Symmetric Hash Encryption Image as Key (SHEIK)
Sheik Khadar Ahmad Mnoj1, D.Lalitha Bhaskari2

1Sheik Khadar Ahmad Mnoj, Research Scholar, Department of Computer Science and Systems Engineering, College of Engineering, Andhra University, Visakhapatnam, India.
2D Lalitha Bhaskari, Professor, partment, Department of Computer Science and Systems Engineering, College of Engineering, Andhra University, Visakhapatnam, India.
Manuscript received on March 12, 2020. | Revised Manuscript received on March 25, 2020. | Manuscript published on March 30, 2020. | PP: 3181-3185 | Volume-8 Issue-6, March 2020. | Retrieval Number: D4420118419/2020©BEIESP | DOI: 10.35940/ijrte.D4420.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud storage model have become a widely accepted solution for the growing demand of online storage and remote accessing. Cloud service provider (CSP) provides the online storage facility for the cloud customer (CC) as per pay-by-use model. Data security still remains a threat for the CC to have a complete trust on the technology. The existing symmetric key algorithms to some extent have been successful in providing the confidentiality of the data. The main issue in implementing the algorithm is sharing of the key, if the key is known to others the security of the data is exploited. This paper tries to sort out the problem by making image as a key for the algorithm. The CC can perform the encryption before uploading the data to have the control of the process. The selection of the algorithm decides the key length to be extracted from the image making the method more secure and reliable for the CC. The experimental results have shown that the proposed Symmetric Hash Encryption Image as Key(SHEIK) method works satisfactorily for encrypting and decrypting the data efficiently.
Keywords: Cloud storage, Cloud customer (CC), Cloud service provider (CSP), Data security, Encryption algorithms, Key sharing.
Scope of the Article: Cloud Computing.