Secure Searchable Image Encryption in Cloud Using Hyper Chaos

Secure Searchable Image Encryption in Cloud Using Hyper Chaos

Shaheen Ayyub and Praveen Kaushik

Department of Computer Science and Engineering, Maulana Azad National Institute of Technology, India

Abstract: In cloud computing, security is the main issue to many cloud providers and researchers. As we know that cloud acts as a big black box. Nothing inside the cloud is visible to the cloud user. This means that when we store our data or images in the cloud, we lost our control upon it. The data in the provider’s hands could make security and privacy issues in cloud storage as users lose their control over their data. So it is necessary for protecting user’s private data that they should be stored in the encrypted form and server should not learn anything about the stored data. These data may be personal images. In this paper we have worked on the user’s personal images which should be kept secret. The proposed scheme is to do the encryption of the images stored in the cloud. In this paper Hyper Chaos based encryption is done, which is applied on the masked images. Comparing with conventional algorithms chaos based ones have suggested more secure and fast encryption methods. The flicker images are used to create the mask for the original image and then hyper chaos is applied for encrypting the image. Prior methods in this regard are restricted to either some attacks possibility or key transfer mechanism. One of the advantages of proposed algorithm is that, the key is also encrypted. Some values of generated encrypted key with the index is sent to the server & other value is sent to the user. After decrypting the key, an encrypted image can be decrypted. The key encryption is used to enhance the security and privacy of the algorithm. Index is also created for the images before storing them on the cloud.

Keywords: Cloud computing, encryption, cloud security, privacy and integrity, hyper chaos, decryption, logistic map.

Received June 27, 2015; accepted June 1, 2016
Full text    
Read 1647 times
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…