American Journal of Applied Mathematics

| Peer-Reviewed |

Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function

Received: 24 July 2014    Accepted: 02 September 2014    Published: 27 December 2014
Views:       Downloads:

Share This Article

Abstract

Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication and confidentiality issues. A methodology has been proposed for user authentication to make cloud server, dynamic in nature, based on the time stamp and other parameters. The confidential data are embedded randomly in images using steganography as a basic technique, in which a new method of encryption and decryption is proposed. The methodology of encryption or decryption uses odd Fibonacci series values and a hash function to prepare hash value series. This hash value series is multiplied with ASCII codes of the original data which need to embed, in decryption process and similar technique have been used here, rather than the technique of multiplying ASCII codes with hash value using division operation.

DOI 10.11648/j.ajam.s.2015030102.11
Published in American Journal of Applied Mathematics (Volume 3, Issue 1-2, January 2015)

This article belongs to the Special Issue Frontiers in Mathematics and Computing

Page(s) 1-8
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Privacy, Cloud computing, Steganography, Encryption, Decryption, Hash Function

References
[1] P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765
[2] CryptographyandNetworkSecurity; Principles and Practices (5thEdition), William Stallings,
[3] Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM
[4] Biham, Eliand Shamir, Adi(1991). "Differential Cryptanalysis of DES-like Cryptosystems". Journal of Cryptology Bruce Schneie, Applied Cryptography, 2nd edition, Wiley, 1996
[5] A. Tsanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of parkinson’s disease progression by noninvasive speech tests,” Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884– 893, 2010.
[6] G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of Medicine, vol. 63, pp. 479–492, 2012.
[7] L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available: http://tinyurl.com/4atsdlj,” 2010.
[8] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. van Beijnum, and P. D. Stefanis, “End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust,” in PervasiveHealth, 2011, pp. 478–484.
[9] M. Delgado, “The evolution of health care it: Are current u.s. privacy policies ready for the clouds?” in SERVICES, 2011, pp. 371–378.
[10] N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009.
[11] I. Neamatullah, M. Douglass, L. Lehman, A. Reisner, M. Villarroel, W. Long, P. Szolovits, G. Moody, R. Mark, and G. Clifford, “Automated de-identification of free-text medical records,” BMC medical informatics and decision making, vol. 8, no. 1, p. 32, 2008.
[12] S. Al-Fedaghi and A. Al-Azmi, “Experimentation with personal identifiable information,” Intelligent Information Management, vol. 4, no. 4, pp. 123–133, 2012.
[13] J. Domingo-Ferrer, “A three-dimensional conceptual framework for database privacy,” Secure Data Management, pp. 193 202, 2007.
[14] AndrewSTenenbaum,“ComputerCommunicationNetworks”McGrawHill, Revised 4thedition, 2006
[15] David Kahn,"The Codebreakers-The Story ofSecretWriting",1967
[16] A. Farmer, O. Gibson, P. Hayton, K. Bryden, C. Dudley, A. Neil, and L. Tarassenko, “A real- time, mobile phone-based telemedicine system to support young adults with type 1 diabetes,” Informatics in primary care, vol. 13, no. 3, pp. 171–178, 2005.
[17] M. Barni, P. Failla, V. Kolesnikov, R. Lazzeretti, A. Sadeghi, and T. Schneider, “Secure evaluation of private linear branching programs with medical applications,” Computer Security–ESORICS 2009, pp. 424–439, 2009.
[18] A. C.-C. Yao, “How to generate and exchange secrets (extended abstract),” in FOCS. IEEE, 1986, pp. 162–167.
[19] Cryptography and Network Security; Principles and Practices (5th Edition), William Stallings,
[20] Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM
[21] Biham, Eli and Shamir, Adi (1991). "Differential Cryptanalysis of DES-like Cryptosystems". Journal of Cryptology
Author Information
  • Computer Science & Engineering, PES Institute of Technology, Bangalore South Campus, Bangalore, India

  • Computer Science & Engineering, PES Institute of Technology, Bangalore South Campus, Bangalore, India

Cite This Article
  • APA Style

    Bidisha Goswami, Ravichandra G. (2014). Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function. American Journal of Applied Mathematics, 3(1-2), 1-8. https://doi.org/10.11648/j.ajam.s.2015030102.11

    Copy | Download

    ACS Style

    Bidisha Goswami; Ravichandra G. Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function. Am. J. Appl. Math. 2014, 3(1-2), 1-8. doi: 10.11648/j.ajam.s.2015030102.11

    Copy | Download

    AMA Style

    Bidisha Goswami, Ravichandra G. Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function. Am J Appl Math. 2014;3(1-2):1-8. doi: 10.11648/j.ajam.s.2015030102.11

    Copy | Download

  • @article{10.11648/j.ajam.s.2015030102.11,
      author = {Bidisha Goswami and Ravichandra G.},
      title = {Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function},
      journal = {American Journal of Applied Mathematics},
      volume = {3},
      number = {1-2},
      pages = {1-8},
      doi = {10.11648/j.ajam.s.2015030102.11},
      url = {https://doi.org/10.11648/j.ajam.s.2015030102.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ajam.s.2015030102.11},
      abstract = {Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication and confidentiality issues. A methodology has been proposed for user authentication to make cloud server, dynamic in nature, based on the time stamp and other parameters. The confidential data are embedded randomly in images using steganography as a basic technique, in which a new method of encryption and decryption is proposed. The methodology of encryption or decryption uses odd Fibonacci series values and a hash function to prepare hash value series. This hash value series is multiplied with ASCII codes of the original data which need to embed, in decryption process and similar technique have been used here, rather than the technique of multiplying ASCII codes with hash value using division operation.},
     year = {2014}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function
    AU  - Bidisha Goswami
    AU  - Ravichandra G.
    Y1  - 2014/12/27
    PY  - 2014
    N1  - https://doi.org/10.11648/j.ajam.s.2015030102.11
    DO  - 10.11648/j.ajam.s.2015030102.11
    T2  - American Journal of Applied Mathematics
    JF  - American Journal of Applied Mathematics
    JO  - American Journal of Applied Mathematics
    SP  - 1
    EP  - 8
    PB  - Science Publishing Group
    SN  - 2330-006X
    UR  - https://doi.org/10.11648/j.ajam.s.2015030102.11
    AB  - Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication and confidentiality issues. A methodology has been proposed for user authentication to make cloud server, dynamic in nature, based on the time stamp and other parameters. The confidential data are embedded randomly in images using steganography as a basic technique, in which a new method of encryption and decryption is proposed. The methodology of encryption or decryption uses odd Fibonacci series values and a hash function to prepare hash value series. This hash value series is multiplied with ASCII codes of the original data which need to embed, in decryption process and similar technique have been used here, rather than the technique of multiplying ASCII codes with hash value using division operation.
    VL  - 3
    IS  - 1-2
    ER  - 

    Copy | Download

  • Sections