With the rapidly changing technological realm, there is an urgent need to provide and protect the confidentiality of confidential images when stored in a cloud environment. To overcome the security risks associated with single cloud, multiple clouds offered by unrelated cloud providers have to be used. This paper outlines an integrated encryption scheme for the secure storage of confidential images on multiple clouds based on DNA sequences.
Cloud computing has been defined as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. But there is a risk of widespread data loss or downtime due to internet connectivity problems or a localized component failure in a cloud computing environment. In order to reduce the service availability risk or loss of data, a multi cloud system where data is replicated into multiple clouds offered by different cloud providers are used. Once the assets are in the cloud, the clients lose control over them, as data in the cloud typically resides in a shared environment. With the growth of a large number of cloud service providers, there is a need to protect confidential images stored in the cloud from unauthorized users and also from the cloud service providers. This paper proposes an integrated encryption scheme based on DNA sequences and scrambling using zigzag pattern or Magic Square of doubly even order pattern to ensure double-fold security for the secure storage of confidential images on multi-cloud.
M is a finite set of plain-text (images).
ii. C is a finite set of possible cipher-text.
iii. is a finite set of possible keys.
Rev-synthesis is the process of converting each sequence into its digital form.
A magic square of order n is a square matrix or array of n 2 numbers such that the sum of the elements of each row and column, as well as the main diagonals, is the same number, called the magic constant, (M).
In the proposed integrated encryption scheme, each pixel of the digital image is converted into its corresponding DNA coded value according to the DNA encoding method proposed for each pixel of a digital image by Qiang Zhang et al [2].
The integrated encryption scheme consists of two phases. Phase I deals with the secure storage and Phase II deals with the retrieval of the stored image. Figure 3
To prove the strength and soundness of the Security analysis is made to find the weakness of a cryptographic scheme and retrieving the encrypted image without the knowledge of the decryption key.
The Correlation Coefficient is determined using the formula:
where x and y are two adjacent pixels and n is the total number of pixels selected from the image for the calculation. uniformly distributed and divulges no information to any unauthorized users. Table 1 elucidates that there is negligible correlation between the adjacent pixels of the encrypted images.
Histograms express the statistical characteristics of an image. An encryption algorithm has good performance if the histograms of the original image and encrypted image are dissimilar. Figure
In the integrated encryption scheme, avalanche effect is significantly apparent as a flip in a bit will be mapped to an entirely different position in the key DNA sequence file.
According to Kerckhoffs’s principle, the integrated encryption scheme is secure even if everything about the system, except the
This content is AI-processed based on open access ArXiv data.