Internet and digital technology is growing at fast pace. So, it is very important to secure the data transmission over clouds. Multimedia content has become very important in today’s era e.g. in online transferring, video conferencing. As for now multimedia cloud computing is one of the emerging trend over internet. But still to store the data with high security has become very crucial. So this paper will review multimedia cloud computing basic as well as some commonly used encryption/ decryption algorithms in the field of multimedia cloud computing.
Raman Kumar and Arvind Kumar, \"A New Proposed Model for Secure E-Business Intelligence System\", National Conference on Modern Management Practices and Information Technology, DAVIET, Jalandhar, India, 17-18 April, 2009.
Raman Kumar, \"Security Management Issues in Automatic Password Protection Mechanism\", National Conference, 12th PSC, PAU Ludhiana, India, 7-9 February 2009.
Raman Kumar, \"An improved Method of Generating a Threshold Proxy Signature Scheme on a Confidential Message\", National Conference, 12th PSC, PAU Ludhiana, India, 7-9 February 2009.
Raman Kumar and Harsh Kumar Verma, \"The Wireless Application Software Platform\", AICTE sponsored National Seminar on “Enterprise Information Systems”, Apeejay, India, 24 May, 2008.
Raman Kumar, \"Power Conservation in Wireless Networks: Cross Layered Approach\", Magazine, GNDU, India, 2007.
Raman Kumar, Arjun Sahni and Divanshu Marwah , \"Real Time Big Data Analytics Dependence on Network Monitoring Solution using Tensor Networks and its Decomposition\", International Conference on Modelling, Simulation and Optimizing Techniques, ICMSOT-2015, DAV College, Jalandhar, India, 12-14 February, 2015
Raman Kumar and Navneet Kaur , \"Restorable Routing Algorithm in Optical Networks by Reducing Blocking Probability\", IEEE Recent Advances in Engineering and Computational Sciences, RAECS 2014, UIET, PU, Chandigarh, India, 6-8 March, 2014.
Raman Kumar and Nonika Singla, \"Cryptanalysis of Improved CCH2 Proxy Multi-Signature Scheme\", 7th International Conference on Advanced Computing and Communication Technologies, ICACCT 2013, APIITD SD, India, ISBN 978-93-83083-38-1, 267-275, 16 November, 2013.
Raman Kumar and Manjinder Singh Kahlon, \"Ethical Issues for Scientists and Engineers\", AICTE and DST Government of India sponsored International Conference on Advancements in Computing and Communication, ICACC, BBSBEC, Fatehgarh Sahib, India, ISBN 978-81-920451, 422-426, 23-25 February, 2012.
Raman Kumar, Manjinder Singh Kahlon and Amit Kalra, \"A Secure Authentication System- Using Enhanced Serpent Technique\", AICTE and DST Government of India sponsored International Conference on Advancements in Computing and Communication, ICACC, BBSBEC, Fatehgarh Sahib, India, 409-415, 23-25, February 2012.
Raman Kumar, \"Ethical Issues for Scientists and Engineers: Using Cyber Laws and Information Security Techniques\", International Conference on Challenges of Globalization & Strategy for Competitiveness, ICCGC, India, ISBN 978-81-920451-2-2, 287-294, 14-15 January 2011.
Raman Kumar, \"Organization of CHORD Peer-To-Peer Overlay: Using Self Organizing Approach\", International Conference on Industrial Competitiveness, GGI, India, 10 April, 2010.
Raman Kumar and Rajesh Kochher, \"Motivational Aspects of Information Security Metrics in an Organization\", International Conference on Industrial Competitiveness, GGI, India, 10 April, 2010.
Raman Kumar and Harsh Kumar Verma, \"An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for known Signers\", IEEE 2nd International Advance Computing Conference, TU, India, 19-20 February 2010.
Raman Kumar, \"Electronic Information Security Paradigm: Using Security Engineering Strategies and Cryptography Techniques\", International Conference on Computing Updates and Trends, JIM, India, 6 February, 2009.
Harsh Kumar Verma, Kamalpreet Kaur and Raman Kumar, \"A Comparison of Threshold Proxy Signature Scheme\", The 2008 International Conference on Security and Management, USA, 14-17 July, 2008.
Raman Kumar, Arjun Sahni and Divanshu Marwah , \"Real Time Big Data Analytics Dependence on Network Monitoring Solutions using Tensor Networks and its Decomposition\", Network and Complex Systems International Institute for Science Technology and Education-International Knowledge Sharing Platform: ISSN (Paper)2224-610X ISSN (Online)2225-0603, Vol. 5, No. 2, pp. 30-38, 2015.
Navneet Kaur, Manjinder Singh Kahlon and Raman Kumar, \"AN IMPROVED DETERMINISTIC HEER PROTOCOL FOR HETEROGENEOUS REACTIVE WSNS – USING NETWORK LIFETIME AND STABILITY PERIOD\", International Journal of Scientific & Engineering Research, IJSER, Vol. 5, Issue 9, pp. 650-655, September 2014.
Raman Kumar and Manjinder Singh Kahlon, \"Power, Bandwidth and Distance Optimization in WMAN - Using Cross Layer Approach\", International Journal of Computer Science and Technology, IJCST, Vol. 5, Issue 4, Ver. 4, pp. 144-147, Oct-Dec, 2014.
Raman Kumar, Harsh Kumar Verma and Renu Dhir, \"Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers\", Wireless Personal Communications – An International Journal - Springer ISSN: 0929-6212 (Print) 1572-834X (Online), Volume 80, Issue 3 (2015), Page 1281-1345.
Divya Jyoti and Raman Kumar, \"Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme\", International Journal of Computer Applications - IJCA (0975-8887), Vol. 101, No.8, pp. 28-33, September 2014.
Navneet Kaur and Raman Kumar, \"Design of Restorable Routing Algorithm in Optical Networks\", International Journal of Computer Applications - IJCA (0975-8887), Vol. 91, No.2, pp. 39-45, April 2014.
Divya Jyoti and Raman Kumar, \"Review of Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme\", International Journal of Electrical, Electronics and Computer Engineering, Vol. 3, No.1, pp. 218-222, June 2014.
Raman Kumar and Nonika Singla, \"Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme\", Mathematical Problems in Engineering, Vol. 2014, Article ID 429271, 13 pages, 2014.
Raman Kumar, \"Security Analysis and Implementation of an Improved CCH2 Proxy Multi-Signature Scheme\", International Journal of Computer Network and Information Security, IJCNIS, Hong Kong, Vol. 6, No. 4, pp. 46-54, March 2014.
Navneet Kaur and Raman Kumar, \"Review of Restorable Routing Algorithm in Optical Networks\", International Journal of Computer Applications - IJCA (0975-8887), Vol. 83, No. 13, pp. 23-27, December 2013.
Anshu Sharma and Raman Kumar, \"Analysis and Design of an Algorithm Using Data Mining Techniques for Matching and Predicting Crime\", International Journal of Computer Science and Technology, IJCST, Vol. 4, Issue 2, Ver. 4, pp. 670-674, April-June, 2013.
Ashwani Malhotra and Raman Kumar, \"Performance and Security Analysis of Improved Hsu et. al
Anshu Sharma and Raman Kumar, \"The obligatory of an Algorithm for Matching and Predicting Crime - Using Data Mining Techniques\", International Journal of Computer Science and Technology, IJCST, Vol. 4, Issue 2, Ver. 2, pp. 289-292, April - June, 2013.
Raman Kumar and Anil Gupta, \"Comparative Study of Various Image Restoration Techniques in the Basis of Image Quality Assessment Parameters\", International Journal of Computer Science and Technology, IJCST, Vol. 4, Issue 2, Ver. 2, pp. 274-279, April - June, 2013.
Ashwani Malhotra and Raman Kumar, \"The Comparison of Various Multi Proxy Multi Signature Schemes with Shared Verification\", International Journal of Computer Science and Technology, IJCST, Vol. 4, Issue 1, Ver. 4, pp. 633-637, April 4, 2013.
Raman Kumar, Harsh Kumar Verma and Renu Dhir, \"Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers\", Mathematical Problems in Engineering, Vol. 2013, Article ID 790257, 24 pages, 2013.
Anil Gupta and Raman Kumar, \"Design and Analysis of an algorithm for Image Deblurring using Bilateral Filer\", International Journal of Science and Emerging Trends with latest Trends, IJSETT, Vol. 5, No. 1, pp. 28-34, 2013.
Jaskanwal Minhas and Raman Kumar, \"Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries\", International Journal of Computer Network and Information Security, IJCNIS, Hong Kong, Vol. 5, No. 2, pp. 1-9, 2013.
Raman Kumar, Harsh Kumar Verma and Renu Dhir, \"Security Analysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers\", International Journal of Computer Network and Information Security, IJCNIS, Hong Kong, Vol. 4, No. 9, pp. 63-76, 2012.
Jaskanwal Minhas and Raman Kumar, \"An analysis on Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries\", International Journal of Science and Emerging Trends with latest Trends, IJSETT, Vol. 3, No. 1, pp. 46-53, 2012.
Raman Kumar and Rajesh Kochher, \"Information Technology Empowers by Women\", International Journal of Science and Emerging Trends with latest Trends, IJSETT, Vol. 1, No. 1, pp. 1-5, June 2011.
Raman Kumar, Naman Kumar and Neetika Vats, \"Protecting the Content - Using Digest Authentication System and Other Techniques\", International Journal of Computer Science and Information Security, IJCSIS, Vol. 9, No. 8, pp. 76-85, August 2011.
Raman Kumar, Roma Jindal, Abhinav Gupta, Sagar Bhalla and Harshit Arora, \"A Secure Authentication System - Using Enhanced One Time Pad Technique\", International Journal of Computer Science and Network Security, IJCSNS, Vol. 11, No. 2, pp. 11-17, February 2011.
Raman Kumar, Saumya Singla, Sagar Bhalla and Harshit Arora, \"Optimization of work flow execution in ETL using Secure Genetic Algorithm\", International Journal of Computer Science and Information Security, IJCSIS, Vol. 8, No. 8, pp. 213-222, November 2010.
Raman Kumar and Harsh Kumar Verma, \"Secure Threshold Proxy Signature Scheme Based on RSA for Known Signers\", Journal of Information Assurance and Security, JIAS, Vol. 5, Issue 1,pp. 319-326, 2010.
Raman Kumar, Asmita Puri, Vivek Gautam and Saumya Singla, \"An Image Based Authentication System - Using Needham Schroeder Protocol\", International Journal of Computer Science and Network Security, IJCSNS, Vol. 10, No. 11, pp. 135-140, November 2010.
Harsh Kumar Verma, Ramanpreet Kaur and Raman Kumar, \"Random of the Audio Watermarking Algorithm for Compressed Wave Files\", International Journal of Computer Science and Network Security, IJCSNS\", Vol. 9, No. 11, pp. 283-287, 2009.
Harsh Kumar Verma, Abhishek Narain Singh and Raman Kumar, \"Robustness of the Digital Watermarking Techniques against Brightness and Rotation Attack\", International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 36-40, 2009.
Raman Kumar, \"A New Break-Flow Technique for Encryption and Decryption of JPG/BMP/DIB Images\", International Journal of Secure Digital Information Age, IJSDIA, Vol. I No. II, 2009.
Min Chen, “AMVSC: A Framework of Adaptive Mobile Video Streaming in the Cloud,” Proc. IEEE GLOBECOM, Anaheim, CA, Dec. 2012, pp. 1–6.
Raman Kumar and Harsh Kumar Verma, \"A Channel Analysis in Network Security - Using a Covert Approach\", International Journal on Information Sciences and Computing, IJSAC, Vol. 2, Issue 1, 2008.
W. Yu et al., “Muse: A Multimedia Streaming Enabled Remote Interactivity System for Mobile Devices,” Proc. ACM MUM’11, Beijing, China, Dec. 2011, pp. 216–25.
H. Li and X. Hua, “Melog — Mobile Experience Sharing Through Automatic Multimedia Blogging,” Proc. ACM MCMC’10, Firenze, Italy, Oct. 2010, pp. 19–24.
J. Oberheide et al., “Virtualized in-Cloud Security Services for Mobile Devices,” 1st Wksp. Virtualization in Mobile Computing, Breckenridge, CO, June 2008, pp. 31–35.
L. Zhou, and H. Wang, “Toward Blind Scheduling in Mobile Media Cloud: Fairness, Simplicity, and Asymptotic Optimality,” to appear in IEEE Trans. Multimedia.
S.Wang, Y. Liu and S. Dey, “Wireless Network Aware Cloud Scheduler for Scalable Cloud Mobile Gaming,” Proc. IEEE ICC’12, Ottawa, Canada, Jun. 2012, pp. 2081–86.
S. Wang and S. Dey, “Addressing Response Time and Video Quality in Remote Server based Internet Mobile Gaming,” Proc. IEEE WCNC’10, Sydney, Australia, Mar.2010, pp. 1–6.
S. Wang and S. Dey, “Rendering Adaptation to Address Communication and Computation Constraints in Cloud Mobile Gaming,” Proc. IEEE GLOBECOM’10, Miami, FL, Dec. 2010, pp. 1–7.
S. Wang and S. Dey, “Modeling and Characterizing User Experience in A Cloud Server based Mobile Gaming Approach,” Proc. IEEE GLOBECOM’09, Honolulu, HI, Nov.-Dec. 2009, pp. 1–7.
E. Cuervo et al., “MAUI: Making Smartphones Last Longer with Code Offload,” Proc. AMC MobiSys’10, San Francisco, CA, June 2010, pp. 49–62.
Y. Wen, G. Zhang, and X. Zhu, “Lightweight Packet Scheduling Algorithms for Content Uploading from Mobile Devices to Media Cloud,” Proc. IEEE GLOBECOM’ 11 Wksps., Houston, TX, Dec. 2011, pp. 45–50.
B. Aggarwal, N. Spring, and A. Schulman, “Stratus: Energy-Efficient Mobile Communication Using Cloud Support,” Proc. ACM SIGCOMM’10, New Delhi, India, Aug.-Sep. 2010, pp. 477–78.
Raman Kumar, Harsh Kumar Verma, Renu Dhir and Pankaj Yadav, \"Information Security Vulnerability Issues in Intrusion Detection Systems\", National Conference on Education & Research, JUIT, M.P., India, 6-7 March 2010.
Raman Kumar, \"The Lifecycle of Secure Application Development in a Business Environment\", National Conference on Business Innovation, Apeejay, India, 27 February 2010.
Raman Kumar, \"Cyber Laws: Ethical Issues for Scientists and Engineers\", Magazine, DAVIET, India, 2010.
Raman Kumar and Amit Kalra, \"India: Needs to Focus on the Security Engineering Strategies and Cryptographic Techniques\", National Conference on “Innovations: A way to keep ahead, JIM, 17 April, 2010.
Raman Kumar and Amit Kalra, \"Role of Dynamic Learning in Establishment of Efficient Education System\", National Conference, KC Institutions, Nawanshahr, India, 20 April, 2010.
Raman Kumar and Rajesh Kochher, \"Empowerment of women through Information Technology\", National Conference on Role of Women in I.T - Today and Tomorrow, SD, India, 12 October, 2010.
Raman Kumar and Amit Kalra, \"A Survey on Sustainability Performance of Technology Sector: Using Green Engineering and Technology\", National Seminar on Green Technology: Opportunities and Challenges, KC Institutions, Nawanshahr, India, 8-9 April, 2011.
Multimedia Cloud Computing, Text, Audio, Video, Images, Security, Cloud.