An Intelligent Multimedia Data Encryption and Compression and Secure Data Transmission of Public CloudAuthor : Sheik Saidhbi
Volume 8 No.2 April-June 2019 pp 37-40
Data compression is a method of reducing the size of the data file so that the file should take less disk space for storage. Compression of a file depends upon encoding of file. In lossless data compression algorithm there is no data loss while compressing a file, therefore confidential data can be reproduce if it is compressed using lossless data compression. Compression reduces the redundancy and if a compressed file is encrypted it is having a better security and faster transfer rate across the network than encrypting and transferring uncompressed file. Most of the computer applications related to health are not secure and these applications exchange lot of confidential health data having different file formats like HL7, DICOM images and other audio, image, textual and video data formats etc. These types of confidential data need to be transmitted securely and stored efficiently. Therefore this paper proposes a learning compression- encryption model for identifying the files that should be compressed before encrypting and the files that should be encrypted without compressing them.
Encryption, Compression, Data Security, ECB
 A. L. Jeeva, Dr. V. Palanisamy and K. Kanagaram, “Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, No. 3, pp.3033-3037, May-Jun 2012.
 S. Soni, H. Agrawal and M. Sharma, “Analysis and comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology, Vol. 2, No. 6, pp. 362-365, Dec. 2012.
 Nidhi Singhal and J. P. S. Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, International Journal of Computer Trends and Technology, Vol. 2, No. 6, pp. 177-181, July-Aug 2011.
 Jawahar Thakur and Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol. 1, No. 2, pp. 6-12, Dec. 2011.
 Allam Mousa and Ahmad Hamad, “Evaluation of the RC4 Algorithm for Data Encryption”, International Journal of Computer Science & Applications, Vol. 3, No. 2, pp. 44-56, June 2006.
 Aamer Nadeem, M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”, First International Conference on IEEE Information and Communication Technologies (ICICT), pp. 84-89, 27-28 Aug. 2005.
 Kofahi, N.A, Turki Al-Somani, Khalid Al-Zamil, “Performance evaluation of three Encryption/Decryption Algorithms”, IEEE 46th Midwest Symposium on Circuits and Systems, pp. 790-793, 30-30 Dec. 2003.
 Jonathan Knudsen, Java Cryptography, 2nd Edition, O’Reilly, 2011.
 William Stallings, Cryptography and Network Security, 5th Edition, Pearson, 2012.
 O.S. Pianykh, Digital Imaging and Communications in Medicine (DICOM), 1st Edition, Springer, 2008.
 John Miano, Compressed Image File Formats, 1st Edition, Addison Wesley Longman, Inc, 1999.
 Atul Kahate, Cryptography and Network Security, 2nd Edition, Tata McGraw Hill, 2012.
 V.K. Pachgare, Cryptography and Information Security, 1st Edition, PHI Learning PVT LTD, 2008.
 Dworkin, M. NIST Special Publication 800-38A. Recommendation for block cipher Modes of operation: Modes and techniques, Dec. 2001.
 Simar Preet Singh and Raman Maini, “Comparison of Data Encryption Algorithms”, International Journal of Computer Science and Communication (IJCSC), Vol. 2, No. 1, pp. 125-127, January-June 2011.
 Lalit Singh and R.K. Bharti, “Comparative Performance Analysis of Cryptographic Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol. 3, No. 11, pp. 563-568, November 2013.