You are on page 1of 6

2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)

December 11–12, 2019, Amity University Dubai, UAE

Application of Steganography Technique in Cloud


Computing
Jacob Adeboye Ajala Sanika Singh Saurabh Mukherjee
Sharda University, Greater Noida, India Sharda University, Greater Noida, India Banasthali Vidyapith, Jaipur, India
jajala86@gmail.com sanika.singh@sharda.ac.in mukherjee.saurabh@rediffmail.com

Sudeshna Chakraborty
Sharda University, Greater Noida, India
sudeshna.chakraborty@sharda.ac.in

Abstract—Cloud computing has played a significant role in


data and information management through availing As a new approach, cloud computing has won the interest of
computer system resources for all users without direct active a huge user population for computer systems-based services.
management. In return, a considerable population has In return, data and information uploaded into the platform
embarked on cloud computing to share data and information need to be safe and secure from unauthorized access and any
and communicate through the platform hence enjoying the destructive malware. As defined, Steganography has facilitated
benefit. However, data security is a crucial aspect in cloud actual use of a cloud computing platform as a service through
computing as a way of assuring users of their confidentiality enhancing data security.
and safety of data and information stored and transferred Numerous publications have been put forward regarding the
through the platform. As a result, the need for data security effectiveness of stenography in cloud data security.
techniques has facilitated the evolution of different techniques Steganography is closely related to data encryption since it
necessary for ensuring the safety of data and information involves hiding data inside another data maintaining its safety
through the platform hence ensuring effective communication throughout the cloud computing platform. Cloud computing
channels. Therefore, Steganography techniques have been
had developed data security issues that are sensitive to the
identified as one of the cloud computing techniques necessary
users. Cloud computing provides a rich source of computer
for enhancing cloud data security. In return, this paper
system resources and facilitates communication as well. As a
analyzes the application of stenography technique in cloud
computing as an approach to enhance cloud data security consequence, a high level of data security is required in order
to protect the user’s information. Different articles support the
Keywords--Cloud Computing, Data Security, Cryptography, suitability of stenography techniques for cloud data security.
Steganography, stego-image
Moreover, the technique has been preferred for improvement
of data security in system based cloud computing.
I. INTRODUCTION Furthermore, cryptography is identified among other types of
stenography with different cases of successful data protection
Data and information security are one among the major being recorded. Therefore, Steganography is an effective
sensitive aspects of cloud computing. In view of need to technique in cloud computing towards enhancing cloud data
protect cloud-based systems, data and cloud infrastructures security.
from any alteration or unauthorized access supports the
innovation of different approaches to enhance data security for II. LITERATURE REVIEW
cloud computing. Garima Saini and Naveen Sharma[3] in their paper
applied techniques like DSA, DES, and Steganography to
Steganography technique such an effective techniques that
ensure security of data in cloud. DSA is provides data
improve data security in cloud computing through securing
authentication and verification which assures of the data
communication in cloud [1]. As discussed by Reza, H., & authenticity, and integrity. DES is used for encryption of data
Sonawane, M [2], Steganography involves data hidden within
and provides a symmetric algorithm. Steganography was
the data approach, which refers to writing hidden message in a
applied to embed information with the audio file to provide
way that only the sender and receiver understand the content
security. However, due to the step by step application of each
of message and have authorized access to the hidden
of the three processes, the time complexity is very high. It first
information. applies the DSA, followed by the AES before finally applying
Figure 1 explains the architecture of Steganography. Cloud Steganography. Adding to the complexity is the fact that the
computing has been integrated into networking and computer same process is followed for decryption but in reverse order.
science inducing a great benefit for users through providing Z. Al-Khanjari and A. Alani[4] in their paper proposed an
free storage-saving users from thecost of buying hardware architectural model to protect data in cloud. The authors
resources to store data instead. proposed steganography as a technique to secure the data.
They explained how data is hidden though pipeline channel
978-1-7281-3778-0/19/$31.00 ©2019 IEEE

532
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE

thus providing secured access to data. Authors gest RSA as the most secure algorithm in data security. Based on this
claim Steganography can provide security, opinion, the suggested incorporating other algorithms along with the RSA
integrity and confidentiality to the data being algorithm. They encrypted images which seems identical to the naked eye
transmitted over network. This steganog raphy in steganography process. However, once image binary codes analysis is
model uses textual properties in hiding data, done the dif- ference and very clear.
textual properties such as font type, font size, font Lovejeet Kamboj et al.[6] and Shakeeba S et al.[7] in
styles, and color hue, amongst many others to their respective papers proposed multi layered security of
present data. The architecture proposed supports cloud data. While Lovejeet Kamboj et al.[6] suggested dual
cloud computing by restricting access of use of steganography and cryptography approaches to give
unintended and unauthorized users. The mention Layer based security in cloud computing, Shakeeba S et al.
model has 3 layers physical, data, security layers. suggested multilevel cryptographic algorithms. After
The data is hidden in security layer through analyzing the pro- ductivity correlation parameters, the
pipeline. outcome shows that multi- layers system saves enough space
Pant, Prakash, &Asthana[5] proposed dual use of and justifiable input- output operation.
steganography and cryptography for securing data. They sug

Fig. 1.The architecture of Steganography.

533
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE

III. D ESCRIPTION OF T HESYSTEM the servers and the authorized users maintains confidentiality
and data integrity. Despite the fact that cloud computing is
The cloud server systems randomly produce access keys
useful in computer-based systems, maintaining the integrity of
either primary or secondary keys after a record is made by
data through the systems is the most substantial aspect of cloud
the user concerning specific information. In the process, the
computing. In order to effectively accommodate multiple users
data proprietor swiftly encodes the record concealing the
through the cloud computing program, the platform avails cloud
data into a picture that is later split and stored in the cloud. In
resources to the users through three main services. First,
order to avoid access to encrypted data from unauthorized
infrastructure as a service is one of the techniques that entail the
users, the cloud server creates a shared key under the utility
use of hardware resources to facilitate the sharing of data and
of both primary and secondary keys for the data owner and
information through the cloud computing platform. It involves
its user respectively. The server maintains data safety during
resources such as memory, hard-disk, and networking resources.
the data sharing process as the data proprietors ends the
Data flowing through these resources require ample security in
order to be maintained in the respective resources [9]. Platform
Encryption: Media file is as a service is the next platform necessary for providing
encrypted as binary codes operating system facilities and their updates. Also software as a
that vary depending on service is part of the system that maintains flexibility and ease of
nature of file. use for the users.

When a user needs to use cloud computing resources, the


aspect that is put into consideration is the security of their data,
service of data, privacy, and management of their data. In return,
the systems need to effectively manage the privacy and security
Data chunking: Encrypted of the information uploaded by the user. As demonstrated by
file chunked into parts Al-Khanjari, Z., & Alani, A. in their paper [10], Steganography
effectively performs this role by securing data and information
during data sharing and usage in the cloud environment. The
model is made up of three main components as shown in Figure
1. These are the users who interact with the system, the original
image which is issued by the sender to ember data the stego-
Applying steganography: image that contains the embedded key and data and the
process is done on the steganography application that received as an input stego-image
chunked files that have and user key. The overall process of applying steganography is
been encrypted. They are shown in Figure 2.In most cases, users prefer cloud computing
sent to the receiver in a for free storage of data including images, video files, and video
hidden form files. In return, the system required a huge amount of storage
that is presented through the cloud computing platform. The
system allows integration of stenography into cryptography
with an ability of providing extra security for the data.

File recombination:
encrypted chinked files are
recombined so the receiver
can access the original file.

Decryption: Recombined
file decrypted to get
original file from sender.

mutual
Fig. 2. Process of applying steganography
key to the user through the e-mail maintaining
security as well [8]. The mutual key is covered
into a picture to maintain the security of the key.
The system encapsulates different processes all
focused on maintaining data security for the data
in the cloud systems.

The exchange of data and information between

534
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE

As stated by K. Murakami [11], the technique systems, data can easily be stolen and manipulated by unau-
incorporates the use of watermarks to hide theorized users. As a result, this issue has raised the need to
copyright information of the underlying data or enhance data security especially for media files uploaded into
information hence preventing fraudulent actions the cloud computing platforms.
against the protected data. In the computer-based

Parameters Cryptography Steganograph Cryptograph


y y+
Steganograph
hy
Purpose Hide meaning Hide existence Hide meaning
of data of data and existence
of data
Message Type
Message Can be altered Cannot be Cannot be
structure altered altered
Principles Confidentiality, Confidentiality Confidentiality,
Supported Authentication, and Authentication,
Data Integrity Authentication Data Integrity
and Non- and Non-
Repudiation Repudiation

Implementation Text Audio, video, Audio, video,


image and text image and
text
Output Type Cipher file Stego fine Stego file
Table 1. Comparison of the Steganography and Cryptography

I. RESULTS

The implementation of the three techniques was


done using python and the graphs below provide
analysis of the implementation of the three
techniques. In cloud computing, Security of data is
one of the factors along with efficiency.

security
96.00%
94.00%
92.00%
90.00%
88.00%
86.00%
84.00%
combined
steganography
cryptography

tecniques

Fig. 3. Comparison on the security accuracy of various techniques

535
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE

key in order to access the encrypted information. As


time/ ms demonstrated by Izevbizua, P. O [13], concealment is
achieved through Steganography that adds more
4 security to encrypted data. Moreover, Steganography
time / ms

3 effectively fits for sharing confidential information


2 through cloud maintaining a high level of privacy. In
1
0 addition, the Steganography technique gets over the
security issues that are backlogging the cloud infras-
cryptography steganography combined tructure and fastens the security of information
tecniques throughout the platform.
Techniques In conclusion, stenography maintains data privacy
and safety protecting it from fraudulent actions. In
some cases, data can be stolen through file transfer.
Fig. 4. Comparison on the time efficiency of various techniques However, this technique maintains the safety of the
The intensity value of a pixel in an image to be embedded with data during transfer by encrypting the data and
information is represented as N*M*3 matrix in memory. To assigning a key through data proprietor in the cloud
embed a message into the image using steganography we alter server. As a result,the data remains secure during the
values of some pixels. These values are chosen by an algorithm. transfer process through mails. Apart from data
The figure below show images before and after embedding a security and privacy, the stenography technique
message using steganography with cryptography. supports secret communications hence improving its
preference for the cloud computing systems. The key
embedded in the image attached to the data during
Steganography provides an additional security layer
and confidentiality of the encrypted data [14].
Therefore, Steganography coupled with cryptography
remains the best technique for cloud data security.

REFERENCES

[1] M.K.Sarkar et al.,“Enhancing data storage


security in cloud computing through
steganography,” International Journal on
Fig. 5. Image before Embedding using Steganography and Cryptography Network Se-curity,vol.5,no.1,pp.13–13,2014.
[2] H. Reza et al.,“Enhancing mobile cloud
computing security using steganography,”
Journal of Information Security, vol. 7, no. 4,
pp. 249–249,2016.
[3] S. A. Garima et al., “Triple Security of Data in
Cloud Computing,” IJCSIT) International
Journal of Computer Science and Information
Technologies”, vol. 5, no. 4, pp. 5825–
5827,2014.
[4] Z. Al-Khanjari et al.,Developing Secured
Interoperable Cloud Computing Services.The
European Inter disciplinary Forum, Vilnius,
2014.
[5] V. K. Pant et al., “Three-step data security
Fig. 6. Embedded Image using steganography and Cryptography model for cloud computing based on RSA and
steganography,” 2015,Interna- tional
Conference on Green Computing and Internet of
Things (ICG- CIoT), pp. 490–494,2015.
II. CONCLUSION
[6] L. Kamboj et al., “Multi-Layer Data Security in
The computer-based systems and cloud servers coordinate Cloud Computing”, International Journal of
with the data proprietor to effectively maintain data integrity Computational Engineering Re-
and win the confidentiality of users. The system employs search(IJCER),vol.7,pp.1– 7,2017.
different approaches to ensure full authorization of users [7] Shakeebas et al., “Cloud Security Using
[12].The server sends multiple verification to the owner of the Multilevel Encryption Algorithms”,”
information producing keys that would permit access to the International Journal of Advanced Research in
respective data. When data is loaded into the cloud systems, it Computer and Communication Engineering
is concealed with a picture that requires a user to get the (IJARCCE), vol. 5, pp. 70–75, 2016.

536
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE

[8] K.Handa et al,“Data security in cloud computing


using encryption and steganography,”
International Journal of Computer Science and
Mobile Computing, vol.4,no.5,pp.786–
791,2015.
[9] R. Kaur et al “Cloud computing security issues
and its solution: A review,” 2015,2nd
International Conference on Computing
for Sustainable Global Development
(INDIACom), pp. 1198–1200,2015.
[10] Z. Al-Khanjari and A. Alani, “Developing
Secured Cloud Computing Services,”
European Scientific Journal, vol. 10, no.
24,2014.
[11] K. Murakami et al., “Improvement of security in
cloud systems based on steganography,” 2013,
International Joint Conference on Awareness
Science and Technology &Ubi-Media
Computing(iCAST2013&UMEDIA2013),pp.50
3_508,2013.
[12] S. Rhazlane et al., “Data alteration: A better
approachto securing cloud data with
encryption,” pp. 72–78,2017. P. O. Izevbizua,
“Data Security in The Cloud Using
Serpent Encryption and Distributed
Steganography,”European Scientific
Journal,vol.11,no.18,pp.347–
359,2015,ESJ.
[13] R. Kumar et al., “Understanding steganography
Over cryp- tography and various steganography
techniques,”International Journal of Computer
Science and Mobile Computing, vol. 4, no. 3,
pp.253–258,2015.

537

You might also like