A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems

To date, the cloud storage system has been well developed. It is a system that provides users with large storage, high computation ability, and convenience. However, users cannot fully trust a cloud storage system because it is an “honest but curious”server. For this reason, protecting data confidentiality and data integrity are two important issues in a cloud storage system. In this paper, we present our design a secure scheme based on RSA encryption and Shamirs secret sharing schemes. The experimental results and security analysis show that our scheme can effectively ensure data confidentiality and check data integrity. In addition, we compare the computational cost with RSA encryption scheme.

[1]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[2]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[4]  Marc Sánchez Artigas Toward efficient data access privacy in the cloud , 2013, IEEE Commun. Mag..

[5]  Joseph K. Liu,et al.  Security Concerns in Popular Cloud Storage Services , 2013, IEEE Pervasive Computing.

[6]  Carlo Curino,et al.  Relational Cloud: a Database Service for the cloud , 2011, CIDR.

[7]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[9]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[10]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[11]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[12]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  Sagar Naik,et al.  Enhancing Data Integrity and Privacy in the Cloud: An Agenda , 2013, Computer.

[15]  Peter Kulchyski and , 2015 .

[16]  Junbeom Hur,et al.  Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[17]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[18]  Hsiang-Cheh Huang,et al.  Progressive Watermarking Techniques Using Genetic Algorithms , 2007 .

[19]  J. H. Moore Protocol failures in cryptosystems , 1988, Proc. IEEE.

[20]  Hui-Zhen Gu,et al.  uCloud: a user-centric key management scheme for cloud data protection , 2013, IET Inf. Secur..

[21]  Kanika Lakhani,et al.  Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[22]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[23]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[24]  Cong Wang,et al.  Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud , 2013, IEEE Transactions on Emerging Topics in Computing.