Privacy-Preserving Image Protection in Cloud Computing Using Intelligent Encryption

Cloud computing have increased computing capabilities and open new horizons for computer science and communication but brought along challenges such as data protection, cloud computing uses information being sent over the cloud needs to be secured from potential malicious users and hackers who inten...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0 S. 1 - 5
Hauptverfasser: Mohamoud, Asad Hassan, Gupta, Ganesh, Kumar, Anuj
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 05.06.2024
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Cloud computing have increased computing capabilities and open new horizons for computer science and communication but brought along challenges such as data protection, cloud computing uses information being sent over the cloud needs to be secured from potential malicious users and hackers who intend to steal personal or private information and can use this in Inappropriate manner, This research paper addresses the critical issue of image privacy in cloud computing environments and proposes a novel approach for privacy-preserving image protection through the integration of intelligent encryption techniques. The primary focus of this research is to safeguard sensitive visual information stored and processed in cloud environments, where traditional encryption methods may fall short in preserving both confidentiality and utility. The proposed solution leverages intelligent encryption algorithms that adapt to the content of the images, ensuring robust protection while maintaining the functionality required for efficient cloudbased image processing. The findings of this research contribute to the ongoing discourse on privacy-preserving techniques in cloud computing and offer a promising avenue for the development of secure and efficient image protection mechanisms.
AbstractList Cloud computing have increased computing capabilities and open new horizons for computer science and communication but brought along challenges such as data protection, cloud computing uses information being sent over the cloud needs to be secured from potential malicious users and hackers who intend to steal personal or private information and can use this in Inappropriate manner, This research paper addresses the critical issue of image privacy in cloud computing environments and proposes a novel approach for privacy-preserving image protection through the integration of intelligent encryption techniques. The primary focus of this research is to safeguard sensitive visual information stored and processed in cloud environments, where traditional encryption methods may fall short in preserving both confidentiality and utility. The proposed solution leverages intelligent encryption algorithms that adapt to the content of the images, ensuring robust protection while maintaining the functionality required for efficient cloudbased image processing. The findings of this research contribute to the ongoing discourse on privacy-preserving techniques in cloud computing and offer a promising avenue for the development of secure and efficient image protection mechanisms.
Author Gupta, Ganesh
Mohamoud, Asad Hassan
Kumar, Anuj
Author_xml – sequence: 1
  givenname: Asad Hassan
  surname: Mohamoud
  fullname: Mohamoud, Asad Hassan
  email: 2022802959.asad@pg.sharda.ac.in
  organization: Sharda University,Computer Science and Engineering,Delhi,India
– sequence: 2
  givenname: Ganesh
  surname: Gupta
  fullname: Gupta, Ganesh
  email: ganeshgupta81@gmail.com
  organization: Sharda University,Computer Science and Engineering,Delhi,Pubjab
– sequence: 3
  givenname: Anuj
  surname: Kumar
  fullname: Kumar, Anuj
  email: anuj.kumar15@sharda.ac.in
  organization: Sharda University,Computer Science and Engineering,Delhi,Pubjab
BookMark eNo1j8tqhDAYhVNoF-103qCLvIA2F81lWWTaDgxVqF0PMfMrAY0SMwO-fZ1eVmfxfRzOeUC3fvSAEKYkpZTo57Iuyg9BOMtTRliWUiKUYiq7QVstteI54ZJLxe_RZxXcxdglqQLMEC7Od3g_mA5wFcYINrrRY-dx0Y_nEy7GYTrHq_M1_5g-Qt-7DnzEO2_DMl39R3TXmn6G7V9uUP26q4v35FC-7YuXQ-I0jYlhbSOlMSzXxhChVWabdaa11DKwlK_4JKxo1qX5lWfWNsCzRraSGyEt36Cn31oHAMcpuMGE5fh_lX8Do65QaA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/OTCON60325.2024.10688284
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL) (UW System Shared)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350373783
EndPage 5
ExternalDocumentID 10688284
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i91t-a2fb77aa259aa06984cb068cc1c2ec132fbd6c6b3735a0694ccbe34b7f73a67c3
IEDL.DBID RIE
IngestDate Wed Oct 09 06:12:58 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-a2fb77aa259aa06984cb068cc1c2ec132fbd6c6b3735a0694ccbe34b7f73a67c3
PageCount 5
ParticipantIDs ieee_primary_10688284
PublicationCentury 2000
PublicationDate 2024-June-5
PublicationDateYYYYMMDD 2024-06-05
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-June-5
  day: 05
PublicationDecade 2020
PublicationTitle 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0
PublicationTitleAbbrev OTCON
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8721237
Snippet Cloud computing have increased computing capabilities and open new horizons for computer science and communication but brought along challenges such as data...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Adaptable Algorithm
Cloud computing
Communication
confidentiality
cryptography
Cyber protection
Data Protection
dynamic cloud environments
Dynamics
Encryption Algorithm
Feistel-based symmetric encryption algorithm
Fiestal structure
Force
Heuristic algorithms
Image processing
Image Protection
Intelligent Encryption
privacy enhancement
robust image protection mechanisms
robust security
Secure Force (SF) Encryption
security
Technological innovation
Visualization
Title Privacy-Preserving Image Protection in Cloud Computing Using Intelligent Encryption
URI https://ieeexplore.ieee.org/document/10688284
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA62ePCkYsU3OXjdutlkk91zqdhLW7CH3koyycqCprJuC_33TtKHePDgLSQDCRPmlXwzQ8ijzosSBOcJcIYBCgiVaBQ6VIborVv0SLKyis0m1HhczOfldJesHnNhnHMRfOb6YRj_8u0SVuGpDCVcokNYiA7pKCW3yVp7dE5aPk1mg8lYpjzLMe7LRH9P_qtxSrQbz6f_3PGM9H4y8Oj0YFvOyZHzF-R12tRrDZsk4CaCjPs3OvpAhRBI24ip8rT2dPC-XFm67dcQaCIsgI4OxTdbOvTQbKKy6JHZ83A2eEl2TRGSumRtorPKKKU1Ri1ap7IsBBg8IwCDzAGGlpWxEqThiudhXQAYx4VRleJaKuCXpOuX3l0h2wwoLaVlaapFhW4Ns6IAo_JK2hwYuya9wJDF57bsxWLPi5s_5m_JSWB7xFHld6TbNit3T45h3dZfzUO8rG9oSpgi
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwMhECZaTfSkxhrfcvC6dVlY2D03bdpYt03cQ28NDKzZRLdm3Tbpvxfow3jw4I3wCGTIDDPwDR9CjzJOUmCUBkCJDVCAiUBapbPG0Hrr2nokUVp4sgmRZcl0mk42yeo-F8YY48FnpuOK_i1fz2HhrsqshnPrECZsHx046qxNutYWnxOmT-O8O854SKPYRn4R62wH_KJO8SdH_-Sfc56i9k8OHp7sTpcztGeqc_Q6qculhFXgkBNOy6s3PPywJsF1bTyqqsJlhbvv84XGa8YG18cDA_Bw9_1mg3sV1CtvLtoo7_fy7iDY0CIEZUqaQEaFEkJKG7dIGfI0YaDsGgEIRAZscFkozYErKmjs2hmAMpQpUQgquQB6gVrVvDKXVmwKhORckzCUrLCODdEsASXigusYCLlCbSeQ2ef644vZVhbXf9Q_oKNB_jKajYbZ8w06dlvgUVXxLWo19cLcoUNYNuVXfe837huCbJtr
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+OPJU+International+Technology+Conference+%28OTCON%29+on+Smart+Computing+for+Innovation+and+Advancement+in+Industry+4.0&rft.atitle=Privacy-Preserving+Image+Protection+in+Cloud+Computing+Using+Intelligent+Encryption&rft.au=Mohamoud%2C+Asad+Hassan&rft.au=Gupta%2C+Ganesh&rft.au=Kumar%2C+Anuj&rft.date=2024-06-05&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FOTCON60325.2024.10688284&rft.externalDocID=10688284