IDEAS home Printed from https://ideas.repec.org/a/igg/jcac00/v7y2017i2p27-40.html
   My bibliography  Save this article

Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment

Author

Listed:
  • Mouhib Ibtihal

    (MoulaySmail University, Faculty of Science, Meknes, Morocco)

  • El Ouadghiri Driss

    (MoulaySmail University, Faculty of Science, Meknes, Morocco)

  • Naanani Hassan

    (Ben'msik University, Faculty of Science, Casablanca, Morocco)

Abstract

The integration of cloud computing with mobile computing and internet has given birth to mobile cloud computing. This technology offers many advantages to users, like Storage capacity, Reliability, Scalability and Real time data availability. Therefore, it is s increasing fast and it is inevitably integrated into everyday life. In MCC, data processing and data storage can be migrated into the cloud servers. However, the confidentiality of images and data is most important in today's environment. In this paper, we mainly focus on secure outsourcing of images. For this purpose, we propose a secure architecture composed by two clouds a private cloud dedicated for encryption/decryption and a second public cloud dedicated for storage. We have implemented the first cloud using openstack while respecting the encryption as a service concept. As an encryption scheme, we have used paillier's homomorphic cryptosystem designed specifically for images. The test of the homomorphic property is done by applying the Watermarking algorithm DWT.

Suggested Citation

  • Mouhib Ibtihal & El Ouadghiri Driss & Naanani Hassan, 2017. "Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment," International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 7(2), pages 27-40, April.
  • Handle: RePEc:igg:jcac00:v:7:y:2017:i:2:p:27-40
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCAC.2017040103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jcac00:v:7:y:2017:i:2:p:27-40. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.