Cryptography | |
Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment | |
article | |
Pallavi Kulkarni1  Rajashri Khanai2  Dattaprasad Torse1  Nalini Iyer3  Gururaj Bindagi4  | |
[1] Department of Electronics and Communication Engineering;Department of Computer Science Engineering;Department of Electronics and Communication Engineering, KLE Technological University;Platform Architect | |
关键词: cloud computing; image; neural key exchange protocol; LDPC coding; cryptcoding; subkey; Khazad function; security; reliability; | |
DOI : 10.3390/cryptography7020023 | |
学科分类:社会科学、人文和艺术(综合) | |
来源: mdpi | |
【 摘 要 】
The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical possession. This certainly poses new security threats for personal and confidential data, bringing the focus back on trusting the use of the cloud for sensitive data. The benefits of the cloud outweigh the concerns raised earlier, and with an increase in cloud usage, it becomes more important for security services to evolve in order to address the ever-changing threat landscape. Advanced encryption standard (AES), being one of the most widely used encryption techniques, has inherent disadvantages related to the secret key that is shared, and predictable patterns in subkey generation. In addition, since cloud storage involves data transfer over a wireless channel, it is important to address the effect of noise and multipath propagation on the transmitted data. Catering to this problem, we propose a new approach—the secure and reliable neural cryptcoding (SARNC) technique—which provides a superior algorithm, dealing with better encryption techniques combined with channel coding. A chain is as strong as the weakest link and, in the case of symmetric key encryption, the weakest link is the shared key. In order to overcome this limitation, we propose an approach wherein the key used for cryptographic purposes is different from the key shared between the sender and the receiver. The shared key is used to derive the secret private key, which is generated by the neural key exchange protocol. In addition, the proposed approach emphasizes strengthening the sub-key generation process and integrating advanced encryption standard (AES) with low-density parity check (LDPC) codes to provide end-to-end security and reliability over wireless channels. The proposed technique was tested against research done in related areas. A comparative study shows a significant improvement in PSNR, MSE, and the structural similarity index (SSIM). The key strength analysis was carried out to understand the strength and weaknesses of the keys generated.
【 授权许可】
CC BY
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO202307010004284ZK.pdf | 2752KB | download |