Enhancing Social Video Services in Multi Cloud Using Distributed Graph

Authors

  • G. PrabuKanna  Department of Information Technology, Kalasalingam University, Krishnankoil, Tamil Nadu, India
  • G. VijayaLalitha  Department of Information Technology, Kalasalingam University, Krishnankoil, Tamil Nadu, India

Keywords:

Cloud Computing, Social Video, Cloud Service Provider, Pixel Permutation

Abstract

Cloud Computing is the emerging technology used to store and share data to various users. Online social network and videos which are generated by users are growing well in today's trend. Those social videos are hostedin cloud which is turning into a standard to give out the users, who generated and stored their contents in cloud. The crucial issue of cloud based video content sharing is that users found expansively, and they are not provided with good service provider. We proposed an algorithm in this paper, pixel permutation, to share social video to multi cloud providers and provide security to the video content as well as solution to the optimization problem. We exhibit the social video qualities and the tradeoff between them is uncovered for fulfilling the users and reducing the data transmission. Finally, the result is compared with the existing encryption algorithm and proved that the proposed algorithm is providing more security and the time required for processing is low when compared to existing algorithm. These are implemented using CloudSim and proved that proposed technique gives better result than the existing technique when compared to time and performance.

References

  1. “Security Issues and their Solution in Cloud Computing”, Prince Jain Malwa Polytechnic College Faridkot, Punjab-151203, India
  2. ?“Encryption And Decryption Of A Cloud Computing File”, RojaRamani A
  3. “A Study Based on the Video Encryption Technique”, Saurabh Sharma, Pushpendra Kumar Pateriya, Lakshmi Department of Computer Science Engineering Lovely Professional University, Phagwara, India
  4. “An Overview of Video Encryption Techniques”,? M. Abomhara, Omar Zakaria, Othman O. Khalifa
  5. “A Survey on Video Encryption Techniques”, YogitaNegiAsstt. Professor, BCIIT, Delhi Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2015). CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification. Expert Systems with Applications, 42(21), 7905?7916.
  6. “A Survey of Video Encryption Methodologies”, MadhviSoni , SapnaChaudhary,? Dept. of Computer Science & Engineering, Shri Ram Group of Institutions, Jabalpur, India
  7. “Permutation based Image Encryption Technique”,SeshaPallaviIndrakantiP.S.Avadhani Department of CS and SE, Andhra University College of Engineering(A), Andhra University, Visakhapatnam
  8. “Algorithm of Image Encryption based on Permutation Information Entropy”, Guang-hui, Hu Kai, Yang He and E Xu, Beijing University of Aeronautics and Astronautics Beijing, China
  9. “NAIVE ? Network Aware Internet Video Encoding”, Hector Briceno, Steven Gortler, Leonard McMillan, MIT.
  10. “A Light ? Weight Encrypting For Real Time Video Transmission”, Salah Aly
  11. “Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm”, Adam J. Slagell slagell@ncsa.uiuc.edu January 16, 2004
  12. “Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations”,? Daniel Socek, Spyros Magliveras, DubravkoCulibrk, Oge Marques, HariKalva and BorkoFurht Florida Atlantic University, Boca Raton FL 33431
  13. P. Mell and T. Grance, “The NIST definition of cloud computing,” Nat. Inst. Standards Technol., Gaithersburg, MD, USA, Tech. Rep. NIST SP 800-145, 2009.
  14. W. Zhu, C. Luo, J.Wang, and S. Li, “Multimedia cloud computing,” IEEE Signal Process. Mag., vol. 28, no. 3, pp. 59?69, May 2011.
  15. D. D??az-S?anchez, F. Almenarez, A. Mar??n, D. Proserpio, and P.A. Cabarcos, “Media cloud: An open cloud computing middleware for content management,” IEEE Trans. Consum. Electron., vol. 57, no. 2, pp. 970? 978, May 2011.
  16. Srinavasin, Madhan (2012). “State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment”. ACM ICACCI'.
  17. "Identity Management in the Cloud". Information Week. 2013-10-25. Retrieved 2013-06-05
  18. T. ElGamal, “A public key cryptosystem and a signature scheme basedon discrete logarithms,” in Advances in Cryptology. New York, NY, USA:Springer-Verlag, 1985, pp. 10?18.
  19. G. B. Algin and E. T. Tunali, “Scalable video encryption of h. 264 svccodec,” J. Vis. Commun. Image Represent., vol. 22, no. 4, pp. 353?364,2011.
  20. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebasedencryption,” in Proc. IEEE Symp. Security Privacy, 2007,pp. 321?334.
  21. D. Naor, M. Naor, and J. Lotspiech, “Revocation and tracing schemes forstateless receivers,” in Proc. CRYPTO, 2001, pp. 41?62.
  22. L. Qiao and K. Nahrstedt, “A new algorithm for mpeg video encryption,”in Proc. 1st Int. Conf. Imag. Sci., Syst. Technol., 1997,pp. 21?29.
  23. J. Ren, K. Zhang, and X. Shen, “Exploiting mobile crowdsourcing forpervasive cloud services:Challenges and solutions,” IEEE Commun.Mag.,vol. 53, no. 3, pp. 98?105, Aug. 2015.
  24. J. Ren, K. Zhang, and X. Shen, “Social aware crowdsourcing with reputationmanagement in mobile sensing,” Comput. Commun., vol. 65, no. 1,pp. 55?65, Aug. 2015.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
G. PrabuKanna, G. VijayaLalitha, " Enhancing Social Video Services in Multi Cloud Using Distributed Graph, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 5, pp.83-89 , May-June-2017.