Innovations in computing and with the increased popularity and usage of multimedia content, has added the new dimension to the ways of distribution storage and delivery of multimedia content across the internet. So the demand for secured data storage and transmission techniques across the internet has increased. Now since the cloud computing is practically possible and stake holders are looking the best possible ways to secure access to the shared resource pool and for that every loop hole is being looked in by the researcher’s and possible solutions suggested. In this paper we have also tried to suggest a solution and created architecture for possible secured storage and distribution of multimedia content across the different content delivery networks .The architecture suggested has not only efficient hybrid encryption system but also focused on the ways of accessing the content and controlled utilization of bandwidth available to the end user. The hybrid of Blowfish and RSA algorithms applied and then optimized and classified the encrypted data, then stored on the available database, windows azure database used here. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results of performance parameters are obtained through the use of MATLAB 7.10.0.The real time architecture developed and implemented in Microsoft .net platform with azure database as backend.
Prof.Radha.S.Shirbhate,2Anushree A.Yerawar, 3Ankur M. Hingane,” Features Preserving Data Encryption Used to Secure Multimedia Data”, International Journal of Emerging Technology and Advanced Engineering Volume 2, Issue .1, January 2012.
K. Kalaivani and B. R. Sivakumar “Survey on Multimedia Data Security”, JMO 2012 Vol.2(1): 36/41ISSN:2010-3697,DOI:10.7763/IJMO.2011. V1.82
A.Francia III, M. Yang, and M. Trifas “Applied Image.Processing to Multimedia Information Security,” IEEE, 2009.
B. Furht, D. Socek, and A. M. Eskicioglu, “Fundamentals ofMultimedia Encryption Techniques,” CRC Press, 2004.
C.-P. Wu and C.-C. J. Kuo, “Fast Encryption Methods for AudiovisualData Confidentiality,” SPIE International Symposia on InformationTechnologies 2000, Boston, MA, pp. 284-295, 2002.
A. Servetti and J. C. De Martin, “Perception Based Partial Encryptionof Compressed Speech,” IEEE Transaction on Speech and AudioProcessing, vol. 1, no. 8, 2002.
N. J. Thorwirth, P. Horvatic, R. Weis and J. Zhao ,” Security methods for MP3 music delivery,” Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers, vol. 2, pp 1831-1835,2000.
S. Lian, D. Kanellopoulos, and G. Ruffo, “Recent Advances in Multimedia Information b System Security,” Informatica, Vol. 33,pp. 3-24, 2009.
N. Kulkarni, B. Raman, and I. Gupta, “Multimedia Encryption: A Brief Overview,” SCI 231, pp. 417-449, 2009.
Kalaivani, K., and B. Sivakumar. \"Survey on multimedia data security.\"International Journal of Modeling and Optimization 2.1 (2012): 36-41.
Kawle, Pravin, et al. \"Modified Advanced Encryption Standard.\", International Journal of Soft Computing and Engineering, Volume-4, Issue-1, March 2014.
Wolfgang, Raymond B., and Edward J. Delp III. \"Overview of image security techniques with applications in multimedia systems.\" Voice, Video, and Data Communications. International Society for Optics and Photonics, 1998.
LI, Baoping, and Yan WANG. \"Analysis of the Advantages and Disadvantages of Multimedia Teaching in Colleges.\",2010.
Adjeroh, Donald A., and Kingsley C. Nwosu. \"Multimedia database management—requirements and issues.\" IEEE multimedia 4.3 (1997): 24-33.
Biswas, Rajorshi, ShibdasBandyopadhyay, and Anirban Banerjee. \"A fast implementation of the RSA algorithm using the GNU MP library.\" IIIT–Calcutta, National workshop on cryptography. 2003.
Xu, Dingbang, and PengNing. \"Privacy-preserving alert correlation: a concept hierarchy based approach.\" Computer Security Applications Conference, 21st Annual.2013.
Singh, Ajit, and Swati Malik. \"Securing Data by Using Cryptography with Steganography.\" International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) ISSN 2277 (2013).
Shamily, P. Bindhu, and S. Durga. \"A Review on Multimedia Cloud Computing, its Advantages and Challenges.\" International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1.10 (2012): pp-130.
Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. (2009, Feb. 10). Above the clouds: A Berkeley view of cloud computing. EECS Dept., Univ. California, Berkeley, No. UCB/EECS-2009-28 [Online]. Available:
R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities,” in Proc. 10th IEEE Int. Conf. High Performance Computing and Communications, 2008, pp. 5–13.
B. Aljaber, T. Jacobs, K. Nadiminti, and R. Buyya, “Multimedia on global grids: A case study in distributed ray tracing,” Malays. J. Comput. Sci., vol. 20, no. 1, pp. 1–11, June 2007.
J. Nieh and S. J. Yang, “Measuring the multimedia performance of server based computing,” in Proc. 10th Int. Workshop on Network and Operating System Support for Digital Audio and Video, 2000, pp. 55–64.
Wenwu Zhu, Chong Luo, Jianfeng Wang, and Shipeng Li; “Multimedia Cloud Computing” Digital Object Identifier 10.1109/MSP.2011.940269 Date of publication: 19 April 2011.
Jiann-Liang Chen, Szu-Lin Wu, Yanuarius Teofilus Larosa, Pei-Jia Yang, and Yang-Fang Li; “IMS Cloud Computing Architecture for High-Quality Multimedia Applications” 978-1-4577-9538-2/11/$26.00 ©2011 IEEE.
Li Li, Xiong Li, Sun Youxia, and Liu Wen; “Research On Mobile Multimedia Broadcasting Service Integration Based On Cloud Computing”.
Tamleek Ali, Mohammad Nauman , Fazl-e-Hadi ,and Fahad bin Muhaya; “On Usage Control of Multimedia Content in and through Cloud Computing Paradigm”.
Hang Yuan, C.-C. Jay Kuo and Ishfaq Ahmad; “Energy Efficiency in Data Centers and Cloud-Based Multimedia Services: An Overview and Future Directions” 978-1-4244-7614-5/10/$26.00 ©2010 IEEE.
Zhang Mian, Zhang Nong; “The Study of Multimedia Data Model Technology Based on Cloud Computing”; 2010 2nd International Conference on Signal Processing Systems (ICSPS).
Chun-Ting Huang, Zhongyuan Qin, C.-C. Jay Kuo; “Multimedia Storage Security in Cloud Computing: An Overview”.
Neha Jain and Gurpreet Kaur; “Implementing DES Algorithm in Cloud for Data Security” VSRD-IJCSIT, Vol. 2 (4), 2012, 316-321
Pravin Kawle,AvinashHiwase,GautamBagde, antTekam, Rahul Kalbande[3],2014, “Modified Advanced Encryption Standard”- International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-4, Issue-1, March 2014
Vani. N, Sreelatha P.K, Parvathy.S, Sridevi Malipatil,” A NOVEL VSR ALGORITHM FOR NETWORK SECURITY OPTIMIZATION”,Volume 2 :: Issue 2 :: IJRAET
Rongxing et al, ―Secure Provenance: The Essential Bread and Butter of Data Forensics in Cloud Computing‖, ASIACCS„10, Beijing, China.
R. La„Quata Sumter, ―Cloud Computing: Security Risk Classification‖, ACMSE 2010, Oxford, USA
Mladen A. Vouch, “Cloud Computing Issues, Research and Implementations”, Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246
Pravin Kawle, Avinash Hiwase, Gautam Bagde, Ekant Tekam, Rahul Kalbande “Modified Advanced Encryption Standard “- ISSN: 2231-2307, Volume-4, Issue-1, March 2014 ,
Wenchao Zhou[ Micah Sherr William R. Marczak] Z “Towards a Data-centric View of Cloud Security”
Soren Bleikertz et al, “Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds”, CCSW 2010, Chicago, USA.
Flavio Lombardi, Roberto Di Pietro “Transparent Security for Cloud”
Wayne A. Jansen, _Cloud Hooks: Security and Privacy Issues in Cloud Computing_, 44th Hawaii,International Conference on System Sciesnces 2011.
Jinpeng et al, ―Managing Security of Virtual Machine Images in a Cloud Environment‖, CCSW, 2009, Chicago, USA
Dan Lin & Anna Squicciarini, ―Data Protection Models for Service Provisioning in the Cloud‖, SACMAT‘10, 2010, Pittsburgh, Pennsylvania, USA
Xiaoming Bao, Rongshan Yu Institute for Infocomm Research, A*STAR, Singapore. “Streaming of Scalable Multimedia over Content Delivery Cloud”
RSA, Blowfish, Authentication, Multimedia, Cloud computing, Buffer Management. CDNs