1991). "Differential Cryptanalysis of DES-like Cryptosystems". Journal of Cryptology Bruce Schneie, Applied Cryptography, 2nd edition, Wiley, 1996
[5]
A. Tsanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of parkinson’s disease progression by noninvasive speech tests,” Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884– 893, 2010.
[6]
G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of Medicine, vol. 63, pp. 479–492, 2012.
[7]
L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available: http://tinyurl.com/4atsdlj,” 2010.
[8]
A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. van Beijnum, and P. D. Stefanis, “End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust,” in PervasiveHealth, 2011, pp. 478–484.
[9]
M. Delgado, “The evolution of health care it: Are current u.s. privacy policies ready for the clouds?” in SERVICES, 2011, pp. 371–378.
[10]
N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009.
[11]
I. Neamatullah, M. Douglass, L. Lehman, A. Reisner, M. Villarroel, W. Long, P. Szolovits, G. Moody, R. Mark, and G. Clifford, “Automated de-identification of free-text medical records,” BMC medical informatics and decision making, vol. 8, no. 1, p. 32, 2008.
[12]
S. Al-Fedaghi and A. Al-Azmi, “Experimentation with personal identifiable information,” Intelligent Information Management, vol. 4, no. 4, pp. 123–133, 2012.
[13]
J. Domingo-Ferrer, “A three-dimensional conceptual framework for database privacy,” Secure Data Management, pp. 193 202, 2007.
[14]
AndrewSTenenbaum,“ComputerCommunicationNetworks”McGrawHill, Revised 4thedition, 2006
[15]
David Kahn,"The Codebreakers-The Story ofSecretWriting",1967
[16]
A. Farmer, O. Gibson, P. Hayton, K. Bryden, C. Dudley, A. Neil, and L. Tarassenko, “A real- time, mobile phone-based telemedicine system to support young adults with type 1 diabetes,” Informatics in primary care, vol. 13, no. 3, pp. 171–178, 2005.
[17]
M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A. Sadeghi, and T. Schneider, “Secure evaluation of private linear branching programs with medical applications,” Computer Security–ESORICS 2009, pp. 424–439, 2009.
[18]
A. C.-C. Yao, “How to generate and exchange secrets (extended abstract),” in FOCS. IEEE, 1986, pp. 162–167.
[19]
Cryptography and Network Security; Principles and Practices (5th Edition), William Stallings,
[20]
Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM
[21]
Biham, Eli and Shamir, Adi (1991). "Differential Cryptanalysis of DES-like Cryptosystems". Journal of Cryptology
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186