Font Size: a A A

Study Of The Transmitted Information Security Based On Image Scrambling In Cloud Environment

Posted on:2015-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:C ChenFull Text:PDF
GTID:2298330431486350Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As a service cloud computing derivatives, cloud storage provides users with theability to store and manage files backup. Cloud storage is not only flexible, scalable,but also on-demand and even more free of charge accelerated form of people’swidespread use. As more and more users choose to store information to the cloud,security issues facing cloud storage has become a hot research.As a typical of personal information, in the process of transmission image maybe subject to monitoring, theft, assault cut pollution attacks, graffiti attacks, identityattacks. In the storage side image may be illegal access, tampering, etc. These willcause potential safety problems. In order to solve the security problem in the wholeimage cloud storage process, this paper do the following work:Firstly, the paper proposed framework for cloud security image informationsecurity based on Eucalyptus. In the framework of the traditional four cloud storagebased, focusing on adding image scrambling system in the transmission process toimprove the image of privacy, effectively masking the true image information, toprevent others from stealing. Meanwhile in a stored procedure, using informationdiffusion algorithm (IDA) for distributed storage management. The algorithmoccupies a small space for a large amount of data cloud environment to further ensurethat the image is stored in the anti-aggressive.Secondly, based on cloud security framework against the form of imageinformation in transfer process, the paper proposed fault tolerance algorithm based onsub-block image scrambling. First considering the timeliness of transmission, the useof block scrambling mode is simple and efficient, and can improve the image privacy.Meanwhile, in order to improve the fault tolerance of the image, combination ofquadratic residue theorem and Rabin cryptosystem methods, to maximize therecovery image after the attack, to effectively improve the image anti-aggressive andthe robustness in transfer process.Finally, the simulation results verify the effect of the scrambling algorithm. By simulating shear attacks, pollution attack, graffiti attack, attack identificationexperiments, the effect has been to restore the image of strength and resistance todifferent attack comparative data. The results show that the algorithm can effectivelyresist a certain intensity of the attack, and encryption takes less time for networktransmission cloud storage environment.
Keywords/Search Tags:cloud security, Image scrambling, Quadratic Residue theorem, cloud storage, IDA
PDF Full Text Request
Related items