• Tidak ada hasil yang ditemukan

View of SECURITY IMPROVEMENT OF CLOUD DATA IMAGES USING AES CRYPTOGRAPHY PHASE

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of SECURITY IMPROVEMENT OF CLOUD DATA IMAGES USING AES CRYPTOGRAPHY PHASE"

Copied!
5
0
0

Teks penuh

(1)

Vol. 05, Issue 08,August 2020 Available Online: www.ajeee.co.in/index.php/AJEEE SECURITY IMPROVEMENT OF CLOUD DATA IMAGES USING AES CRYPTOGRAPHY

PHASE

Mr. Avinash Panthi1, Prof. Abhishek Mathur2

1M.tech. Scholar, Computer Science Engineering, SATI Vidisha,

2Assistant Professor, Computer Science Engg. Department, Sati Vidisha,

Abstract:- In the data encryption, it is implemented as hybrid encryption using the symmetric AES encryption algorithm and the asymmetrical RSA encryption algorithm. Next, the encrypted data is hidden in an image using the LSB algorithm. One of the major advances in information technology is cloud computing, but the security issue of data storage is a major problem in the cloud environment. For this reason, this document proposes a system for improving the security of cloud data using encryption, information concealment and hashing functions. In the data validation phase, we use the SHA hashing algorithm. In our proposal, we compress the data using the LZW algorithm before we hide it in the image. This way, as much data as possible can be hidden. By using information concealment technology and mixed encryption, we can achieve a high level of data security.

In addition to the graph, this article calculated PSNR and SSIM values to evaluate image masking performance before and after applying the compression process. The results showed that the PSNR values of the Stego image are better for compressed data than for data before compression.

Keywords: cloud storage, symmetric cryptography, asymmetric cryptography, LZW algorithm, steganography.

1. INTRODUCTION

Through its services in most organizations, government departments, banks, etc. in recent years, information technology has undergone a major revolution that mainly affects the cloud Computing is attributed to [1]. Cloud computing is categorized according to the services it provides on three levels:

infrastructure as a service (IaaS), software as a service (SaaS) and platform as a service (PaaS) [2]. IaaS provides users with virtual machines and storage so that they can build their infrastructure on them. SaaS also provides platforms for developing cloud-hosted applications for users to use to build, develop, test, and manage their applications. In contrast, PaaS offers users services and applications anytime, anywhere via a web browser. Despite the many benefits that cloud computing offers, storing, retrieving and transferring data through the cloud is quick and easy. Therefore, the problem of data security is a major challenge, since data is stored with third parties and the greatest threat is when users save their data in a clear form [3].

Typically, two techniques are used to protect sensitive data: cryptography and steganography. Cryptography is defined as the conversion of data into illegible codes [4]. The encryption algorithm normally uses a certain parameter or key for the data conversion

procedure. Some encryption algorithms require an encryption and decryption key called symmetric encryption. However, other encryption algorithms require two keys: for encryption, they require a public key and a private key for decryption.

Decryption is often categorized alongside encryption - decryption is based on the encrypted data from the original data.

Steganography is another technique for protecting data by hiding confidential data in a cover object such as images, speech and text [5]. The strength of the steganography system depends on the ability to integrate and obscure data in the cover object.

As a result, the confidential information is not recognized or accessed by the unauthorized user. Due to the properties of a higher redundancy of digital files, digital files such as images and sound are more suitable as cover objects in steganography [6]. This gives you an effective way to hide data. This article suggests a new way to protect the data stored in the cloud by combining the techniques of cryptography and steganography. This proposed method hybrid encrypts secret data using the symmetric encryption algorithm AES256 and the asymmetric encryption algorithm RSA. Then the encrypted data is compressed and sent to the LSB algorithm to be hidden. Hash functions

(2)

Vol. 05, Issue 08,August 2020 Available Online: www.ajeee.co.in/index.php/AJEEE are used without a third party having to

quickly confirm the impartiality of the data after it has been called up [7]. The performance of a steganography technique is evaluated and compared on the basis of a few criteria in order to check the quality of the stego image (formatting quotation). This article uses PSNR and SSIM in addition to the histogram. This paper is divided as follows: Section II highlights the relevant work. Section III deals with the proposed work; Section IV discusses the results of the work. Finally, Section V contains the conclusions of this study.

2. RELATED WORKS

Many techniques have been proposed and implemented to protect the data stored in the cloud environment. The authors in [9]

proposed a method for the steganography technique that consisted of two steps. The first step is the preprocessing algorithm that reduces the size of the secret images.

In the second step, they used an algorithm as an embedding mechanism based on the Fibonacci representation of the pixel intensity. Their results demonstrated the effectiveness of their method against the RS and Steganalyser WS attacks. However, the proposed method did not achieve the confidentiality of confidential data by using encryption methods. In [10], the authors proposed a hybrid model of data that is securely stored in the cloud and based on encryption and steganography. When confidential data is encrypted using the AES algorithm and then the encrypted information is hidden using LSB before being uploaded to the cloud. In [11] the authors used the Blowfish encryption algorithm and Least Significant Bits (E- LSB) for steganography.

They also used the SHA-256 hash algorithm to check integrity and improve the security of cloud storage. Their results showed that a good PSNR value was obtained to hide 1 KB of data as an image. In [12] an algorithm for generating random keys using a secret public / private key pair was proposed. The process was carried out when the data was encrypted by its owner using a festive network together with the public key.

Then the data was embedded in an image and uploaded to the cloud. In [13], the researchers proposed a system that

cryptography in order to increase the confidentiality of data. The Quantum One Time Pad algorithm was then used for encryption data to hide secret data in a cover picture before it was sent over a quantum channel. The results showed the efficiency and effectiveness of the proposed system by calculating the PSNR values and displaying the histogram analysis. While the authors in [14] used the AES encryption algorithm to encrypt their image and then indexed it into the title image via the steganography.

They proposed integrating a discrete wavelet transform (DWT) and a singular value decomposition (SVD) to obtain the Stego image. In the last phase, a Stego image was uploaded for storage in the cloud. In [15] the authors proposed to encrypt data in the cloud with the AES algorithm with a secret key. The secret encryption key then uses the ECC algorithm and indexes the user's image.

This solves the key management problem.

It has been proposed to use an IDEA algorithm and an LSBG (Least Significant Bit Grouping) algorithm to include and extract the secret information in the title image [16]. This approach shows a breakthrough in reducing data security problems. In [16], a system for improving the security of data storage in the cloud is implemented using a random edge-based image stepping technique. To increase security, divide the original image into several parts. Edge-based algorithms are applied and random pixels (pixels based on prime numbers) of each segment are selected and data is entered into them.

Most authors have not considered ways to reduce the size of sensitive data before embedding it in the title image, and thus affect the image resolution standards when large data is embedded.

3. SYSTEM

This section presents the design of a new system for the complete security of sensitive data in the public cloud model.

The public cloud was chosen as an example of cloud types. This is because it is available to anyone who wants to use it.

This means that the proposed system works with hybrid, private or community cloud deployment models. The following processes are included:

Encryption: The secret data upload to the cloud is encrypted

(3)

Vol. 05, Issue 08,August 2020 Available Online: www.ajeee.co.in/index.php/AJEEE

Compression: Encrypted data is compressed to reduce its size and hide more data using steganography techniques. In this work, the Lempel-Ziv-Welch compression algorithm was used, which was found to be effective in reducing data size and speed, as shown in the results in the next section.

Embed: This hides data that has been compressed into a title image using the Least Significant Bit (LSB) embedding algorithm, which creates a Stego image as output.

In this work, hybrid encryption consists of the algorithms AES-256 and RSA, whereby both RSA and AES are effective algorithms that are used in the cloud environment [17]. Hybrid

encryption depends on the division of secret data into odd and evendata based on the position in the data array. Odd data is encrypted using the AES algorithm with 256 key sizes, which are generated by a random number generator (RNG).

The RNG generates a sequence of numbers that cannot be correctly predicted and that have been shown to be randomized by NIST randomness tests [18]. While data is being encrypted using the RSA algorithm. Where the AES key distribution used for encryption is carried out securely. a. The key is generated by random number generators (RNGs), which are available in many computer software libraries. b. It is encrypted using the RSA algorithm and the public key. c. Finally, the key is sent securely to the second party.

Fig. 1. Embedding secret data in the RGB 3.1 Hybrid AES256 decryption

Input image algorithm RSA and:

Full_Encryption_array, Encryption_key Output: PlainText start:

1. Divide Full_Encryption_array into two parts based on the position in array (Odd_array, Even_array) 2. key = pu_key, private key =

pr_key)

3. key= RSA (encryption_key, pr_key) 4. Decryption_Odd= Decrypt_AES256

(Odd_array, key)

5. Decryption_Even = RSA (Even_array, pr_key)

6. Full_Decryption_array by integrating Decryption_Odd and Decryption_Decration

7. Development the PlainText format 8. Return the PlainTextend criterion

In general, the amount of data that can be hidden in the title picture is a critical evaluation. Using the proposed system, the data size can be minimized using the data compression algorithm.

This increases the size of the data that can be hidden in a cover picture.

To evaluate the performance of the proposed system, several RGB images are used as cover images and a message with a different number of characters is hidden in each cover image. The evaluation is then carried out by calculating the signal- to-noise ratio (PSNR) as a parameter.

This shows the difficulty of the difference between the cover picture and stego picture. In other words, the higher the PSNR, the more difficult it is for visual attackers to recognize the Stego image.

The second measurement to measure the Stego image quality is SSIM. The result shows a similarity between the title image and the Stego image, with the SSIM value closer to 1 (SSIM for all images tested is 0.999), which means that the Stego image is of excellent quality.

Figure 2 shows the cover image histogram and the Stego image. The results show that the histogram is similar when viewed with the naked eye. As a result, the degree of distortion of the stego image is very low.

(4)

Vol. 05, Issue 08,August 2020 Available Online: www.ajeee.co.in/index.php/AJEEE

Fig. 2. Histogram of the Stego Image 5. CONCLUSIONS

In this study, two of the security techniques were successfully combined:

cryptography and steganography to ensure double security for stored data in the cloud environment. We introduced hybrid encryption that uses the AES symmetric algorithm in combination with the RSA asymmetric algorithm to secure data stored in the cloud. The results of the encryption of secret data are then

compression data using the LSB algorithm. In this proposal, the amount of data hidden in the image increases, while the distortion of the image is reduced compared to the results of data obfuscation without compression using the LSB algorithm.

This system is more powerful and efficient for backing up data in the cloud environment. It is also more powerful to check the integrity of data after it is Coverage with picture PSNR (dB)

compression without compression

Lena.png 69.769 71.580

Baboon.png 69.890 71.750

Peppers.png 70.057 72.211

Cat.png 71.249 73.476

Average PSNR 70.241 72.254

(5)

Vol. 05, Issue 08,August 2020 Available Online: www.ajeee.co.in/index.php/AJEEE be said in this paper that security goals

have been achieved. The experimental results showed that the Stego image quality after hiding 1 KB of data with the average PSNR value of 72.254 for all images tested.

REFERENCES

1. SE Elgazzar, AA Saleh and HM El-Bakry,

“Overview of Using the Private Cloud Model with GIS”, Int. J. Electron. Inf. Eng., Vol. 7, no. 2, pp. 68-78, 2017.

2. EF Coutinho, FR de Carvalho Sousa, PAL Rego, GD Gomes andJN de Souza,

"Elasticity in Cloud Computing: A Survey", Ann. Telecommunications. des telecommunications, vol. 70, no. 7–8, pp.

289-309, 2015.

3. SC Sukumaran and M. Misbahuddin, “DNA cryptography for secure data storage in the cloud”, IJ Netw. Secur., Vol. 20, no. 3, pp.

447-454, 2018.Security

4. S. William, Computer: Principles and Practice. Pearson Education India, 2008.

5. L.-C. Huang, L.-Y. Tseng and M.-S. Hwang,

"A reversible method of hiding data by histogram shifting in high quality medical images," J. Syst. Softw., Vol. 86, no. 3, pp.

716-727, 2013.

6. R. Shanthakumari and S. Malliga, "Two- layer security of image steganography based on the IDEA and LSBG algorithm in the cloud environment", Sadhana, vol. 44, no. 5, p. 119, 2019.

7. Y. Zhang, C. Xu, H. Li and X. Liang,

"Cryptographic Public Verification of Data Integrity for Cloud Storage Systems", IEEE Cloud Computing., Vol. 3, no. 5, pp. 44-52, 2016.

8. AA Abdulla, "Using Similarities between Secret Images and Cover Images for Improved Embedding Efficiency and Security in Digital Steganography."

University of Buckingham, 2015.

9. AA Abdulla, H Sellahewa and SA Jassim,

“Stego quality improvement by reducing message size and Fibonacci bit-level mapping,” in the International Conference on Security Standardization Research, 2014, pp. 151–166.

10. N. Garg and K. Kaur, "Hybrid Information Security Model for Cloud Storage Systems Using a Hybrid Data Security Scheme", Int.

Res. J. Eng. Technol., Vol. 3, no. 4, pp.

2194-2196, 2016.

11. MO Rahman, MK Hossen, MG Morsad and A. Chandra, "An Approach to Improve the Security of Cloud Data Using Cryptography and Steganography with E-LSB Coding", IJCSNS, vol. 18, no. 9, p. 85, 2018.

12. S. Shanthi, RJ Kannan and S. Santhi,

"Efficient secure data system in the cloud using a steganography-based cryptosystem with FSN", Mater. Today Proc., Vol. 5, no.

1, pp. 1967-1973, 2018.

13. AA Abdullah, ZA Abod and MS Abbas, "An improvement steganography system based on Quantum One Time Pad Encryption", Int. J. Pure Appl. Math., Vol. 119, no. 15, pp. 263-280, 2018.

14. GS Mahmood, DJ Huang and BA Jaleel,

"Achieving Effective, Confidential and

Integrity of Data in Cloud Computing", IJ Netw. Secur., Vol. 21, no. 2, pp. 326-332, 2019.

15. O. Hosam and MH Ahmad, "Hybrid Design for Cloud Data Security Using a Combination of AES, ECC and LSB Steganography", Int. J. Comput. Sci. Eng., Vol. 19, no. 2, pp. 153-161, 2019.

16. D. Suneetha and RK Kumar, “Improving Security for Cloud Data Using Partition- Based Steganography,” in Proceedings of the 2nd.

Referensi

Dokumen terkait

Some of the opportunities and benefits of implementing cloud computing-based electronic document management include 1) Cloud storage, in general, the available

The original use of the monolithic term described enormous main frame applications with no usable modularity, therefore resulting in un-maintainable systems and the "software crisis."