IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 10, October 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



An Enhanced Data Integrity Model In Mobile Cloud Environment Using Digital Signature Algorithm And Robust Reversible Watermarking

[Full Text]

 

AUTHOR(S)

Boukari Souley, Ismail Abdulkarim Adamu

 

KEYWORDS

Cloud computing, mobile computing, Digital signature and Digital Watermarking

 

ABSTRACT

the increase use of hand held devices such as smart phones to access multimedia content in the cloud is increasing with rise and growth in information technology. Mobile cloud computing is increasingly used today because it allows users to have access to variety of resources in the cloud such as image, video, audio and software applications with minimal usage of their inbuilt resources such as storage memory by using the one available in the cloud. The major challenge faced with mobile cloud computing is security. Watermarking and digital signature are some techniques used to provide security and authentication on user data in the cloud. Watermarking is a technique used to embed digital data within a multimedia content such as image, video or audio in order to prevent authorized access to those content by intruders whereas, digital signature is used to identify and verify user data when accessed. In this work, we implemented digital signature and robust reversible image watermarking in order enhance mobile cloud computing security and integrity of data by providing double authentication techniques. The results obtained show the effectiveness of combining the two techniques, robust reversible watermarking and digital signature by providing strong authentication to ensures data integrity and extract the original content watermarked without changes.

 

REFERENCES

[1] Anuradha, A., & Pandit, H. .. (2017). Biometric Based Security Model for Cloud Computing Using Image Steganography. International Journal of Advanced Research in Computer Science and Software Engineering, 7(1), 42-51.

[2] Apau, R., & Adomako, C. (2017). Design of Image Steganography based on RSA Algorithm and LSB Insertion for Android Smartphones. International Journal of Computer Applications, 164(1), 13-22.

[3] Bhosale, P., Deshmukh, P., Dimbar, G., & Deshpande, A. (2012). Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption. International Journal of Engineering Research & Technology, 1(8), 1-8.

[4] Chintawar, N. N., Gajare, J. S., Fatak, V. S., Shinde, S. S., & Virkar, G. (2016). Enhancing Cloud Data Security Using Elliptical Curve Cryptography. International Journal of Advanced Research in Computer and Communication Engineering, 5(3), 94-97.

[5] Dhamija, A., & Dhaka, V. (2015). A Novel Cryptographic and Steganographic Approach for Secure Cloud Data Migration. International Conference on Green Computing and Internet of Things (pp. 346-351). IEEE.

[6] Guru, J., & Damecha, H. (2014). A Review of Watermarking Algorithms for Digital Image. International Journal of Innovative Research in Computer and Communication Engineering, 2(9), 5071-5078.

[7] Hadole, P. .., Rohankar, J., Priyanka, & Katara, A. (2014). Development of Secure Mobile Cloud Computing Using Improved Identity Management Protocol. International Journal on Recent and Innovation Trends in Computing and Communication, 2(3), 645-650.

[8] Honggang, W., Wu, S. W., Chen, M., & Wang, W. W. (2014). Security Protection between Users and the Mobile Media Cloud. IEEE Communication Magazine, 52(3), 73-79.

[9] Kanthale, A., & Potdar, .. P. (2016). Survey on Cloud Computing Security Algorithms. International Journal of Science and Research, 5(4), 1865-1867.

[10] Kaur, M., Baghla, S., & Kumar, S. (2015). A Review on Watermarking of Digital Images. International Journal of Advances in Science Engineering and Technology, 3(3), 149-153.

[11] Monisha, M., & Chidambaram, S. (2017). Enhanced Data Security using RSA Digital Signature with Robust Reversible Watermarking Algorithm in Cloud Environment. Internation al Journal of Electroni cs & Co mmuni cation Techno logy, 8(1), 20-24.

[12] Neha, M. K. (2016). Enhanced Security using Hybrid Encryption Algorithm. International Journal of Innovative Research in Computer and Communication Engineering, 4(7), 13001-13007.

[13] Reza, H., & Sonawane, M. (2016). Enhancing Mobile Cloud Computing Security Using Steganography. Journal of Information Security, 245-259.

[14] Sagg, K., & Bhatia, S. .. (2015). A Review on Mobile Cloud Computing: Issues, Challenges and Solutions. International Journal of Advanced Research in Computer and Communication Engineering, 4(6), 29-34.

[15] Shamim, S. M., Sarker, A., & Bahar, A. N. (2015). A Review on Mobile Cloud Computing. International Journal of Computer Applications, 113(16), 4-9.

[16] Shiny, R., Shaji, R., & Jayan, J. (2015). Signature Based Data Auditing Under Mobile Cloud System. Proceedings of 2015 Global Conference on Communication Technologies (pp. 565-570). IEE.

[17] Singh, P., & Chadha, R. S. (2013). A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology, 2(9), 165-175.

[18] Song, C., Sudirman, S., & Merabti, M. (2009). Recent Advances and Classification of Watermarking Techniques in Digital Images. Proceedings of the 10th of Post Graduate Network Symposium, (pp. 283288).

[19] Suganya, V., & Shanthi, A. L. (2015). Mobile Cloud Computing Perspectives and Challenges. International Journal of Innovative Research in Advanced Engineering, 7(2), 71-76.

[20] Tawalbeh, L., Darwazeh, S. N., Al-Qassas, S., & AlDosari, F. (2015). A Secure Cloud Computing Model based on Data Classification. First International Workshop on Mobile Cloud Computing Systems, Management, and Security (pp. 1153-1158). Elsevier B.V.

[21] Thomas, S. (2008, January 02). Paradigm . Retrieved September 05, 2017, from Workbook on Digital Private Papers : http://www.paradigm.ac.uk

[22] Uma, B., & Sumathi, S. (2017). An Efficient Approach for Data Security in Cloud Environment using Watermarking Technique and RSA Digital Signatures. International Research Journal of Engineering and Technology, 4(2), 1817-1821.

[23] Varsha, & rRajender, C. S. (2015). Data, Hiding Using Steganography and Cryptography. International Journal of Computer Science and Mobile Computing, 4(4), 802-805.

[24] Yadav, S. D., & Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework. International Research Journal of Engineering and Technology, 3(11), 1115-1118.