Iprivacy-Performance Measurement of Encrypted Image Over Mobile Cloud
M.Sankari1, P. Ranjana2, D Venkata Subramanian3
1M Sankari, CSE Dept, Hindustan Institute of Technology and Science, Chennai, India.
2Dr P Ranjana, CSE Dept, Hindustan Institute of Technology and Science, Chennai, India.
3Dr D Venkata Subramanian, CSE Dept, Velammal Institute of Tech-nology and Science, Chennai, India.
Manuscript received on November 20, 2019. | Revised Manuscript received on November 26, 2019. | Manuscript published on 30 November, 2019. | PP: 2819-2823 | Volume-8 Issue-4, November 2019. | Retrieval Number: D6751118419/2019©BEIESP | DOI: 10.35940/ijrte.D6751.118419
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Basically, people can use mobile phones to capture images and upload to cloud storage. While uploaded the data to cloud especially image, untrusted third party cloud vendors may pass to unauthorised users for their profit. And maintaining im-age Privacy is the major current issue in the cloud storage and resource-limited mobile devices. Due to the overcome of these issues, the proposed work introduced the algorithm Privacy-Preserving algorithm for Image Encryption (PPIE) to secure the encrypted image of mobile on cloud. The proposed architecture is handled by three processes such as Divide, Chunk group and Scramble (DCS) for fast execution. For achieving the high per-formance of the mobile system, the proposed algorithm reduced the encryption time to speed up the mobile system with limited mobile resources. The main highlights are keeping metadata on mobile rather than cloud. Even cloud service provider cannot able to retain the original image. The performance measures of PPIE, by various JPEG images, are calculated by various metrics such as throughput, Key sensitivity, Low Complexity, Processing Time and Time Consumption. It was proved to be reduced by 50% of time consumption while compared to AES. The proposed work may prevent users from accessing of private images.
Keywords: Image Privacy; AES; Python; Mobile Computing; JPEG; Security.
Scope of the Article: Mobile Computing.