Abstract: The immense growth in the video content retrieval and video content analysis have motivated the practitioners to migrate the video contents and the analytic applications on to the cloud. The cloud computing platform provides scalability for applications and data, which enables the application owners to deal with complex algorithms, which is needed for video content analysis and retrievals. The primary concern of the video data retrieval on cloud services are the weak security for the standard data during migrating from one VM to another VM. Also, the standard
encryption algorithms have failed to demonstrate higher performance during encryption of a large file. Hence, the demand of the recent research is to ensure reduced performance implications for video content encryption over cloud services. This work proposes an adaptive encryption and decryption algorithm for large video data over cloud as Encryption as A Service (EAAS). This work proposes a novel key age calculation dependent on Quartic Polynomial Randomization. The quartic part utilized in the proposed calculation can produce numerous defining moments, which makes the calculation results hard to foresee and the utilization of polynomial randomization can further build the haphazardness of the defining moments. Likewise, the higher size of the video information must be diminished without rotting the data and without trading off the security. Subsequently, this work proposes a novel key edge comparability extraction procedure utilizing versatile movement. The similitude areas in the key casings contains comparable data and, in this manner, can be scrambled all around. This diminishes the time unpredictability to a more noteworthy broaden. Associated with the comparable line of advancement, this work likewise proposes time limited encryption and unscrambling calculations, which can separate between the comparable and unique areas and decrease the time intricacy further. The proposed algorithm demonstrates nearly 40% improvements over the standard encryption algorithms.