Enhanced Framework for Ensuring Privacy Preserving Image Retrieval in Cloud
Jitendra Kumar Gothwal1, Kunam Subba Reddy2

1Jitendra Kumar Gothwal1 ,Professor, Computer Science & Engineering Department, Rajeev Gandhi Memorial College of Engineering & Technology (Autonomous) , Andhra Pradesh, India.
2Kunam Subba Reddy Professor, Computer Science & Engineering Department, Rajeev Gandhi Memorial College of Engineering & Technology (Autonomous), Andhra Pradesh, India.

Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 2127-2132 | Volume-8 Issue-12, October 2019. | Retrieval Number: L33041081219/2019©BEIESP | DOI: 10.35940/ijitee.L3304.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Large scale of images data sets are being produced every day by various digital devices. Due to huge computational jobs make people seizure to cloud platforms for their efficient & economical reckoning resources. These computing platforms in which assets are provided as services of the internet. Sensitive information stored in cloud makes more challenging in data security and access control. Once data is uploaded to cloud-platform, the privacy and security of image-data fully depend and believe upon cloud service provider honesty. Our proposed work deals with securing image where high protections are applied on multimedia contents. This paper deals with studies security challenges algorithms lies in image at the time of constructing cloud platform. In this a new enhanced security technique investigated, includes secure by using computation and encryption, act as a security information guard for high secrecy in cloud platform data storage areas. In our research work, cipher-text image is created and performing encryption-decryption at User level. Data hiding and ECC (Elliptic curve cryptosystem) based watermarking technique at cloud computing platform.
Keywords: Cloud, Internet, Privacy and Security, Encryption, Decryption, Elliptic Curve Cryptosystem, Watermarking
Scope of the Article: Patterns and Frameworks