Professional Documents
Culture Documents
Application of Steganography Technique in Cloud Computing
Application of Steganography Technique in Cloud Computing
Sudeshna Chakraborty
Sharda University, Greater Noida, India
sudeshna.chakraborty@sharda.ac.in
532
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE
thus providing secured access to data. Authors gest RSA as the most secure algorithm in data security. Based on this
claim Steganography can provide security, opinion, the suggested incorporating other algorithms along with the RSA
integrity and confidentiality to the data being algorithm. They encrypted images which seems identical to the naked eye
transmitted over network. This steganog raphy in steganography process. However, once image binary codes analysis is
model uses textual properties in hiding data, done the dif- ference and very clear.
textual properties such as font type, font size, font Lovejeet Kamboj et al.[6] and Shakeeba S et al.[7] in
styles, and color hue, amongst many others to their respective papers proposed multi layered security of
present data. The architecture proposed supports cloud data. While Lovejeet Kamboj et al.[6] suggested dual
cloud computing by restricting access of use of steganography and cryptography approaches to give
unintended and unauthorized users. The mention Layer based security in cloud computing, Shakeeba S et al.
model has 3 layers physical, data, security layers. suggested multilevel cryptographic algorithms. After
The data is hidden in security layer through analyzing the pro- ductivity correlation parameters, the
pipeline. outcome shows that multi- layers system saves enough space
Pant, Prakash, &Asthana[5] proposed dual use of and justifiable input- output operation.
steganography and cryptography for securing data. They sug
533
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE
III. D ESCRIPTION OF T HESYSTEM the servers and the authorized users maintains confidentiality
and data integrity. Despite the fact that cloud computing is
The cloud server systems randomly produce access keys
useful in computer-based systems, maintaining the integrity of
either primary or secondary keys after a record is made by
data through the systems is the most substantial aspect of cloud
the user concerning specific information. In the process, the
computing. In order to effectively accommodate multiple users
data proprietor swiftly encodes the record concealing the
through the cloud computing program, the platform avails cloud
data into a picture that is later split and stored in the cloud. In
resources to the users through three main services. First,
order to avoid access to encrypted data from unauthorized
infrastructure as a service is one of the techniques that entail the
users, the cloud server creates a shared key under the utility
use of hardware resources to facilitate the sharing of data and
of both primary and secondary keys for the data owner and
information through the cloud computing platform. It involves
its user respectively. The server maintains data safety during
resources such as memory, hard-disk, and networking resources.
the data sharing process as the data proprietors ends the
Data flowing through these resources require ample security in
order to be maintained in the respective resources [9]. Platform
Encryption: Media file is as a service is the next platform necessary for providing
encrypted as binary codes operating system facilities and their updates. Also software as a
that vary depending on service is part of the system that maintains flexibility and ease of
nature of file. use for the users.
File recombination:
encrypted chinked files are
recombined so the receiver
can access the original file.
Decryption: Recombined
file decrypted to get
original file from sender.
mutual
Fig. 2. Process of applying steganography
key to the user through the e-mail maintaining
security as well [8]. The mutual key is covered
into a picture to maintain the security of the key.
The system encapsulates different processes all
focused on maintaining data security for the data
in the cloud systems.
534
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE
As stated by K. Murakami [11], the technique systems, data can easily be stolen and manipulated by unau-
incorporates the use of watermarks to hide theorized users. As a result, this issue has raised the need to
copyright information of the underlying data or enhance data security especially for media files uploaded into
information hence preventing fraudulent actions the cloud computing platforms.
against the protected data. In the computer-based
I. RESULTS
security
96.00%
94.00%
92.00%
90.00%
88.00%
86.00%
84.00%
combined
steganography
cryptography
tecniques
535
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE
REFERENCES
536
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
December 11–12, 2019, Amity University Dubai, UAE
537