An Intelligent Multimedia Data Encryption and Compression and Secure Data Transmission of Public Cloud

Authors

  • Sheik Saidhbi Assistant Professor, Department of Information Systems, Faculty of Informatics, University of Gondar, Ethiopia

DOI:

https://doi.org/10.51983/ajeat-2019.8.2.1141

Keywords:

Encryption, Compression, Data Security, ECB

Abstract

Data compression is a method of reducing the size of the data file so that the file should take less disk space for storage. Compression of a file depends upon encoding of file. In lossless data compression algorithm there is no data loss while compressing a file, therefore confidential data can be reproduce if it is compressed using lossless data compression. Compression reduces the redundancy and if a compressed file is encrypted it is having a better security and faster transfer rate across the network than encrypting and transferring uncompressed file. Most of the computer applications related to health are not secure and these applications exchange lot of confidential health data having different file formats like HL7, DICOM images and other audio, image, textual and video data formats etc. These types of confidential data need to be transmitted securely and stored efficiently. Therefore this paper proposes a learning compression- encryption model for identifying the files that should be compressed before encrypting and the files that should be encrypted without compressing them.

References

A. L. Jeeva, V. Palanisamy, and K. Kanagaram, "Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms," International Journal of Engineering Research and Applications (IJERA), vol. 2, no. 3, pp. 3033-3037, May-Jun 2012.

S. Soni, H. Agrawal, and M. Sharma, "Analysis and Comparison Between AES and DES Cryptographic Algorithm," International Journal of Engineering and Innovative Technology, vol. 2, no. 6, pp. 362-365, Dec. 2012.

N. Singhal and J. P. S. Raina, "Comparative Analysis of AES and RC4 Algorithms for Better Utilization," International Journal of Computer Trends and Technology, vol. 2, no. 6, pp. 177-181, July-Aug 2011.

J. Thakur and N. Kumar, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis," International Journal of Emerging Technology and Advanced Engineering, vol. 1, no. 2, pp. 6-12, Dec. 2011.

A. Mousa and A. Hamad, "Evaluation of the RC4 Algorithm for Data Encryption," International Journal of Computer Science & Applications, vol. 3, no. 2, pp. 44-56, June 2006.

A. Nadeem and M. Y. Javed, "A Performance Comparison of Data Encryption Algorithms," in First International Conference on IEEE Information and Communication Technologies (ICICT), pp. 84-89, 27-28 Aug. 2005.

N. A. Kofahi, T. Al-Somani, and K. Al-Zamil, "Performance Evaluation of Three Encryption/Decryption Algorithms," in IEEE 46th Midwest Symposium on Circuits and Systems, pp. 790-793, 30-30 Dec. 2003.

J. Knudsen, Java Cryptography, 2nd ed., O’Reilly, 2011.

W. Stallings, Cryptography and Network Security, 5th ed., Pearson, 2012.

O. S. Pianykh, Digital Imaging and Communications in Medicine (DICOM), 1st ed., Springer, 2008.

J. Miano, Compressed Image File Formats, 1st ed., Addison Wesley Longman, Inc, 1999.

A. Kahate, Cryptography and Network Security, 2nd ed., Tata McGraw Hill, 2012.

V. K. Pachgare, Cryptography and Information Security, 1st ed., PHI Learning PVT LTD, 2008.

M. Dworkin, "NIST Special Publication 800-38A. Recommendation for Block Cipher Modes of Operation: Modes and Techniques," Dec. 2001.

S. P. Singh and R. Maini, "Comparison of Data Encryption Algorithms," International Journal of Computer Science and Communication (IJCSC), vol. 2, no. 1, pp. 125-127, January-June 2011.

L. Singh and R. K. Bharti, "Comparative Performance Analysis of Cryptographic Algorithms," International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), vol. 3, no. 11, pp. 563-568, November 2013.

Downloads

Published

10-05-2019

How to Cite

Saidhbi, S. (2019). An Intelligent Multimedia Data Encryption and Compression and Secure Data Transmission of Public Cloud. Asian Journal of Engineering and Applied Technology, 8(2), 37–40. https://doi.org/10.51983/ajeat-2019.8.2.1141