ENHANCEMENT OF MULTIMEDIA SECURITY IN CLOUD COMPUTING

Authors

  • Anu Gill Research Scholar, Department of CSE, IIET (Jind)
  • Mrs. Nikita Assistant Professor, Department of CSE, IIET (Jind)

Keywords:

frequently, Cloud Network, criminal, intentions, unlawful

Abstract

Information is most vital piece of cloud services so gigantic concern ought to be given to its security. A few malicious persons can utilize Cloud computing for unlawful and criminal and active use of cloud for illicit intentions is known cloud ill-use. The biggest need is to maintain, manage information resources in digital format and made resource sharable for multiple access. Every organization is building its resources either by digitizing documents or by entering new data in digital form. Digital resources available are maintained and are being shared frequently over Cloud Network. A few malicious persons could use to Cloud computing for unlawful & criminal & active use of cloud for illicit intentions is called cloud ill-use. The biggest need is to maintain, manage information resources in digital format & made resource sharable for multiple access. Every organization is building its resources either by digitizing documents or by entering new data in digital form. Digital resources available are maintained & are being shared frequently over Cloud Network.

References

Agi, I., Gong, L.: An empirical study of secure mpeg video transmissions. In: Proceedings of Symposium on Network & Distributed System Security, pp. 137–144. IEEE Press, New York (1996)

Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time trans-port protocol (SRTP) (2004)

Bergeron, C., Lamy-Bergot, C.: Complaint selective encryption for h.264/avc video streams. In: IEEE 7th Workshop on Multimedia Signal Processing, pp. 1–4 (2005). doi: 10.1109/ MMSP.2005.248641

Cheng, H., Li, X.: Partial encryption of compressed images & videos. IEEE Trans. Signal Process. 48(8), 2439–2451 (2000). doi: 10.1109/78.852023

Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838–844 (2002)

Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, pp. 149–160 (2002)

Lian, S., Liu, Z., Ren, Z., Wang, H.: Secure advanced video coding based on selective encryp-tion algorithms. IEEE Trans. Consum. Electron. 52(2), 621–629 (2006)

Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption & watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17(6), 774–778 (2007)

Published

30-09-2016

How to Cite

Anu Gill, & Mrs. Nikita. (2016). ENHANCEMENT OF MULTIMEDIA SECURITY IN CLOUD COMPUTING. International Journal for Research Publication and Seminar, 7(5), 67–72. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/874

Issue

Section

Original Research Article