Abstract
Cloud has become one of the most demanding services for data storage. On another hand, the security of data is one of the challenging tasks for Cloud Service Provider (CSP). Cryptography is one of the ways for securing the storage data. Cryptography is not a new approach instead of the efficient utilization of cryptographical algorithms is greatly needed. In this work, we proposed a Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption. The SHL is consisting of two major modules (i) Key Management Server (KMS) and (ii) Share Holder Server (SHS) which is used for storing and sharing of cryptographic key. For this purpose, we proposed a server-side encryption algorithm, which is based on the asymmetric algorithm (RSA and CRT) for providing end-to-end security of multimedia data. The experimental results of text and video are evidence that the size of file is not much affected after the encryption and effectively stored at Cloud Storage Server (CSS). The parameters like ciphertext size, encryption time and throughput are considered for performance evaluation of the proposed encryption technique.
Keywords
Introduction
In the era of multitasking, cloud services have become billion-dollar businesses for any industrialist. Millions of people are using the cloud services in their portable devices (like, laptops, palmtops, or even though any type of electronic gadgets) which has the accessibility of the internet. The biggest advantage of cloud storage is to provide services at a very economical cost. So, the users are very much attracted towards cloud services, to store their large amount of sensitive data (like, images, videos, documents, login password, bank details, and much more personal information); the primary concern for storage data is security. The cloud storage ownership is not present in a single location but it is distributed in different territories. Cryptography is one of the possible ways to make sure that our data is completely secured before sharing it with cloud storage. In the year 2017 [8], Forbes conducted a survey on data security and they found that 80% of the budget in IT industries was allocated for cloud infrastructure and from that 49% of business was not established due to some issues in infrastructures. So, for setup better cloud services we have focused on three properties; (i) Better Resources, (ii) Trained people who can handle the data, and (iii) Better management team who can provide solutions in financial crises
Above all of these, there is a minor issue regarding the security of multimedia which is addressed as: Access Control of data. Agreement monitoring between user and service provider. Data storage problems. Security and Reliability of the data. Technical support against complaints.
For a better understanding of cloud infrastructure, threats, and risks problems it is important to study the cloud architecture.
National institute of standards and technology (NIST) architecture cloud
The cloud services are divided into three major sub-section [32]: (i) Software-as-a-Service (SaaS), (ii) Platform-as-a-Service (PaaS), and (iii) Infrastructure-as-a-Service (IaaS). The topmost layer of cloud services is SaaS which provides tools and software services at free of cost or require some monthly subscription. Some of the examples of SaaS service are Google play store, ZBIGZ torrent client service, Salesforce, Microsoft office suite, etc. which are used by consumers in day-to-day life. The middle layer of cloud service is PaaS which provides accessibility to the developers. Users rent the hardware support from IaaS, and then they deploy their applications and tools; which is distributed within the cloud user community. There are several IaaS service providers like; Amazon EC2, Ruby, and MySQL, etc. There are very few companies that provide the IaaS infrastructure like; Google Compute Engine, Amazon AWS, and Microsoft Azure, etc. According to NIST [6], the services of cloud is depend five different Actors witch are responsible for the security of cloud resources which is cited in Table 1.
Actors used in Cloud Architecture
Actors used in Cloud Architecture
Cloud services provide numerous amount of supports for business, commercial, and governmental bodies. The advantages cloud services are: To set up the small business firm at a cheap subscription cost. It provides instant access to all the resources. It creates an independent environment for innovations. Ease of service for all users. Deployment of tools and application at a cheap cost.
There are various cryptographic algorithms are presented for encryption and decryption. But none of them provides 100% data security. In the year 1977, the MIT lab was first developed the asymmetric key algorithm named as RSA cryptosystem. In the year 1978, the three major computer scientists Ron Rivest, Adi Shamir, and Leonard Adleman has first described the RSA algorithm publically [1]. The major key factor of the algorithm is; it uses pairs of key. The first key is known as public key (K public ) which is used for encryption and second is the private key (K private ) which is used for decryption. RSA cryptosystem is adopted for various protocols like Secure Shell (SSH), Pretty Good Privacy (PGP), Secure Multipurpose Internet Mail Extensions (S/MIME), and Secure Sockets Layer (SSL). RSA works on the Euclidean algorithm; which uses two large prime numbers of size (512, 1024, or 2048 bits) for the computation of encryption key. The complexity of Euclidean algorithm is about O(log (N) 2). For fast encryption of data; the symmetric key cryptosystem is more suitable for data security. In the year 1970, the IBM lab was first presented the DES algorithm in front of the National Bureau of Standards (NBS). Later on, in year 1976, the National Security Agency (NSA) was first tested the strength of DES algorithm. The complexity of data encryption using DES is O(1) or O(m) [3]. In the year 1997, the National Institute of Standards and Technology (NIST) was developed the AES algorithm at an alternative of the DES algorithm [2]. Before moving further, there are several open issues of cloud resource security.
Open issues of cloud resources and data center
Cloud resource organization is one of the challenging aspects for personnel. The issues like Byzantine failure which caused by unpredictable failure of storage server. The Byzantine failure will not sustenance the security of data in the form of data integrity, confidentiality, or availability but it copes with the problems like increase of data intrusion with the help of malicious software or malicious insider attack [7]. Cloud is the enormous arena for technological application and commercial data. Due to the collection of different fields of information in a single cloud space, it always gives an invitation to the adversary. Here, we have discussed some of the problems: All the technology is listed in the public domain: Due to the accessibility of cloud services, the possibility of single-point attacks is high. The hypervisor or cloud orchestration is an easy target for the adversary. Publically Shared Data: There are various java-scripts that are present on the internet which creates a bridge in-between cloud consumer and service provider to leak the information. Network Traffic Flooding: Services of the cloud are presented on the internet and everyone will use the services but losing the privileged account might lose the services. Denial of Service (DoS): In this, the adversary is taking down the data server by flooding the false request which affects the services and resources of the cloud providers. Malicious Insider: When unauthorized users tracking the cloud scenario and it covers with some different scenarios. Internet Protocol: It is executed at the transport layer to attack the services of consumers. The attacks like Internet Protocol (IP) spoofing, Address Resolution Protocol (ARP) spoofing, and Domain Name Server (DNS) poisoning are known attacks for accessing the consumer data. Injection Vulnerabilities: Adversary injects the Structured Query Language (SQL) command in the database to retrieve the information like (table name, primary key, etc.). This problem is always faced by multiple cloud consumers due to a lack of knowledge. Application Program Interface (API) & Browser: Social engineering is a school level attack, where it uses personal information for website authentication.
Countermeasures for Attacks in Cloud
In a cloud infrastructure, the adversary only attacks three major sections (i) Network, (ii) Hypervisor, and (iii) Hardware. When the cloud system is compromised, the adversary attacks on these three vectors. Table 2 present the countermeasure of different types of attacks.
Countermeasure of different attacks in the cloud
Countermeasure of different attacks in the cloud
Figure 1 represents basic cloud architecture for secure transmission and storage of multimedia. Here, the client uploads the encrypted data to cloud datacenter; and third-party user downloads the encrypted data from the storage server; then it is decrypted by using an encryption algorithm. According to Kaaniche and Laurent [4], encryption plays an important role in data security and privacy. Symmetric and Asymmetric algorithm is used for data security and authentication in the cloud. Traditional algorithms have enriched mathematical and theoretical foundations but still have some flaws in real-time implementation. The motivation of this work is to provide end-to-end data security in cloud environment. After the study, we point out some of the gaps in classical encryption algorithms: Encryption of large size files will result in the expansion of size in cipher form. Encryption time ∝ Length of key size.

The cloud architecture for transmission and storage of multimedia.
These are two major gaps in classical cryptographic algorithms present for almost 40 years. Now, the other issues of data security in the cloud environment are file sharing and storage. The rest of the paper is organized as follows. Sec. 2, presents the background of work followed by Sec. 1. Sec. 3, represent the proposed system model and proposed encryption technique. Sec. 4, deals with the implementation, performance evaluation and security analysis. Sec. 5 provides the conclusion and novelty of the entire work.
This section presents the various researches in the field of multimedia security in the cloud environment, which creates the foundation of our research work. Here, we addressed two current aspects of secure data storage in the cloud. The first aspects are to present the techniques that were used for multimedia security in a cloud environment; and the other aspect shows the limitation of different cryptographic techniques; which creates a necessity for our proposed research work.
The techniques used for multimedia security in the cloud environment
Cloud is the collection of multi-layered platforms, where storage and hardware devices are deeply interconnected with each other and data’s in the cloud are distributed to every end-user which creates the huge concern of privacy and security of data. For secure storage of data Y. Li et al. [24], was proposed Security-Aware Efficient Distributed Storage (SA-EDS) model which divides the data and store separately to the distributed cloud server. The purpose of this process is to obstruct the direct data interaction by the cloud service operator. For the cost-saving and management of data, various companies and organizations use the services of the cloud. L. Ferretti et al. [25], was presented the technique based on the encrypted Bloom filter to detect the unauthorized modifications on outsourced data of companies and protect the confidentiality and integrity of private data. When user share a huge amount of multimedia on the cloud there is always faced an issue of copyright and privacy protection of data. To ensure this problem H. Li et al. [31], was implemented Secure Media Cloud (SMC). The work of SMC is to provide a secure cloud environment, content storage and access control of data. In this, the video files are sliced and stored randomly at different edge servers. They also introduced the Sec-ABAC access control protocol to guarantee access to cloud resources. Multimedia distribution on cloud storage should be kept confidential except for the data owner. To maintain the privacy of outsourced contents L. Xiong et al. [28], was proposed the framework of Multimedia Distribution based Re-encryption and Fingerprinting (MDRF) scheme. The cloud service provider is the semi-trusted service provider and MDRF is used to maintain the privacy and copyright of contents, and it also resolves the problems of content piracy. The cloud services are not only be used by IT companies but it also been used by healthcare professionals. H. A. Al Hamid et al. [27], was presented an electronic medical record (EMR) system for the storage of health care records. EMR stores the huge size of multimedia data such as X-rays, ultrasounds, CT scans, and MRI reports of various patients. To secure EMR data they use a one-round authenticated key agreement protocol. To authenticate the users; and provide access to multimedia data otherwise, it is kept stored in the hidden gallery. M. Morales-Sandoval et al. [26], was proposed hybrid cloud models for end-to-end data storage. It works as a file-sharing application where users upload there data and also control the access of data. The encryption is mainly based on Attribute-Based Encryption (ABE) and short signatures (SSign) to encrypt, decrypt and sign operation on data. Cloud services are very fragile in terms of attacks. R. Shaikh and M. Sasikumar [15], was proposed a security model to measure the trust and compute the strength of security. To validate this model, CSA (Cloud Service Alliance) services are used to measure security and service quality. The mobile cloud computing is low computational devices which increase the overhead of transmission. A. N. Toosi et al. [18], was presented a survey on Cloud Interoperability. They discussed about scalability and resource limitations in the cloud environment, and how energy-saving a vital role plays in technology to move towards the cloud interoperability. The small mobile devices are very capable and remove all the barriers of the network. N. V. Juliadotter and K.-K. R. Choo [20], provides a brief taxonomy of cyber-attacks on the cloud. The CERT statistics are used to find out the motivation of attacks and it also finds the risk assessment scenario to reduce the impact of the attack. A. S. Sendi and M. Cheriet [21], was presented a Fuzzy Multi-Criteria Decision Making (FM-CDM) technique for analyzing customer’s risk in the cloud environment. It is a quantitative risk assessment model to maintain the continuous security of cloud-based on the iterative and incremental approach. N. H. Ab Rahman and K.-K. R. Choo [22], was presented the Conceptual cloud incident handling model for effective handling of the incident in the cloud. The working of the model is based on digital forensics and incident handling to manage the data effectively. Nowadays, mobile data storage in the cloud becomes more operational. Data owners store their data without any privacy and access control concern; Q. Li et al. [30], was proposed the Privacy-Preserving Cloud-assisted Mobile Multimedia (PPCMM) data-sharing scheme. This scheme is mainly based on ciphertext-policy attribute-based encryption (CP-ABE). For encryption and decryption of multimedia, CP-ABE used there attributes like name and value which reveals the access policy of data owner. The access policy does not provide much security at the time of the attack; as resultant end-to-end data security comes into the security frame. M. Shiraz et al. [16], was proposed the Computational Offloading Frameworks (COFs) analyze the resource-intensive nature of data at the time of offloading. The virtual mobile policies are used to measure energy consumption, and computational time is required for the transmission of data. J. Liu et al. [17], was reviewed the issues and challenges of Application Partitioning Algorithms (APAs) in mobile cloud computing. The analysis of APAs is based on the computation ratio and allocation decision of data. M. Alizadeh et al. [19], was presented the survey on various issues of mobile cloud computing in terms of privacy and security. The mobile cloud computing (MCC) authenticate data owner to use the services of cloud storage. Trust and data security arise challenges for the cloud service provider.
The limitation of different cryptographic techniques
Cloud is a vulnerable space where lots of attacks are executed on multimedia. To secure cloud storage cryptographic techniques are applied for encryption before uploading to the cloud storage server. The cryptography technique is mainly based on key management. There are three different types of key management techniques: (i) Symmetric key requires a single key for encryption and decryption, (ii) Asymmetric key requires pair of keys, one for encryption and another for decryption, and (iii) Hashing is technique for conversion of original text into fixed size of hash values. The cryptographer is using these techniques in much-prescribed input selection modes. Encryption algorithm gets the data in two different forms (i) Block cipher and (ii) Stream cipher. In block cipher, the message is divided into sub-blocks. And, each sub-block consist of fixed (b - bit) size for encryption. In a stream cipher, the data is fragmented in a bit of stream for encryption. The cryptographic algorithm intake the raw data in five different modes: Electronic Code Book (ECB): In this, the original message is broken down into a bunch of sub-blocks. Each sub-block consist of (b - bit) of the size which is encrypted with ′K′ key and then send it to the receiver. It is the simplest way for encryption and decryption of raw data. Cipher Block Chaining (CBC): It uses the initialization vector (IV), XOR, and key ′K′ for encryption. The feed of the first block is intake as an input for another block and this process has continued till the end of the encryption. Cipher Feedback Mode (CFM): In this, the ‘S’ significant left bit of the original message is XOR with initialization vector (IV) which is encrypted with key ′K′. The feed of the first block is input to shift register, this process is continued for remaining blocks. Output Feedback Mode (OFM): It creates a bit of keystream for encryption of data. The block is converted into stream cipher for encryption using the initialization vector. Counter (CTR): It uses nonce and counters to encrypt the plaintext with a bit keystream. The nonce value is a one-time unique value for encryption.
Now, every cryptographic technique has certain limitations and drawbacks which will affect the encryption process. Encryption is used to provide the complete security of data. O. Arki et al. [29], was proposed the multi-agent framework for remote storage and provide the integrity and confidentiality of data. Here, they use the client-side encryption method based on a hybrid combination of (AES + RSA) algorithm. Meyers and Desoky [9] was proposed blowfish and XOR technique for the encryption of multimedia (like Text (txt), Rich text format (RTF), Window media audio (WMA), Window media video (WMV), and Zip compressed (ZIP)). The input data follows the CBC mode; S-box generation is used for fast computation of algorithm. T. Nie et al. [10], was implemented an 802.11 wireless network and they transmitted the randomly generated plaintext of 128-byte size block. The text file is encrypted with Blowfish and DES technique and the result comparison shows that encryption speed and power consumption of blowfish are much better than the DES technique. There is a various drawback of DES technique; M. Sharma and R. B. Garg [11] presents a deep survey on open challenges of DES algorithm; it takes huge encryption time and it also vulnerable against brute force attack. For lightweight cryptography, the DES algorithm is a very suitable candidate. S. Rajput et al. [12], was implemented the AES algorithm for cloud security. They use the variable length of the message block size for encryption. The result is compared with DES (64, 64) and DES (64, 128) of (key size and block size) and it shows that AES (128, 128) takes less memory for the execution in the cloud. For the security of storage data; P. Kumar and S. B. Rana [13], was presented the modified AES algorithm. Here, the addition of one more round at the time of encryption has enhanced the performance of the algorithm. For a different text file, various traditional encryption algorithms like (DES, 3DES, and AES) are compared with the modified AES algorithm and it is concluded that the addition of one more round makes more secure and less prone at the time of attack. Cloud-based applications and services require security while uploading the data; A. Bhardwaj et al. [14], was compared the performance of different symmetric (DES, 3DES, and AES) and asymmetric (RSA) algorithms. The result evidence that AES takes less computational time than another algorithm. M. Sohal and S. Sharma [23], was proposed a multifold symmetric-key cryptography technique for client-side data encryption. The objective of this work is to prevent unauthorized access to user’s data.
A proposed system model for multimedia security in the cloud data server
The biggest challenge for cloud users is multimedia security in the cloud data server. So, this section presents the solution for multimedia security based on the encryption technique. First; we proposed a system model that highlights the secure hidden layer in the cloud for the key management system, and it also explains the assess control modules of each user then; we represent the proposed encryption technique for storage server and also check the confidentiality of multimedia.
The proposed system model
After a thorough study of various research papers, we have proposed Secure Hidden Layer (SHL) cloud architecture for multimedia storage. Fig. 2 represents the proposed system model for end-to-end data security in the cloud. Here, it consists of five different modules that provide access control for every user.

The proposed System Model for Secure data storage in the cloud.
–Cloud Service Consumer (CSC): The CSC has very limited access to cloud resources. The access control like read/write, delete, update, and share is a common attribute for cloud users.
–Key Management Server (KMS): It is a unique implementation in Secure Hidden Layer (SHL) architecture to manage both symmetric and asymmetric keys. KMS is used as key splitter and store the key securely at Share Holder Server (SHS).
–Share Holder Server (SHS): The SHS is divided into two different parts (a) Primary share holder: It stores the public key (K public (x i )) of the symmetric key algorithm, and (b) Secondary share holder: In this the private key K private (y i ) of the asymmetric algorithm is stored at SHS. The attributes of SHS are,
–Log editor: It uses to maintain the log for every user. The attributes like User_id(), Server_Id(), Server_Time(), and Status() are used to maintain the logs client and server transmission and storage of data.
The proposed system model allows users to upload and download data securely from the cloud. The security of multimedia is achieved by using the encryption and decryption agents. There are seven individual agents are work for authentication, encryption/decryption, key management, and storage of multimedia. The detailed working of agents are as follows; Interface agent: It is the frontend of the application and the cloud storage. It provides the appearance for data and access modules to users. Before uploading or downloading any multimedia the interface agent authenticates the user credential. If the user is not authentic then all the access controls are denied. Authentication agent: The work is to provide authentication to users. Here, the authentic user will only upload or download the multimedia. The other vectors of authentication agents are to deny the login request of unauthorized users and it also takes control at the time of multiple logins. Key agent: It uses the random stream for key generation. The key is divided into two types (i) public, and (ii) private. The public key is used for encryption whereas the private key is used for the decryption. Key server agent: It works as a key storage and distribution server. Ones the key generation process is over the public key is sent for encryption; whereas the respective private key is saved at the key server agent and it is only retrieved at the time of decryption; the user sends a download request to storage agent. Encryption agent: It is responsible for data encoding and public key encryption. This process contains the key agent and key server agent for generation and encryption of multimedia. It is the black box process so the end-user doesn’t aware of key generation and storage. Decryption agent: It decodes the encrypted data using the private key. Here, the user sends the download request to the storage agent, respectively the decryption key is retrieved from the key server agent. Storage agent: It holds the encrypted multimedia which is shared by the users. It is a secured storage server that resists all the types of a possible attack.
The scenario for multimedia encryption and storage is as follows: The interface agent collects the credential of users and sends it to the authentication agent. Ones the user is authenticated the user starts to download or upload the multimedia. Here, the user first sends the multimedia upload request simultaneously the encryption agent sends the request to key agent for the generation keys. The encryption is only needed the public key to encrypt the multimedia and the other is saved for the decryption in key server ant. Ones the file is encrypted it is stored at the storage agent and users get the successful acknowledgment. The sequence diagram is used here to summaries the interaction between the different agents. Fig. 3 represent the interaction between the agents in the case of uploading the steps are as follows: Step 01: The user sends the authentication (username and password) request to the interface agent. Step 02: The interface agent checks the credential and authenticates the user. Step 03: The interface agent returns the Auth(success) to the interface agent. Step 04: The user sends the upload request to the interface agent. Step 05: The interface agent sends the request to the encryption agent for multimedia encryption. Step 06: Encryption agent initialize the key agent for the generation of the key. Step 07: The key agent generates public and private keys. Step 08: The public key is retrieved by the encryption agent. And private key is stored in the key server agent. Step 09: The encryption agent encrypts the multimedia and sends it to the storage agent. Step 10: The storage agent stores encrypted multimedia. Step 11: The successful store message return to the interface agent. Step 12: The interface agent displays the success message to the user and the file is stored in cloud storage.

Multimedia Storage in Cloud Data Server.
To retrieve the multimedia from cloud storage, the user sends the retrieval request to the storage agent. The interface agent directly sends the request to the storage agent. Fig. 4 represent the sequence diagram of different agent interaction, the steps are as follows: Step 01: The user provides the credential to the interface agent. Step 02: The interface agent sends the request to the authentication agent. Step 03: Authentication agent verify the credential and send the success message to the interface agent. Step 04: User requests to download the multimedia from cloud storage using an interface agent. Step 05: The interface agent sends the request to the storage agent. Step 06: Storage agent retrieves the encrypted file and simultaneously its search for the private key. Step 07: The private key search request sends to the key server agent. Step 08: The key server agent searches the key based on the encryption logs. Step 09: The key server agent retrieves the private key and sends it to the key agent. Step 10: The key agent decrypts the encrypted multimedia and sends it to the decryption agent. Step 11: The decryption agent sends the multimedia to the interface agent. Step 12: The interface agent creates the download link for the user. Step 13: The user downloads the original multimedia from the cloud storage server.

Multimedia Retrieval from Cloud data server.
Encryption is the process to achieve the confidentiality of data. Moreover, encryption not only provides the confidentiality but also guarantees the secrecy of data. Encryption is a very complex process and it needs a high level of key management. Encryption techniques are consist of symmetric (like AES, DES, Blowfish, etc.) and asymmetric (like RSA, DSA, Elliptic curve technique, etc.) techniques. Furthermore, the security of multimedia is achieved by using both the type of key management system. But the selection of encryption technique is based on the four different properties such as (i) Structure of algorithm, (ii) Input message block, (iii) Length of the key, and (iv) Number of rounds. Now, for all symmetric key cryptosystem structure of encryption is mainly based on the Feistel or Permutation & substitution types, the input message block is consists of 64 or 128 bits, the length of the key has mainly fluctuated from 56 to 256 bits, and it covers 16 to 48 rounds for encryption. Now, for asymmetric key cryptosystem is consist of two properties (i) Input message block, and (ii) Length of the key. Here, data is input in the form of stream cipher which provides flexibility in the user input size, the length of the key varies from 1024, 2048, or 4096 bits. The prime feature of asymmetric key selection is based on the factorization and moduli. Now the question arises that the appropriate selection of encryption techniques for data security. Now, the appropriate selection in-between asymmetric and symmetric key is done on the basis of two properties: The computational time of encryption, and Key distribution technique.
In the case of computational time, the symmetric key requires less CPU cycle then asymmetric key algorithms. So, the algorithm based on the symmetric key much faster than the asymmetric key. But in the case of key distribution, asymmetric key cryptosystem uses the pair of keys, one for encryption and other for decryption, it provides ease for users to share the key securely. The keys are mainly based on the prime factorization concept which is secure against any type of timing attack. Whereas, in symmetric key cryptosystem the single key is used for encryption/decryption and the distribution of that key is a very challenging task for the user. In the year 2019, researchers are successfully factored the RSA-240 and it approximately takes 900 core-year computing power [33]. In the 2010, factorization of 768-Bit RSA Modulus is down [34]. Now, it is estimated that 1024, 2048, and 4096 bit RSA would take huge processing for factorization. So, it proves that the asymmetric key technique provides better performance against attacks then symmetric key cryptosystem. This paper adopts the asymmetric technique for multimedia encryption. The proposed technique is a modified version of RSA named K-RSA which is mainly based on the Chinese Remainder Theorem (CRT), which makes 4× times fast computing during the encryption. For the requirement of the paper, we just briefly describe the CRT technique for asymmetric encryption. CRT is a number theory technique that uses the Euclidean division of integer ‘n’ by several integers the only condition is that the divisors are co-prime [5]. This technique was first developed in the 3rd century AD by the Chinese mathematician Sunzi Suanjing.
The common solutions to‘X0 ’ is give one such solution iff it satisfies the form of,
For some integer ‘k’ here m = m1, m2, m3, …, m r .
Wconsider this as (number×mod m
i
) and find that,
Thus, X0 is the solution of the system (1), If ‘X0’ and ‘X1’ are two solutions to the system (1).
Then,X0 ≡ X1 (mod m i ) for (i = 1, ... r).
Since, X ≡ y (mod m i ) for (i = 1, 2 ... r).
Iff, X ≡ y (mod [m1, m2 … , m r ])
Hance, X o ≡ X1 (mod m) this complete the proof of CRT. Now, how the CRT is collaborating tthe A encryption algorithm. The mathematicaaboration for CRT with RSA is given as,
Let (n1, n2, n3, …, n
k
) be the pairwise coprime and it is greater than 1, and(a1, a2, a3, …, a
k
) be any integer value. Then the representation of equation is given as in Equation 5,
From Equations 6 and 7, ‘p’ and ‘q’ are relatively prime, and a unique solution is given by Equation 8,
From Equation 8, we calculate the ‘n’ value in Equation 9
Using the Equation 7, we calculate individual message prime value in Equations 8 and 9. For the message ‘m1’ and ‘m2’.
While using the Equations 10 and 11 the prime factorization module of message ‘m’ is given by Equation 12.
It is a unique and 4× times fast computing of ‘m1’ and ‘m2’. Before, deep-diving inside the multimedia security. Table 3 represents the basic communication steps for cloud users to download and upload the data to the cloud storage server.
Basic Communication with Cloud Storage Server
Here, in this paper, the proposed cryptography algorithm is based on a complete encryption technique. The input data are completely encoded which creates no modification on pixels and frames. The step-by-step procedure for data encryption is presented in the next sub-section.
The encryption of multimedia is based on the asymmetric key cryptosystem. Table 4 defines the notation used for the encryption process.
Notations for Proposed Encryption Technique
Notations for Proposed Encryption Technique
The proposed encryption technique contains three steps which are explained as follows.
Step 1: Data encoding and prime number generation: The data owner uploads multimedia to the cloud. The Encrypt() function is used for conversion of raw data to binary form; C/S1() function is used to check file size; and Split() function is used for division of file into small blocks; RandPrime() is used for prime number generation.
Step 2: Generate Encryption and Decryption key: Cloud server is responsible for key generation based on the CRT technique. The C/P1() function is used to calculate K-RPublic and K-RPrivate key for a cloud data server. C/P1 is used to compute the key using Euler’s function φ(n), where ‘n’ is the number of elements
Step 3: Encryption and Decryption: The proposed technique is based on the complete encryption technique. So, Encrypt() and Decrypt() function is used to convert the data into binary strings. After conversion, the small blocks are taken by K-RSA for encryption. M/E1 is used to store encrypted multimedia file; M/E1 = Encrypt((M/M1) K-RPublicmod n); S/S1() function is used to store the encryption file. For decryption, the encrypted file is retrieved from the storage server using the S/S1() function; S/S2() function is used to retrieve the private (K-RPrivate) key from the key storage server. Decryption is used to retrieve the original message M/M1 = Decrypt((M/E1) K-RPrivatemod n); send the original message to the data owner.
K-RSA: The Proposed Encryption Technique
At last, the working of the log editor is to check the system log periodically for every 60 sec. The data shareholders server is used to check the frequency of the user’s login and maintain the private key of every encrypted multimedia file stored at the cloud storage server (CSS).
This section deals with the implementation of the proposed system model in our local system. This paper is mainly based on secure data storage in the cloud data server, but the problem was we cannot create the whole cloud environment. So, we have simulated the secure storage operation at the local system. For simulation we requires oracle 11 g for data storage, and it is assumed that data owners are encrypted the data and share with the server. The GUI interface is used to encrypt the multimedia. The rest of the systems is implemented using Eclipse V 3.5.1, using JDK 8 on the Windows 8.1 platform having the hardware specification of Intel Core i5 CPU with frequency 1.70 GHz of the clock with 4GB RAM on×64-bit processor. The proposed encryption technique is named K-RSA (means, the combination of RSA and CRT) for encryption with a key size of 512 bit asymmetric key.
Figure 5 represent the API interface, where the multimedia file is uploaded, simultaneously the key is generated for encryption. The cloud storage stores two things (i) Private Key and (ii) Encrypted file. The oracle server is used to store the encrypted file and key of the data owner.

API Interface for Encryption ad Decryption.
This case study is prepared on the basis of the randomly generated text file which is used for encryption and decryption. The text file is in the format of (.txt) and it is generated by using the website (https://www.lipsum.com/). The size of files are varies from (5, 10, 15, 20, 25, and 30) kb respectively the word count are (758, 1516, 2274, 3032, 3790, and 4548) and character count are (5097, 10194, 15291, 20388, 25485, and 30582). The parameters are considered for encryption and decryptions of text files are:
Input: Text File (.txt)
Output: Encrypted file
Algorithm: K-RSA
Comparison: Blowfish, AES, DES, DNA, BDNA
Key Size: 512 bit
Evaluation: File size and Encryption time.
Table 5 represents the comparison of the text file on the basis of size in (kb). The proposed K-RSA results are compared with the traditional encryption technique (M. Sohal and S. Sharma [23]). The result is evaluated on the basis of two properties (i) Encrypted file size expansion and (ii) Time to encrypt the multimedia file. The comparison table represents the various size of the plaintext; various encryption techniques like (Blowfish, AES, DES, DNA, and BDNA) is applied and compared with the proposed technique (K-RSA). The encryption technique shows the size expansion of ciphertext. Here, 5 kb of plaintext size is encrypted with different techniques and produce 6.76 kb of ciphertext by Blowfish, 6.86 kb by AES and DES, 6.67 kb by DNA, 5.83 kb by BDNA and 5.21 kb by K-RSA. Similarly, for every plaintext size K-RSA perform out well than other traditional techniques. The comparison of the result shows that K-RSA technique generates less size of ciphertext than other traditional techniques. And it is proved that K-RSA technique occupies less memory size for the cloud storage server.
The comparison of ciphertext with given plaintext size
The comparison of ciphertext with given plaintext size
The second property for evaluation of encryption technique is ‘encryption time’. Fig. 6 represents the comparison of encryption time of various traditional technique (Blowfish, AES, DES, DNA, and BDNA) with proposed technique (K-RSA). Here, 5 kb of plaintext takes 0.054 sec in Blowfish, 0.053 sec in AES and 0.152 sec in DES, 0.200 sec in DNA, 0.048 sec in BDNA and 0.038 in K-RSA (for encryption). Similarly, the encryption time of different file sizes (10, 15, 20, 25 and 30) kb using K-RSA is as follows (0.065, 0.096, 0.128, 0.161, and 0.192) sec. The other traditional technique encryption times for different file size (10, 15, 20, 25 and 30) kb are as follows; Blowfish (0.074, 0.097, 0.130, 0.133, and 0.170); AES (0.081, 0.106, 0.172, 0.198, and 0.218); DES (0.283, 0.405, 0.571, 0.785, and 0.955); DNA (0.483, 0.625, 0.972, 1.250, and 1.487); BDNA (0.066, 0.090, 0.106, 0.123, and 0.149). The result evidence that K-RSA technique take less time for encryption and it also require less space for storage of text file.

The comparison of encryption time (sec) for different algorithm.
This case study is related to the video file (.mp4) for encryption and decryption. The video file is in the format of (.mp4) and it is downloaded from the website (www.sample-videos.com). The size of files varies from (1, 2, 5, 10, and 20) Mb. MP4 or MPEG-4 method is used to compress the audio and visual format. The video format (.mp4) is a Quick Time File Format (QTFT), which is usually working with portable multimedia devices; Table 6 presents the different video formats which are used for simulation.
The description of video file format
The description of video file format
Each video file is consists of 15 frames/sec of the window, the screen size format of (360×240) pixels (number of points at each frame). The parameters are considered for encryption and decryptions of video files are:
Input: Video (.mp4)
Size: (1, 2, 5, 10, and 20) Mb.
Frame Rate: 15 frames/sec
Size: 360×240 resolution
Algorithm: K-RSA
Comparison: Blowfish, AES, DES, and RSA
Key Size: 512 bit
Evaluation: File size and Encryption time.
Fig. 5 is used for encryption and decryption of video files. The video file is consists of a large size so to reduce the computation of the algorithm, first, we divide the file into sub-blocks. Table 7 represents the size indexing of five different sample video data.
Size indexing for the encryption
Table 7 represents the size indexing of different sizes (1, 2, 5, 10 and 20) MB is taken for encryption. The size indexing is one of the tedious tasks and it depends on two things (i) Length and (ii) Negative values. The length is divided into two parts odd and even. For odd size, the fixed padding is applied with original file size and for even size indexing works normally. The second issue is negative values which are handled by java cryptography extension (JCE).
Here, we encrypt the original file with different traditional and proposed encryption techniques. Table 8 represents the comparison of the traditional algorithm (Blowfish, AES, DES, and RSA) with the proposed encryption technique (K-RSA) for different video file size. The results are compared for both symmetric and asymmetric algorithms; for the symmetric-key algorithm, the Blowfish is performed well then AES and DES; whereas for the asymmetric algorithm, the K-RSA presents better results than RSA. As a conclusion, it is found out that there is an expansion of (19% to 27%) in encrypted file size. Overall evaluation of cryptographic technique is K-RSA has performed better than other traditional algorithms.
The comparison of original video size with encrypted video
Figure 7 is the graphical representation of encryption time for different video samples using the proposed system model. The comparison of the symmetric and asymmetric algorithm is based on the encryption time. As we see, the result of AES takes less time than other symmetric techniques DES and Blowfish; and for the asymmetric algorithm, K-RSA take less time than RSA algorithm. The domination of K-RSA over the Blowfish, AES, DES and RSA has visually appeared for every file size, and the combination of RSA and CRT provides better results at the time encryption. Furthermore, it is noticed that the encryption time is reduced by approximately 50% using the proposed encryption technique.

The comparison of encryption time for different video file size.
This section is used to evaluate the performance of the proposed system model on the basis of throughput. It is the rate of transmission for the encrypted messages successfully uploaded to the cloud storage server. Maximizing the throughput provides better performance at the time of encryption.
Table 9 represents the throughput calculation of various algorithms for text files (.txt). Here, the throughput of BDNA, Blowfish, AES, DES, and DNA are 180.4, 159.6, 126.8, 33.32, and 20.92 kb/sec respectively. Whereas, the throughput of K-RSA is 181.89 kb/sec. The result shows the proposed encryption technique has maximum throughput among all traditional algorithm and it is evidenced that K-RSA performs better than other encryption techniques at the time of uploading and communication.
Throughput calculation of various algorithm for plaintext encryption in (kb/sec)
Table 10 represents the throughput calculation of various algorithms for video files (.mp4). Here, the throughput of Blowfish, AES, DES, are RSA are 0.0536, 0.1195, 0.0321, and 0.0475 (Mb/sec) respectively. Whereas, the throughput of K-RSA is 0.1740 (Mb/sec). The result is evidenced that K-RSA has maximum throughput among all traditional encryption algorithm and it provides better performance at the time of transmission and uploading.
Throughput calculation of various algorithm for encrypted video in (Mb/sec)
This section is used to evaluate the proposed encryption technique (K-RSA) on the basis of various cryptanalysis and attacks. The testing of the K-RSA technique is based on three different types of attacks.
–Chosen Plaintext Attack (CPA): Here, the adversary chooses the arbitrary plaintext block and generates the respective ciphertext block. According to the proposed system model, SHL is responsible for data encryption and the data owner uploads the original multimedia (M/E1) for storage and transmission. In CPA, the adversary selects the random plaintext; lets as take a scenario where original multimedia (M/M1) is encrypted with K-RSA technique. Now the original message is presented as,
Original Message = M/M1 Encrypted Message: M/E1=(M/M1) K-RPublicmodn
Here, ‘K-RPublic’ is the public key and ‘n’ is moduli value (multiple of two prime numbers). In a chosen-plaintext attack, the adversary creates random plaintext and it is encrypted with ‘K-RPublic’ and ‘n’ to obtain the corresponding ciphertext. Here,M/M1′ is presented as a random plaintext that is encrypted with ‘K-RPublic’ and ‘n’.
Adversary: M/M1′.
The adversary required = ‘K-RPublic’ and ‘n’.
Now, at the time of the attack; the proposed system model is based on SHL and key management server (KMS). To execute the attack; the adversary requires the public key ‘K-RPublic’ and moduli ‘n’ for the creation of ciphertext, but the proposed system model has a KMS module which deletes the public key ‘K-RPublic’ and private key ‘K-RPrivate’ and ‘n’ is stored at SHS. So, this shows the adversary is not able to get the key for encryption because SHL provides a secure environment for the key storage and data encryption. The Auth() function is used to authenticate the users and only legit users access the multimedia.
–Known Plaintext Attack (KPA): In this, the adversary has access to both plaintext and ciphertext. This cryptanalysis is used to check thentropy of the key. Let us take a scenario for adversary attack,
The adversary has original multimedia: M/M1
The adversary has encrypted multimedia: M/E1
Adversary identifies public-key ‘K-RPublic’ and moduli ‘n’. Now, to decrypt the multimedia adversary requires private key ‘K-RPrivate’. To perform this attack adversary has to backtrack the public key and moduli. Now, K-RSA technique is based on 512 bit key size and moduli ‘n’ (which is constructed using multiple of two prime numbers). Now, the adversary has to perform prime factorization of moduli ‘n’ to reconstruct the K-RSA technique. The construction of K-RSA with a normal computer is not possible and it almost takes 2512 = 1.34 × 10154 combination of CPU cycle or 13 billion years to retrieve the key. Another possibility is quantum computers which will calculate the key in the limited year.
–Ciphertext Only Attack (COA): Here, the adversary knows the entire encryption algorithm to access the ciphertext. Now, the proposed system model is deployed at the cloud server. And the services of the cloud are bind with Service-level agreement (SLA). The proposed system model also consists of several independent modules that create different security layers for data encryption. For multimedia storage security, the S/S1() and S/S2() functions are used to store the multimedia files and the private key of the K-RSA and Auth() function is used for authenticating the user. So, no unauthorized uses access the cloud server and it is impossible for any adversary to retrieve the algorithm of SHL and K-RSA from the cloud server.
Hence, the security of the proposed system model is precisely convinced that it is not easy to attack multimedia which is stored at cloud storage. The SHL and K-RSA provide a secure environment for the data owners.
Conclusion and future scope
Cloud is one of the venerable places where all the user shares their personal data. The data is present in various forms like document, video, audio, and images. These data are reachable to every user without any means of security. Storing the data in the cloud will require a huge amount of security and privacy. Here, we proposed a secure hidden layer (SHL) for key management and storage of data. The proposed K-RSA technique is used to encrypt the multimedia using 512 bit key size which doesn’t affect computational time and size after encryption. The experimental results evidence that the proposed encryption technique (K-RSA) is performed will against traditional encryption cryptosystems such as DNA, AES, DES, Blowfish, RSA, and BDNA in terms of size expansion and encryption time. The performance evaluation of the proposed system model is based on the throughput and it shows that the proposed encryption technique outperforms in both case study (text and video). The security analysis of encrypted multimedia is based on three different type’s attacks which are performed by the adversary (i) chosen plaintext attacks, (ii) Known plaintext attack, and (iii) Ciphertext only attack. And the analysis precisely convinced that SHL and K-RSA provide a secure environment for the storage of multimedia. The result evidences the novelty of the work in the field of cloud data security.
The main contributions of the paper are: The proposition of a securely hidden layer model for key management servers in a cloud environment. The proposition of key management server (KMS) for storing and sharing of cryptographic keys. The combination of RSA and CRT (K-RSA) provides high security and less computational time for encryption. The proposition of K-RSA provides end-to-end multimedia encryption. The performance evaluation of SHL checks the packet rate of uploading and downloading. The security analysis of the proposed encryption technique guarantees the security of data storage.
The perspectives of this study are: The interface agent is used to upload and download multimedia from the cloud storage server. The secure hidden layer allows authentication and encryption of multimedia. The adaptation of the key management server enables key agents and key server agents to splitting and storing the key securely.
The future accepts of this study are: End-to-End security provides a secure environment for data storage. Secure hidden layer (SHL) and Key management server (KMS) provides a secure environment for Big Data storage. The field like medical organizations and customer supports companies use SHL for storing secure multimedia data in the cloud.
Footnotes
Acknowledgment
I would also like to thanks our Institute Birla Institute of Technology, Mesra. Finally, I would like to acknowledge and thankful to the publisher of this Journal for its wide circulation and make a provision to reach this article to some readers.
