International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7031
Multimedia Content Security with Random Key
Generation Approach in Cloud Computing
Chandan Thakur
1
, Rashmita Pandey
2
, Nusrat Parveen
3
1,2
Student, Computer Department, Datta Meghe College of Engineering, Maharashtra, India
3
Professor, Computer Department, Datta Meghe College of Engineering, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The cloud computing offers high scalability,
confidentiality and easy accessibility of information over the
internet. Though the conventional encryption system
provides security, the most concerned issue is the regular
side channel attack for capturing ones sensitive and
confidential image, audio and video. A malicious Virtual
Machine (VM) beside targeted VM can extract all
information. Thus, this paper implements double stage
encryption algorithm for multimedia content security using
random key generation. The first stage encrypts multimedia
content into ciphertext-1 using a symmetric public key. The
ciphertext-1 is again encrypted in the cloud using a
randomly generated symmetric private key. If anyone gets
the cipher text, he could not extract the encryption key to
recover multimedia contents. Low complexity and easy
implementations make the proposed algorithm widely
applicable safeguard in cloud computing.
Keyword: Cipher text, Encryption, Multimedia, Virtual
Machine, random Key generation
1.INTRODUCTION
1.1 Cloud Computing:
Cloud computing is freedom of processing and storing data
of consumers in the third-party data center using remote
computing resources over the Internet. The cloud is the
combination of three services. The goal of cloud computing
is to allow users to take benefit from all these technologies,
without the need for deep knowledge. The cloud
computing aims to cut costs, and helps the users to focus
on their core business instead of being impeded by IT
obstacles. Cloud computing and storage solutions provides
services to users and enterprises with various capabilities
to store and process their data in third party data centers
that may be located far from user-ranging in distance from
across a city to across the world. A third party manages the
data and multimedia contents and has the liabilities to
make certain security for the protection of data and
multimedia contents and provide uninterrupted services.
Unless there may be arise in security question and
trustworthiness of third party.Beside the third party
deliberately or inadvertently discloses the data.
1.2 Security issues in Cloud:
While it is generally agreed that encryption is necessary to
protect data security, working with encrypted data proves
to be challenging in cloud. The problem of using public
cloud is the cloud owner can’t be trusted with the data. to
be challenging in cloud. The problem of using public cloud
is the cloud owner can’t be trusted with the data. Hence a
solution is required to safeguard the data. A solution would
be to download and decrypt all the documents to extract
the relevant information.
1.2.1 Data Integrity:
A secured system ensures that the data it contains is valid.
Data integrity implies that knowledge is protected against
deletion and corruption each once it's among the
information, and whereas it's being transmitted over the
network.
1.2.2 Data Confidentiality:
A secure system ensures the confidentiality of data. This
means that it allows users to see only those data which
they are supposed to see. Whenever possible, confidential
data should be encrypted and decrypted during on-
premises or end-point processing before it is transferred to
the cloud. The key concern is protecting data
confidentiality in end-to-end fashion.
1.2.3 Access Control:
Access control states that information shared over cloud
must be accessible to authorized users. Access should be
given to only those users who have authority to gain the
access to the shared data.
1.2.4 Data Manipulation:
It is an effort to make data more easier to read or to be
more organized.
2. LITERATURE SURVEY
In cloud computing, since it is a new area, the
developers are concentrating more on computation speed
and storage issue. Users are going for unreliable networks