Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment

Mohan Nagamunthala, Ramakrishnan Manjula
{"title":"Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment","authors":"Mohan Nagamunthala, Ramakrishnan Manjula","doi":"10.4236/jcc.2023.1110009","DOIUrl":null,"url":null,"abstract":"In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"电脑和通信(英文)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4236/jcc.2023.1110009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method.
云环境下增强图像安全的混合三数据加密标准和河豚算法的实现
近年来,技术的进步为世界提供了云计算,它可以高效地传输、存储和处理视频、音频、图像和文本形式的巨大数据块。尽管整个信息技术界都在大肆宣传这个话题,但保护存储在云服务器上的敏感数据是关键问题之一。网络攻击的数量之大、技术之复杂表明,与云上其他形式的数据相比,私人图片需要格外小心。由于将私人图片存储在云中的用户无法控制数据的隐私保护,因此云供应商必须在身份验证和防止网络攻击方面确保更高级别的安全性。图像加密算法通过将图片转换为难以理解的形式来保护视觉数据,从而在可靠的不受限制的社交媒体上保护图片的机密性。本工作旨在开发一种通过加密算法增强云平台上用户照片安全性的方法。提出的混合技术提出了两个简单的步骤保护图像的想法。首先,我们通过提供明文和密钥作为输入,使用三重数据加密标准(TDES)生成芯片文本(即密钥)。然后,将从TDES中获得的密文交给Blowfish算法对用户图像进行加密。然后将加密的图像上传到云服务器的数据库,并且可以在用户请求时检索它。基于云存储时间、加密时间、解密时间和加密吞吐量等性能指标,对图像加密和解密过程进行分析和评估。与传统图像加密方法的比较研究将证明我们提出的方法的有效性和鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
784
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信