International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 4, April 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Increasing Data Secrecy In Cloud By Implementing Image Cryptography

[Full Text]



Prathamesh Vijay Lahande, Dr. Parag Ravikant Kaveri



ASCII; Cipher-Image; Cipher-Text; Cloud; Cryptography; Data Integrity; Decryption; Encryption; Pixel.



Cloud provides an easy platform for users for the purpose of accessing and storing data from anywhere using the internet. Hence in spite the data being private, sensitive as well as confidential, the user decides to reside the data using the cloud by trusting the cloud. But, the privacy of this data resting on the cloud often gets compromised due to various issues, leading towards the security breach of the cloud and affecting the integrity of the data. This research paper contributes a methodology of encryption and decryption for securing the data on cloud. Traditionally, encryption process generates a cipher-text from a private text using a key, but the methodology proposed generates a cipher image from private text. Using this proposed methodology, the user can store any kind of data on the cloud without worrying about its breach or its integrity being affected.



[1] Prerna, Parul Agrawal, “Cryptography Based Security for Cloud Computing System”, International Journal of Advanced Research in Computer Science, Volume 8, No. 5, May-June 2017, ISSN No. 0976-5697.
[2] Rachna Arora, Anshu Parashar, “Secure User Data in Cloud Computing Using Encryption Algorithms”, International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926, ISSN: 2248-9622.
[3] Arjun Kumar, Byung Gook Lee, HoonJae Lee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computing”.
[4] Gunavathy.S, Dr.Meena.C, “A survey: data security in cloud using cryptography and steganography”, International Research Journal of Engineering and Technology (IRJET), May 2019, e-ISSN: 2395-0056, p-ISSN: 2395-0072.
[5] May Hattim, “An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms”, March 2017.
[6] Harshad R. Pawar, Dr. Dinesh G. Harkut, “Classical and Quantum Cryptography for Image Encryption & Decryption”.
[7] Kim-Kwang Raymond Choo, Josep Domingo-Ferrer, Lei Zhang, “Cloud Cryptography: Theory, Practice and Future Research Directions”.
[8] Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit, “Cloud Security Issues”, 2009 IEEE International Conference on Services Computing.
[9] S.V.N.Srivalli, Ben SwarupMedikonda, “Development of a Cloud-based Secure Text File Application using Hybrid Cryptography and Steganography”, International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Volume-8, Issue-1, May 2019.
[10] Elizabeth Chang, “Disguising Text Cryptography using Image Cryptography”, January 2004.
[11] Shilpi Harnal, R.K. Chauhan, “Hybrid Cryptography based E2EE for Integrity & Confidentiality in Multimedia Cloud Computing”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-10, August 2019.
[12] Sandeep Bhowmik, Sriyankar Acharyya, “Image Cryptography: The Genetic Algorithm Approach”.
[13] Sara Tedmori, Nijad Al-Najdawi, “Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform”, International Arab Journal of Information Technology • September 2012.
[14] Zhan Qin, Jian Weng, Yong Cui, Kui Ren, “Privacy-preserving Image Processing in the Cloud”.
[15] Rongzhi Wang, “Research on data security technology based on cloud storage”.
[16] Punam V. Maitri, Aruna Verma, “Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm”, IEEE WiSPNET 2016 conference.
[17] K. Brindha, N. Jeyanthi, “Secured Document Sharing Using Visual Cryptography in Cloud Data Storage”, ISSN: 1311-9702, 2015.
[18] Brindha Krishnamurthy, Jeyanthi Nagamalai, “Securing Cloud Data using Visual Cryptography”, February 2015.
[19] Bernd GroBauer, ToBias Walloschek, and elmar sTöcker, “Understanding Cloud Computing Vulnerabilities”.
[20] Eng. Hashem H. Ramadan, Moussa Adamou Djamilou, “Using Cryptography Algorithms to Secure Cloud Computing Data and Services”, American Journal of Engineering Research (AJER), 13th October 2017, e-ISSN: 2320-0847 p-ISSN: 2320-0936 Volume-6, Issue-10, pp-334-337.
[21] Manish M. Potey, C A Dhote, Deepak H. Sharma, “Cloud Computing – Understanding Risk, Threats, Vulnerability and Controls: A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 67– No.3, April 2013
[22] https://en.wikipedia.org/wiki/Image
[23] Keijo Ruohonen, “Mathematical Cryptology”, 2014.