Privacy-Preserving Image Protection in Cloud Computing Using Intelligent Encryption
Privacy-Preserving Image Protection in Cloud Computing Using Intelligent Encryption
Authorized licensed use limited to: Parul Institute of Engineering and Technology. Downloaded on October 18,2024 at 05:21:50 UTC from IEEE Xplore. Restrictions apply.
the study aims to address deficiencies in current methods. It II. BACKGROUND
seeks to enhance the security posture of cloud-based image The contemporary methods of image protection within
storage and processing, mitigating privacy risks and cloud environments exhibit notable deficiencies and gaps,
contributing valuable insights to the evolving field of digital warranting scholarly scrutiny [1]. Traditional encryption
security. This study endeavors to address specific objectives and techniques, while foundational, may struggle to adequately
challenges through the implementation of intelligent address the unique attributes of image data, including size,
encryptionin the realm of image protection within cloud format diversity, and contextual intricacies. Moreover, the
computing.It seeks to enhance the adaptability of encryption dynamic nature of cloud ecosystems introduces challenges in
methods to diverse image formats, sizes, and complexities, adapting security measures to evolving threats. The inadequacy
effectively mitigating privacy risks and fortifying security of someexisting methods to effectively counteract sophisticated
measures in dynamic cloud environments. cyber threats further underscores the need for innovative
B. Scope and Limitations solutions. As image-centric data continues to proliferate in
cloud storage, bridging these gaps becomes imperative,
The study delineates its boundaries concerning the prompting academic researchers to explore novel avenues, such
technologies and methods considered for intelligent as intelligent encryption, to enhance the resilience of image
encryption in thecontext of image protection within cloud protection mechanisms in the cloud.
computing. Focusedon the practical application of Existing approaches to image data privacy in cloud
encryption, it explores adaptive approaches while environments often exhibit shortcomings that necessitate
acknowledging constraints, ensuring a comprehensive academic scrutiny and innovation. Traditional methods, such as
examination of intelligent encryption’sefficacy and standard encryption, may fall short in adequately addressing the
feasibility in enhancing privacy. nuanced privacy concerns associated with images [2]. The
C. Significance and Contribution complex and varied nature of visual data, coupled with the
The proposed solution faces limitations and constraints that increasing sophistication of cyber threats, poses challengesto
may impact its applicability. Factors such as computational conventional protection mechanisms. In particular, these
overhead, resource requirements, and compatibility challenges approaches may struggle to reconcile the need for robust
with existing infrastructures are critical considerations. This security with the demand for efficient image processing in
study recognizes the potential constraints, aiming to delineate cloud environments. Consequently, there is a pressing need
and assess these limitations to provide a nuanced understand- for academic research to identify and rectify these limitations,
ing of the proposed solution’s practical viability in diverse paving the way for more comprehensive and adaptive solutions
cloud computing environments. that effectively safeguard the privacy of image data in the
evolving landscape of cloud computing.
D. Hypothesis or Research Questions Current strategies for safeguarding image data privacy in
The research is guided by the hypothesis that implementing cloud settings exhibit deficiencies [7]. Traditional encryption
intelligent encryption in cloud-based image protection will methods often struggle with the intricate nature of visual data
significantly enhance privacy. Specific research questions and fail to adapt to evolving cyber threats. Their limitations
includeassessing the adaptability of intelligent encryption to in efficiently balancing robust security and streamlined image
diverse image formats, its efficacy in mitigating privacy risks, processing necessitate further academic exploration for more
and its practical feasibility within dynamic cloud adaptive and comprehensive solutions in cloud-based
environments. environments.
Thus, hypothesis includes the research questions that The Feistel structure, a widely adopted cryptographic de-
contribute to implement intelligent encryption in cloud-based sign, involves dividing data into two halves and iteratively
image protection will significantly enhance privacy. The processing them through multiple rounds, providing a
specificresearch questions include: foundation for secure encryption algorithms. In the proposed
1) How adaptable is intelligent encryption to diverse image solution for this research paper, leveraging the advanced
formats in the context of cloud-based image protection? Feistel-based symmetric encryption algorithm enhances the
2) What is the efficacy of intelligent encryption in adaptability to diverse image formats. The algorithm operates
mitigating privacy risks associated with image data in the on a data block divided into left and right halves, unfolding
cloud? through intricately designed rounds. This structural approach
3) What is the practical feasibility of implementing augmentsthe proposed solution’s efficacy in mitigating privacy
intelligent encryption within dynamic cloud risks by providing a strategic and robust mechanism for
environments for image protection? processing and securing image data in dynamic cloud
The intelligent encryption strategy significantly contributes environments [3].
to achieving privacy goals in cloud-based image protection [6].
III. PROPOSED SOLUTION
Its adaptive nature addresses challenges posed by diverse im-
age data, while its resilience to evolving cyber threats enhances Leveraging intelligent encryption, the Secure Force
overall security. This research aims to elucidate the nuanced algorithm adeptly navigates diverse image formats, bolstering
ways in which intelligent encryption substantiates privacy adaptability. The Secure Force algorithm shown in Algorithm
objectives within dynamic cloud computing environments.
979-8-3503-7378-3/24/$31.00 ©2024 IEEE
Authorized licensed use limited to: Parul Institute of Engineering and Technology. Downloaded on October 18,2024 at 05:21:50 UTC from IEEE Xplore. Restrictions apply.
1, a pivotal component, emerges as an innovative solution horizontal axis is labeled” Label your axes, include units”
enhancing privacy in cloud-based image protection. Its with values ranging from 1 to 10, suggesting it represents
proactive approach mitigates evolving cyber threats, fortifying some quantitative measure, but the units are not provided. The
overall security. This algorithm, through nuanced strategies, vertical axis is labeled ”Load, your area, include units” with
significantly contributes to substantiating the privacy values ranging from around 1 to 7, indicating it represents a
objectives outlined in the dynamic context of cloud computing quantity or measurement, but again the specific units are not
environments. If L and R represent the left and right halves given.
of the data block, respectively then the encryption process The three lines are color-coded in green, orange, and purple,
proceeds as follows: representing data series labeled as ”Si”, ”Al”, and ”Au”
L0 = Left half of the input data respectively. The green ”Si” line shows a relatively steady
R0 = Left half of the input data increase from around 1 to 6 over the range of the horizontal axis
values. The orange”Al” line exhibits a sharp peak aroundthe
middle of the horizontal axis range. The purple”Au” line
displays multiple peaks and valleys across the plotted range.
The image appears to be designed with contrasting colors
that should render well both on screen and in black-and-white
printed format, allowing clear distinction between the three
data series lines. However, without labeled units on the axes,
it is difficult to interpret the precise quantities or measurements
being represented in this line graph.
IV. SIMULATION AND PERFORMANCE
The proposed solution harnesses the capabilities of an EVALUATION
advanced Feistel-based symmetric encryption algorithm, In the experimental setup, we implement a novel approach
presenting a robust and sophisticated response to contemporary to safeguard medical images by combining Intelligent
challenges in data security. Integrating key cryptographic Encryption Systems with the Secure Force (SF) Encryption
principles and advanced operations, this solution establishes Algorithm. The simulation, conducted on the MATLAB
a formidable foundation for ensuring the confidentiality, platform, primarily focuses on the encryption process,
integrity, and resilience of data against a spectrum of cyber specifically the successful implementation of the SF
threats. The proposed solution intricately leverages the algorithm ongrayscale medical photos. This study explores
strengths of the Feistel-based symmetric encryption algorithm. the domainof Intelligent Encryption Systems, emphasizing
Operating on a data block conventionally divided into left their role inmanaging encryption keys and access control
(”L”) and right (”R”) halves, the algorithm unfolds over a to enhancethe overall security complexity. The assessment of
meticulously designed series of rounds. Through this process, the SFcryptographic algorithm’s performance involves
the proposed solution enhances data security by implement- ing preparing theenvironment, timing measurements, and
a strategic interplay of cryptographic principles, thereby utilizing helper functions for modularity. Diverse medical
addressing the complexities and demands of securing data in images are employed,converted to grayscale, and scaled into
dynamic and challenging computing environments. 8-pixel blocks foruniform processing. The ’Scaling’ function
facilitates thisoperation, ensuring compatibility with the
algorithm.
A. Performance Evaluation
To evaluate the entropy of the proposed cryptographic
algorithm for providing security to medical images, Shannon’s
entropy formula is used as follows:
n
Σ
H(X) = − p (xi) log2 p (xi)
i=1
Authorized licensed use limited to: Parul Institute of Engineering and Technology. Downloaded on October 18,2024 at 05:21:50 UTC from IEEE Xplore. Restrictions apply.
histogram shown in Fig. 2 and Fig. 3. Analyzing the his- VII. CONCLUSION
togram provides valuable insights into the distribution of pixel In conclusion, this study’s outcomes offer a comprehensive
intensities within the image post-encryption. The presence of perspective on the adaptability and effectiveness of intelligent
a uniform histogram following the encryption process serves as encryption in securing image data within the dynamic context
an indicator of a resilient and secure technique. The assessment of cloud-based image protection. The research emphasizesthree
entails calculating the encrypted image’s histogramto gauge the significant contributions that advance our understanding of
encryption method’s effectiveness. securing image data in cloud environments
Firstly, the research underscores the critical attribute of
adaptability displayed by intelligent encryption across a range
of image formats. The capacity of the proposed encryption
systems to seamlessly integrate with diverse image data types
is a noteworthy advancement, ensuring broad applicability in
safeguarding privacy in cloud-based image protection. This
adaptability addresses a vital concern in enhancing the
versatility of the proposed solution.
Fig. 2. Unacceptable low-resolution image Secondly, the study establishes the high efficacy of
intelligent encryption in addressing privacy risks associated
with image data in cloud storage and processing. Through the
strategicintegration of intelligent encryption systems managing
encryption keys and access control, the research showcases the
resilience of the proposed solution. This resilience significantly
contributes to strengthening privacy safeguards, confirming the
effectiveness of intelligent encryption in protecting sensitive
image data within cloud computing environments.
Lastly, the research affirms the practical feasibility of
Fig. 3. Image with acceptable high resolution
implementing intelligent encryption in dynamic cloud
settingsfor image protection. The proposed solution, featuring
The data is characterized by a large peak or spike towards the the Secure Force algorithm and employing advanced Feistel-
center of the chart, with smaller peaks and valleys on eitherside. basedsymmetric encryption, demonstrates its viability in
This pattern suggests that whatever is being measured tacklingthe complex challenges presented by dynamic cloud
experienced a significant increase or surge at one point, environments. The proven practicality underscores the
surrounded by periods of lower activity or values both before readiness ofthe proposed intelligent encryption framework for
and after the central peak. real-world applications, establishing its relevance and
applicability in the domain of image protection in cloud
VI. FINDINGS computing.
The findings of the research reveal valuable insights into REFERENCES
the questions posed. Firstly, the study demonstrates that
intelligent encryption exhibits notable adaptability to diverse [1] S. M. Metev and V. P. Veiko, Laser Assisted Microtechnology, 2nd ed.,
R. M. Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag, 1998.
image formats in the context of cloud-based image protection. [2] J. Breckling, Ed., The Analysis of Directional Time Series: Applications
This adaptability is a crucial attribute, ensuring the effective to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin,
application of encryption across various types of image data. Germany: Springer, 1989, vol. 61
[3] Kanimozhi, R. ”Adaptive and intelligent framework of data protection
Secondly, the research establishes that intelligent encryption techniques for cloud storage.” International Journal of Cloud Computing
proves highly efficacious in mitigating privacy risks associated 8.1 (2019): 50-67.
with image data in the cloud. The strategic integration of [4] Yassir, Suhad Abbas, and Haidar Raad Shakir. ”Hybrid Image Encryp-
tion Technique for Securing Color Images Transmitted Over Cloud
intelligent encryption systems, overseeing encryption keys and Networks.” International Journal of Intelligent Engineering Systems 16.6
access control, contributes to the robustness of the system, (2023).
safeguarding privacy effectively. Finally, the study affirmsthe [5] Al-Ta’i, Ziyad Tariq Mustafa, and Shaima Miteb Sadoon. ”Securing
Privacy: Encrypted Image Retrieval with CNNs and Chaos-Based Visual
practical feasibility of implementing intelligent encryption Cryptography on Cloud Computing.” International Journal of Intelligent
within dynamic cloud environments for image protection. The Engineering Systems 16.6 (2023).
proposed solution, incorporating the Secure Force algorithm [6] Kakkad, Vishruti, Meshwa Patel, and Manan Shah. ”Biometric authen-
tication and image encryption for image security in cloud framework.”
and leveraging the advanced Feistel-based symmetric Multiscale and Multidisciplinary Modeling, Experiments and Design 2
encryption, demonstrates its viability in addressing the intricate (2019): 233-248.
challenges posed by dynamic cloud settings, thereby [7] Mannan, Mohd Ahmed Abdul, and Gulabchand K. Gupta. ”A Robust
Image Security System for Cloud-Based Smart Campus Using LBP and
substantiating its practicality for real-world applications in PCA.” ICCCE 2020: Proceedings of the 3rd International Conference on
image protection. Communications and Cyber Physical Engineering. Singapore: Springer
F. example of a standard in [12] Nature Singapore, 2020.
Authorized licensed use limited to: Parul Institute of Engineering and Technology. Downloaded on October 18,2024 at 05:21:50 UTC from IEEE Xplore. Restrictions apply.
[8] Dahiwal, Pranali, and Anagha Kulkarni. ”Facial Image Encryption
Compression for Secure Image Transmission on Cloud Storage.” Inter-
national Journal of Intelligent Systems and Applications in Engineering
12.6s (2024): 615-621.
[9] Feng, Chaosheng, et al. ”Attribute-based encryption with parallel out-
sourced decryption for edge intelligent IoV.” IEEE Transactions on
Vehicular Technology 69.11 (2020): 13784-13795.
[10] Feng, Chaosheng, et al. ”Attribute-based encryption with parallel out-
sourced decryption for edge intelligent IoV.” IEEE Transactions on
Vehicular Technology 69.11 (2020): 13784-13795.
[11] Feng, Chaosheng, et al. ”Attribute-based encryption with parallel out-
sourced decryption for edge intelligent IoV.” IEEE Transactions on
Vehicular Technology 69.11 (2020): 13784-13795.
[12] Ahmad, Jawad, et al. ”An intelligent real-time occupancy monitoring
system with enhanced encryption and privacy.” 2018 IEEE 17th interna-
tional conference on cognitive informatics cognitive computing (ICCI*
CC). IEEE, 2018.
Authorized licensed use limited to: Parul Institute of Engineering and Technology. Downloaded on October 18,2024 at 05:21:50 UTC from IEEE Xplore. Restrictions apply.