Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication and confidentiality issues. A methodology has been proposed for user authentication to make cloud server, dynamic in nature, based on the time stamp and other parameters. The confidential data are embedded randomly in images using steganography as a basic technique, in which a new method of encryption and decryption is proposed. The methodology of encryption or decryption uses odd Fibonacci series values and a hash function to prepare hash value series. This hash value series is multiplied with ASCII codes of the original data which need to embed, in decryption process and similar technique have been used here, rather than the technique of multiplying ASCII codes with hash value using division operation.
Published in |
American Journal of Applied Mathematics (Volume 3, Issue 1-2)
This article belongs to the Special Issue Frontiers in Mathematics and Computing |
DOI | 10.11648/j.ajam.s.2015030102.11 |
Page(s) | 1-8 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2014. Published by Science Publishing Group |
Privacy, Cloud computing, Steganography, Encryption, Decryption, Hash Function
[1] | P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765 |
[2] | CryptographyandNetworkSecurity; Principles and Practices (5thEdition), William Stallings, |
[3] | Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM |
[4] | Biham, Eliand Shamir, Adi(1991). "Differential Cryptanalysis of DES-like Cryptosystems". Journal of Cryptology Bruce Schneie, Applied Cryptography, 2nd edition, Wiley, 1996 |
[5] | A. Tsanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of parkinson’s disease progression by noninvasive speech tests,” Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884– 893, 2010. |
[6] | G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of Medicine, vol. 63, pp. 479–492, 2012. |
[7] | L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available: http://tinyurl.com/4atsdlj,” 2010. |
[8] | A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. van Beijnum, and P. D. Stefanis, “End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust,” in PervasiveHealth, 2011, pp. 478–484. |
[9] | M. Delgado, “The evolution of health care it: Are current u.s. privacy policies ready for the clouds?” in SERVICES, 2011, pp. 371–378. |
[10] | N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009. |
[11] | I. Neamatullah, M. Douglass, L. Lehman, A. Reisner, M. Villarroel, W. Long, P. Szolovits, G. Moody, R. Mark, and G. Clifford, “Automated de-identification of free-text medical records,” BMC medical informatics and decision making, vol. 8, no. 1, p. 32, 2008. |
[12] | S. Al-Fedaghi and A. Al-Azmi, “Experimentation with personal identifiable information,” Intelligent Information Management, vol. 4, no. 4, pp. 123–133, 2012. |
[13] | J. Domingo-Ferrer, “A three-dimensional conceptual framework for database privacy,” Secure Data Management, pp. 193 202, 2007. |
[14] | AndrewSTenenbaum,“ComputerCommunicationNetworks”McGrawHill, Revised 4thedition, 2006 |
[15] | David Kahn,"The Codebreakers-The Story ofSecretWriting",1967 |
[16] | A. Farmer, O. Gibson, P. Hayton, K. Bryden, C. Dudley, A. Neil, and L. Tarassenko, “A real- time, mobile phone-based telemedicine system to support young adults with type 1 diabetes,” Informatics in primary care, vol. 13, no. 3, pp. 171–178, 2005. |
[17] | M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A. Sadeghi, and T. Schneider, “Secure evaluation of private linear branching programs with medical applications,” Computer Security–ESORICS 2009, pp. 424–439, 2009. |
[18] | A. C.-C. Yao, “How to generate and exchange secrets (extended abstract),” in FOCS. IEEE, 1986, pp. 162–167. |
[19] | Cryptography and Network Security; Principles and Practices (5th Edition), William Stallings, |
[20] | Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM |
[21] | Biham, Eli and Shamir, Adi (1991). "Differential Cryptanalysis of DES-like Cryptosystems". Journal of Cryptology |
APA Style
Bidisha Goswami, Ravichandra G. (2014). Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function. American Journal of Applied Mathematics, 3(1-2), 1-8. https://doi.org/10.11648/j.ajam.s.2015030102.11
ACS Style
Bidisha Goswami; Ravichandra G. Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function. Am. J. Appl. Math. 2014, 3(1-2), 1-8. doi: 10.11648/j.ajam.s.2015030102.11
@article{10.11648/j.ajam.s.2015030102.11, author = {Bidisha Goswami and Ravichandra G.}, title = {Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function}, journal = {American Journal of Applied Mathematics}, volume = {3}, number = {1-2}, pages = {1-8}, doi = {10.11648/j.ajam.s.2015030102.11}, url = {https://doi.org/10.11648/j.ajam.s.2015030102.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajam.s.2015030102.11}, abstract = {Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication and confidentiality issues. A methodology has been proposed for user authentication to make cloud server, dynamic in nature, based on the time stamp and other parameters. The confidential data are embedded randomly in images using steganography as a basic technique, in which a new method of encryption and decryption is proposed. The methodology of encryption or decryption uses odd Fibonacci series values and a hash function to prepare hash value series. This hash value series is multiplied with ASCII codes of the original data which need to embed, in decryption process and similar technique have been used here, rather than the technique of multiplying ASCII codes with hash value using division operation.}, year = {2014} }
TY - JOUR T1 - Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function AU - Bidisha Goswami AU - Ravichandra G. Y1 - 2014/12/27 PY - 2014 N1 - https://doi.org/10.11648/j.ajam.s.2015030102.11 DO - 10.11648/j.ajam.s.2015030102.11 T2 - American Journal of Applied Mathematics JF - American Journal of Applied Mathematics JO - American Journal of Applied Mathematics SP - 1 EP - 8 PB - Science Publishing Group SN - 2330-006X UR - https://doi.org/10.11648/j.ajam.s.2015030102.11 AB - Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication and confidentiality issues. A methodology has been proposed for user authentication to make cloud server, dynamic in nature, based on the time stamp and other parameters. The confidential data are embedded randomly in images using steganography as a basic technique, in which a new method of encryption and decryption is proposed. The methodology of encryption or decryption uses odd Fibonacci series values and a hash function to prepare hash value series. This hash value series is multiplied with ASCII codes of the original data which need to embed, in decryption process and similar technique have been used here, rather than the technique of multiplying ASCII codes with hash value using division operation. VL - 3 IS - 1-2 ER -