Title | Analysis of Secure Multimedia Communication in Cloud Computing |
Publication Type | Conference Proceedings |
Year of Conference | 2019 |
Authors | Sharath, M. N., T. M. Rajesh, and M. Patil |
Conference Name | 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2019 |
Pagination | 136 - 144 |
Date Published | 2019 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
ISBN Number | 9781728102832 (ISBN) |
Keywords | Computer Science and Engineering, Scopus |
Abstract | The exponential up surge of cloud computing and multimedia data communication has alarmed academia-industries to develop more efficient and robust solution, especially secure data transmission system. Unlike classical text data security, multimedia data security requires methods with better signal preserving capacity as well as computational efficacy. Such needs become inevitable for cloud computing environment where there can be gigantically large number of users active simultaneously and demand Quality-of-Service (QoS) provision for respective data communication. On the other hand, the possibility of data breaches can't be ignored in current day scenario. As solution, numerous efforts have been made using cryptography algorithms and steganography concepts; however higher computational overheads and adaptive attack methods have alarmed researchers to develop more efficient solution. Considering it as motivation, in this paper a review has been performed for the different security challenges for multimedia communication over cloud computing environment, different methods including cryptography and steganography are discussed. In addition, hybrid security systems with cryptography and steganography together have been assessed for respective performance towards secure multimedia data communication over cloud infrastructures. This study revealed that both cryptosystem as well as classical steganography can't assure optimal security as standalone solution. Though, hybrid crypto-steganography approaches have performed satisfactory, their efficacy remain suspicious due to increased attack mechanism like steganalysis. To alleviate such issues, augmenting both cryptosystem as well as steganography, especially for attack-resilient embedding optimization and wavelet analysis can be of paramount significance. It can achieve computational efficiency as well as robust attack resilience towards any possible breach during transmission over cloud infrastructures. © 2019 IEEE. |
DOI | 10.1109/ICICICT46008.2019.8993352 |
Short Title | Int. Conf. Intell. Comput., Instrum. Control Technol., ICICICT |