Cloud Computing: Secure Transmission of High Definition Videos Using Cryptographic Approach

  • Authors

    • Anwar Basha.H
    • S Amrit Sai
    • Sanjnah A
    • Srimathi M
    2018-04-17
    https://doi.org/10.14419/ijet.v7i2.19.15057
  • Cloud computing, video content sharing, time-domain attribute-based access control (TAAC), watermarking, cryptography
  • Cloud computing facilitates ubiquitous access to shared pool of configurable system resources and services over the Internet. Often due to shared access to this massive amount of data there is equal chances of risk. Transferring sensitive information in the form of text, audio or video, over the cloud one cannot guarantee the safety of the file. This paper assesses the effect of transmission of High Definition videos with the help of cloud-based servers that will improve the security of data being transmitted as well as enhance the quality of experience for end-users. We propose to share video contents to a selective group of people using the Time Domain Attribute based Access Control(TAAC) schema and generate keys using cryptographic method which gives the much needed protection to access these videos. Further stegnographic approaches are practised to maintain the data confidentiality.

     

     

  • References

    1. [1]. Richard Clegg, Raul Landa, David Griffin, Miguel Rio, Peter Hughes, Ian Kegel, Tim Stevens, Peter Pietzuch, Doug Williams, “Faces In The Cloudâ€, 2017, pp:1-1

      [2]. Chun-Shien Lu, H.Y.M.Liao, “Multipurpose Watermarking For Image Authentication And Protectionâ€, 2001, pp: 1579-1592.

      [3]. E.I.Lin, A.M.Eskicioglu, R.L.Lagendijk, E.J.Delp, “Advances In Digital Video Content Protectionâ€,2005, pp: 171-183

      [4]. F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn, “Information Hiding – A Surveyâ€, 1999, pp: 1062-1078

      [5]. Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, Hong-Yuan Mark Liao, “Cocktail Watermarking For Digital Image Protectionâ€, 2000, pp:209-224

      [6]. S. Roy, M. Chuah,“Secure Data Retrieval Based on Cipher text Policy Attribute-Based Encryption (CP-ABE) System for the DTNsâ€

      [7]. Gang Liu, Yafei Dai, Zhenhua Li, Yan Huang, “Cloud download: using cloud utilities to achieve high-quality content distribution for unpopular videosâ€

  • Downloads

  • How to Cite

    Basha.H, A., Amrit Sai, S., A, S., & M, S. (2018). Cloud Computing: Secure Transmission of High Definition Videos Using Cryptographic Approach. International Journal of Engineering & Technology, 7(2.19), 94-96. https://doi.org/10.14419/ijet.v7i2.19.15057