Security Model for Preserving Privacy of Image in Cloud

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud can be referred to as a public or semi-public interface between network nodes, based on certain contractual agreement. Data transmits across networks within different connected nodes. Cloud provides on-demand self-service. It also provides broad network access means from any standard device such as PC, laptop, and so on, where connection can be made with the network cloud. Cloud provides broad network access and uses resource pooling. As many companies are facing insecurities while dealing with data within the cloud, security models plays a major role in the security of cloud. This paper will offer a comparative analysis of some of the widely accepted algorithms that are used, considering data reliability, scalability, and integrity it provides on the cloud from unauthorized access based on image encryption/decryption method.

Cite

CITATION STYLE

APA

Mahapatra, P. K., Tripathy, A. R., Tripathy, A., & Mishra, B. (2020). Security Model for Preserving Privacy of Image in Cloud. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 37, pp. 247–256). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-0978-0_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free