Hybrid Crypto Techniques for Secured Multimedia Big Data Content Protection System (SMBDCPS)

Hybrid Crypto Techniques for Secured Multimedia Big Data Content Protection System (SMBDCPS)

Velliangiri S., Naga Rama Devi G.
Copyright: © 2021 |Pages: 21
DOI: 10.4018/IJeC.2021040101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Most of the existing work does not ensure the optimal and secured storage maintenance of big data. This is resolved in the proposed research method name called secured multimedia big data content protection system (SMBDCPS). The proposed scheme has using AES and SHA-256 hybrid mechanism for securing the keys of encryption and decryption. This method has integrated the key value of AES and SHA-256 together to generate the new key value for increasing the security level. The main advantage of the proposed scheme has required only small storage which is computation efficient. The overall performance of the proposed scheme has carried out on MATLAB simulation environment over the medical health care datasets. The performance proves the proposed scheme has yield better results than the existing scheme.
Article Preview
Top

1. Introduction

The fast development in the advances and systems administration in particular social, Internet of Things and portable devices could make an enormous digital data. In this specific situation, vast information has been gathered to depict such tremendous digital data. Big data could refer to the large and the complex datasets containing structured and unstructured data which are generated daily. (Tsai et al., 2015).

Big data technology improves the quality of human’s life by using a social network, and it helps researchers, experts, and organization users to gain quicker and better choices in the course of improving their specific activities and the personal satisfaction (Chen et al., 2014). For reasonable applications and their difficulties, big data field is considered by different specialists and analysts from various networks that blend research world (Gupta et al., 2018). Furthermore, the big data presents a new issue that is connected not exclusively to 3Vs qualities, similar to the information security (Alouneh et al., 2018). The occurrence of enormous information is digital security challenges which are the malware location, the verifications and the steganalysis (Sabar et al., 2017).

Meanwhile, as a result of the quick advancement of the Internet and social networks like facebook, twitter etc. It is excellent straightforward for a client to assemble an enormous number of medicinal health care data from various sources without recognizing the copyright data of that information. In the meantime, as cloud computing makes these advantages more appealing than yet, it also conveys novel and extreme security dangers toward clients' re-appropriated information. Cases of blackouts and security ruptures of striking cloud administrations turn out now and then (Shah et al., 2008). Furthermore, there subsist assortments of motivations for Cloud Service Provider (CSP) to perform irresolute laying the bearing of the cloud clients concerning their redistributed information status. For cases, the cloud service provider may recapture stockpiling for financial reasons by evacuation of information which is not or is not regularly utilized, or still cover information misfortune occasions to protect notoriety (Ren et al., 2012). Quickly, even though re-appropriating information to the cloud is economically alluring for long-standing noteworthy capacity, it does not immediately give any confirmation on information trustworthiness and availability,

To address the above issue, the proposed method uses AES cryptography (Daemen & Rijmen, 2013; Jarvinen et al., 2005) and SHA-256 (Cheddad et al., 2010; Yu et al., 2016). Moreover, the proposed work provides additional secure by watermark recognition based Compressive Sensing (CS) that impacts the secure MCC environment.

The main Contribution of the research work is

  • 1.

    The proposed a novel based approach for secure multimedia big data content protection.

  • 2.

    In addition to that, proposes a compressive sensing based watermark recognition that leads to ensure the safe MCC Environment.

  • 3.

    The advantage of the proposed method is introducing the compressive sensing framework which would optimally store the multimedia big data contents into the cloud storage with less storage cost

The remaining of the paper is organized as follows, Section 2 discussed related works and Section 3 briefed about proposed methodology. Section 4 provides the experimental results and discussion between the proposed and existing methods. Finally, Section 5 concludes the paper with future work.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing