International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | FEB -2017
p-ISSN: 2395-0072
www.irjet.net
An Efficient Approach for Data Security in Cloud Environment using Watermarking Technique and RSA Digital Signatures Uma B1, Dr. Sumathi S2 1PG
Scholar, Dept. of Electronics and Communication Engineering, Adhiyamaan College of Engineering, Hosur, Tamilnadu, India. 2Professor, Dept. of Electronics and Communication Engineering, Adhiyamaan College of Engineering, Hosur, Tamilnadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Multimedia is the fast growing technology
Data security in mobile cloud environment has to ensure the secured and reliable multimedia data transmissions between mobile users and the mobile cloud. However, the mobile cloud is maintained by third parties such as mobile cloud service providers and we cannot be trust them at all time. We can have contracts between users and mobile cloud service providers in order to ensure data security. This arise some potential risks, such as security attacks or misconduct of the mobile cloud provider. But users can trust themselves rather than mobile cloud security providers. Our design is user-oriented, and allows users to protect their data’s security and privacy. The receiver should have the confidence that the public key belongs to the originator otherwise any substitution by a duplicate public key would enable a "man in the middle attack" to negotiate the data. One mechanism for stating the authority of the relationship among the originator and their public key depend on certificates. They are issued by trusted authorities who generate and digitally sign certificates requisite entities (such as people and organisations) to their public keys. Unfortunately, mechanisms enable us to trust the signature of the trusted authority on the certificate.
and almost all the mobile users need multimedia based applications. As mobile device have limited storage and simultaneously it cannot process other multimedia (video) application due to small RAM. Therefore we are using cloud for storing our information. But we cannot assure the security of our stored information in the cloud. The maintenance team of cloud environment may provide copyright protection but there is a chance of stealing/hacking our own confidential information by them. Robust reversible watermarking and RSA digital signature can solve this problem. These two techniques were used after the encryption algorithm and is used to protect the data in mobile cloud environment. It offers better security performance, increase the original information quality and confidentiality. Key Words: RSA signature, Robust reversible watermarking, data integrity and confidentiality.
1.INTRODUCTION 1.1 Mobile cloud environment “Mobile Cloud Computing is an infrastructure in which both the data storage and the data processing happen outside of the mobile device. The basic idea of Mobile Cloud Environment is Cloud Computing. Mobile Cloud Environment is the combination of Mobile Computing, Mobile Internet and Cloud Computing. By using this technology, resources can be shared and stored. The rapid development of multimedia applications such as electronic publishing, digitized images and videos etc., leads to the requirement of more storage in mobile phones. In order to avoid this problem, we use cloud for storing our information. Data (wireless multimedia applications) access over wireless networks are much faster. But we are not assured of data security. So the RSA digital signature and Robust Reversible Watermarking is used to solve the above mentioned problem.
© 2017, IRJET
|
Impact Factor value: 5.181
1.2 RSA algorithm RSA algorithm can be used to encrypt and decrypt the data being signed. RSA does not demand a particular hash function. So the protection of the signature and encryption are partly dependent on the choice of hash function used to compute the signature. It is an asymmetric cryptographic algorithm. RSA algorithm involves two keys: public key and private key. The public key is known to everyone, it is used to encrypt messages. Messages encrypted with a public key can be decrypted only with a private key. RSA algorithm can be used for key exchange, digital signatures, or encryption of small block data. This algorithm uses variable size encryption block and variable size key. RSA algorithm is widely used for establishing secure communications, authentication and the identity of service provider over insecure communication. In proposed scheme, RSA algorithm is used to find out the key pair for both mobile
|
ISO 9001:2008 Certified Journal
|
Page 1817