You are on page 1of 6

Journal of Xidian University Doi.org/10.37896/jxu18.

1/011 ISSN No:1001-2400

Applying Different Stenography Techniques in Cloud Computing


Technology to Improve Cloud Data Privacy and Security

1
Muhammad Muhammad SULEIMAN, 2Muhammad Bello ALIYU & 3Zainab Jibril AHMED
1
Kano State Polytechnic, Nigeria, ORCID: (0000-0002-3646-3715),
2
Computer Professionals (Registration Council of Nigeria), Federal Ministry of Education
3
Yusuf Maitama Sule University, Kano, Nigeria

ABSTRACT - The term "cloud computing" describes a broad range of services that let people offshore their data without
worrying about problems with local storage. Instead of depending on dubious service providers, the most urgent problem to be
solved is keeping a safe and dependable data repository. This paper examines how combining stenography techniques with
digital watermarking can significantly enhance system performance and data security when used in cloud computing. Safe
data management in cloud environments is necessary for such systems, where data is exchanged or transmitted between servers
and users. Steganography, or cloud steganography, is one of the best ways to communicate securely. Writing coded messages
such that only the sender and recipient can securely decipher and view the data concealed in the communication channel is
known as steganography. To guarantee data security in cloud computing, this paper introduces a novel text steganography
technique for concealing a loaded hidden English text file inside a cover English text file. The suggested method enhances
time, data hiding capacity, and data protection.

KEYWORDS: Cloud Computing, Steganography, Cloud Storage, Information Hiding, Security.

Through the profitable use of PC system assets for all


I. INTRODUCTION clients without the need for direct dynamic management,
cloud computing has come to play a crucial role in data
Sensitive personal information may be transmitted over and data management. As a result, a large population has
turned to cloud computing to exchange data and
the internet and could be intercepted. In addition, there information via the platform and profit from the benefit.
are a lot of online applications, and a lot of websites ask Nonetheless, data security is a key consideration in cloud
users to fill out forms with sensitive personal information computing as a way to assure customers of the privacy
including phone numbers, addresses, and credit card and safety of their data as well as data stored and
details. Therefore, secrecy and data uprightness are transferred across the platform. As a result, the necessity
required to ensure against unauthorized access and usage. for data security protocols has prompted the creation of
Clients may need private and secure correspondence for a several essential techniques for ensuring the safety of data
variety of reasons, such as protecting their confidential and data through the stage that subsequently ensures
data from programmers if it disregards an open channel. functional communication channels. Steganography
Steganography and cryptography are fundamental techniques are now acknowledged as one of the essential
methods for obtaining interchanges [1]. cloud computing processes for enhancing cloud data
A new technology that increases access to sophisticated security. Therefore, to address the issue of enhancing
computing for both service providers and customers is cloud data security, this study explores the application of
cloud computing. Through the use of cloud computing, the transcribing technique in cloud computing [5], [6].
users can access limitless processing power. Computer Two (2) fundamental types of services are provided by
resources are provided via the cloud data centre. A data cloud computing: computation and data storage. Users of
centre facility houses numerous computers and servers cloud services don't have to worry about anything
and is open twenty-four hours a day, seven days a week, because they may access their data and complete
to provide the required resources. The majority of small computer tasks via the Internet network. The customers
and medium-sized companies run their operations are unaware of where the data are stored or which
primarily on the cloud. Cloud resources consist of machines are doing the computation tasks during the
software, platform, and infrastructure components [2]. access to the data and computing. When it comes to data
A common pool of reconfigurable computing assets (such storage, client confidence and efficient use of cloud
as networks, servers, storage, apps, and services) that can technologies are primarily dependent on data assurance
be swiftly provisioned and delivered with little and security [4], [7], [6]. A few privacy and insurance
management effort or service provider association is protocols have been suggested in the field of cloud
made available to everyone through the cloud computing computing examination, and methodologies linked to
model. Three (3) service models, four (4) deployment data assurance should be further improved [7].
models, and five (5) fundamental qualities make up this
cloud model [3], [4].

VOLUME 18, ISSUE 1, 2024 96 http://xadzkjdx.cn/


Journal of Xidian University Doi.org/10.37896/jxu18.1/011 ISSN No:1001-2400

II. CONCEPTUAL DEFINITIONS deliberation (e.g., nation, state, or datacenter). Instances


of assets incorporate storage, preparation, memory, and
What is the Cloud? network bandwidth [3], [4], [6].
An Internet or network is referred to as the "cloud." Stated 4) Rapid Elasticity. Capacities can be flexibly
differently, the cloud might be defined as an entity provisioned and delivered, at times consequently,
existing at a distance. Cloud computing can offer services proportional quickly outward and internally proportionate
via public or private networks, such as WAN, LAN, or with demand. To the customer, the abilities accessible for
VPN. Cloud-based applications include online provisioning regularly give off an impression of being
conferencing, email, and customer relationship limitless and can be appropriated in any amount
management (CRM) [8]. whenever [3], [4].
What is Cloud Computing? 5) Measured Service. Cloud systems consequently
The term "cloud computing" refers to managing, creating, control and improve asset use by utilizing a metering
and accessing web applications. It provides internet capability at some degree of deliberation proper to the
foundation, application, and data storage [8]. kind of service (e.g., storage, handling, bandwidth, and
dynamic client accounts). Asset utilization can be
According to the National Institute for Standards and checked, controlled, and detailed, giving
Technology (NIST), "Cloud Computing is a model that straightforwardness to both the supplier and purchaser of
empowers helpful on-demand network admittance to a the used service [3], [4].
common pool of configurable computing assets like
(network, server, storage, applications and services) that
IV. SERVICE MODELS:
can be quickly provisioned and delivered with
insignificant management effort or service supplier Service Models are the reference models on which Cloud
connection" [3], [4]. Typical instances of the technology Computing is based. These can be ordered into three
essential service models as recorded below [7], [8];

mentioned above are:


• Google Docs (make, modify, and share documents Figure 2: Cloud Computing Service Model
online), Google Search, Web-based Email (email, a) Software-as-a-Service (SaaS): The ability given to
including Gmail and Yahoo Mail), the customer to utilize the supplier's applications running
Figure 1: Cloud Computing Architecture on a cloud framework [3]. The applications are available
from different client gadgets through either a thin client
interface, like a web browser (e.g., web-based email), or a
III. ESSENTIAL CHARACTERISTICS:
program interface[9]. The shopper doesn't oversee or
1) On-Demand Self-Service. A customer can singularly control the fundamental cloud foundation including
arrange computing capacities, for example, server time network, servers, working systems, storage, or even
and network storage, depending on the situation naturally individual application abilities, with the conceivable
without requiring human association with each service exemption of restricted client explicit application setup
supplier [3], [4]. settings [3]
2) Broad Network Access. Capacities are accessible over b) Platform-as-a-Service (PaaS): The capacity given to
the network and get to through standard components that the shopper is to convey onto the cloud foundation
advance use by heterogeneous thin or thick client customer-made or gained applications utilizing
platforms (e.g., mobile telephones, tablets, PCs, and programming dialects, libraries, services, and tools
workstations) [3], [4]. upheld by the supplier. The customer doesn't oversee or
control the hidden cloud framework including network,
3) Resource Pooling. The supplier's computing assets are
servers, working systems, or storage, yet has command
pooled to serve numerous customers utilizing a
over the conveyed applications and potentially set up
multi-inhabitant model, with various physical and virtual
settings for the application-facilitating climate [3].
assets progressively doled out and reassigned by
purchaser demand. There is a feeling of area freedom in c) Infrastructure-as-a-Service (IaaS): The capacity
that the client, by and large, has no control or information given to the shopper is to arrange handling, storage,
over the specific area of the given assets however might networks, and other essential computing assets where the
have the option to indicate area at a more elevated level of buyer can convey and run self-assertive programming,
VOLUME 18, ISSUE 1, 2024 97 http://xadzkjdx.cn/
Journal of Xidian University Doi.org/10.37896/jxu18.1/011 ISSN No:1001-2400

which can incorporate working systems and applications. spatial area and transform space [13].
The customer doesn't oversee or control the fundamental
As indicated by spatial space implanting, the messages
cloud foundation yet has authority over working systems,
are inserted straightforwardly into the Least Significant
storage, and sent applications; and potentially restricted
Bits (LSBs). The most un-huge pieces (LSB) addition
control of select networking segments (e.g., have
strategy is viewed as the most widely recognized and
firewalls) [3].
easiest Steganography technique. As indicated by the
transform area installation, the messages are implanted by
V. DEPLOYMENT MODELS: adjusting the recurrence coefficients of the cover picture,
Private Cloud: The cloud foundation is provisioned for example, the Fourier transform, discrete cosine
for selective use by a solitary association involving transform or the wavelet transform [1].
different buyers (e.g., speciality units). It could be The picture steganography system includes two
claimed, overseen, and worked by the association, an calculations, one for implanting and one for extraction.
outsider, or a mix of them, and it might exist on or off The installing interaction conceals a mysterious message
premises [3], [10]. within a cover media (cover picture), and the
Community Cloud: The cloud foundation is consequence of the implanting cycle is the stego picture.
provisioned for selective use by a particular local area of The principal issue is that the mysterious message won't
customers from associations that have shared concerns be undetected if an outsider attempts to capture the cover
(e.g., mission, security necessities, strategy, and media (cover picture). The extraction interaction is
consistency contemplations). It very well might be basically because it is the opposite of the installing cycle,
claimed, overseen, and worked by at least one of the where the mysterious message is uncovered toward the
associations locally, an outsider, or a blend of them, and it end [1].
might exist on or off premises [3]. A. APPROACHES OF STEGANOGRAPHY
Public Cloud: The cloud foundation is provisioned for The steganography approaches can be isolated into three
open use by the overall population. It very well might be (3) [1];
claimed, overseen, and worked by a business, scholastic,
or government association, or a blend of them. It exists in a) Pure Steganography: It is a strategy that just uses the
the vicinity of the cloud supplier [3]. steganography approach without consolidating different
techniques. It is chipping away at concealing information
Hybrid Cloud: The cloud framework is an within the cover transporter [1].
organization of at least two unmistakable cloud
foundations (private, local area, or public) that stay
interesting elements, yet are bound together by b) Secret Key Steganography: It utilizes the blend of the
standardized or restrictive technology that empowers data mysterious key cryptography procedure and the
and application convertibility (e.g., cloud blasting for steganography approach. This kind can encode the
load-adjusting between clouds [3]. mysterious message by secret key strategy and then
shroud the scrambled data within the cover transporter
VI. CLOUD COMPUTING SECURITY [1].
REQUIREMENTS c) Public Key Steganography: It is the blend of the
• Audit: It incorporates validations and authorization, to public key cryptography approach and the steganography
guarantee the client's character by executing a solid approach. This sort can scramble the privileged
confirmation measure [11]. information utilizing the public key methodology and
then conceal the encoded data within the cover
• Confidentiality: Protect data put away in the database transporter [1].
from unapproved clients [11].
B. TYPES OF STEGANOGRAPHY
• Integrity: It is utilized to guarantee data consistency,
and to shield data from emphasis [11]. • Text Steganography: Use a text file to hide secret data
[11].
VII. STEGANOGRAPHY OVERVIEW • Image Steganography: Hide secret data in a cover
In this part, we present an outline of steganography, its image [11].
sorts, and its destinations. Steganography is the study of • Audio Steganography: Use an audio file to conceal
concealing restricted information in a media record cited secret data [11].
in [11]. Steganography as a word is the blend of two
Greek words "Oregano" and "Graphy", and the meaning • Video Steganography: Hide secret data in a video file
is "cover stating" cited in [11], [12]. [11].

Steganography is viewed as the craftsmanship and study • DNA-Based Steganography: Employ randomness of
of concealing information in other information. The word DNA to embed secret data [11].
Steganography is derived from the Greek words • Protocol Steganography: Hide secret data in network
"steganos" meaning "impenetrable" and, "grafia" protocols such as IP, TCP and UDP [11].
meaning "expressing" characterizing it as an
"impenetrable composition" [5], [8]. There are two basic C. OBJECTIVES OF STEGANOGRAPHY
procedures for picture installation in steganography; o Security: The attacker unable to detect the secret data
VOLUME 18, ISSUE 1, 2024 98 http://xadzkjdx.cn/
Journal of Xidian University Doi.org/10.37896/jxu18.1/011 ISSN No:1001-2400

o Payload (Capacity): Allow to hide a large amount of privileged information utilizing SHA-256, at that point
data in the cover object use RSA to scramble the hash worth and meeting key. In
the subsequent stage, use AES256 to encode the restricted
o Invisibility (Quality): The changes in the cover object
information. The third stage utilizes a high-level LSB
undetectable by the Human Visual System (HVS)
calculation to conceal encoded data in a cover picture.
The creators have assessed the proposed model and
VIII. JUSTIFICATION contrasted it and different models. The outcome shows
A thorough survey and analysis of the literature reveals this model gives protection from cryptanalysis and
that many research hours have been dedicated to steganalysis assaults and measurable changes and
developing steganography techniques for use with cloud delivers a stego picture with top calibre.
data. Nevertheless, it appears that these techniques are all Rahman et al. [15], [11] proposed another blend of
focused on a single field. Simultaneously, numerous encryption and steganography to get cloud data. They
scholars have emphasized the significance of cloud utilized the blowfish calculation to scramble privileged
computing and the utilization of steganography information, to implant encoded data in a cover picture
techniques to conceal data throughout the cloud. Without E-LSB calculation, and to protect the respectability of the
further explanation, cloud-computing technology delivered stego picture they utilized SHA-256. The
provides customers with several advantages. One of the examination of the proposed model presents the model
greatest advantages of cloud computing is that businesses that gives protection from measurable and visual assaults.
can concentrate on their core competencies rather than
juggling the costs of licenses, servers, and storage instead Shanthakumari and Malliga [16], [11] proposed a mix of
of focusing on IT requirements to suit business needs. the International Data Encryption Standard Algorithm
(IDEA) and Least Significant Bit Grouping (LSBG)
calculation to improve security and limit data implanting
IX. RESEARCH GAP
to the cover picture. In the implanting stage, the IDEA
Since most data is maintained and stored on third-party calculation is performed to encode restricted information,
infrastructures, the current cloud data storage system will at that point, LSBG is applied to install the scrambled data
not offer the highest level of security for organizational into the cover picture and produce a stego picture which is
data resources. For the reasons listed above, it is transferred to the cloud. In the separating stage, download
imperative that multiple security measures be applied to the stego picture from the cloud and use LSBG to
the data, and stenography techniques will ensure tight extricate the restricted information, at that point perform
data privacy and security across all layers [7]. IDEA unscrambling to decode the privileged information.
The creators have assessed the proposed strategy and
X. OBJECTIVES contrasted it and different strategies. The outcome shows
this strategy gives great security to restricted information
The main aim of the present study is to provide more produces a stego picture with the top caliber and
security and privacy in cloud data, below are the increments the installing limit.
objectives;
i) To provide more security to the cloud data travel across XII. SECURITY AND PRIVACY CHALLENGES
all layers
Cloud computing environments are multi-domain settings
ii) To improve the privacy of cloud data where distinct processes, interfaces, and semantics may
be used by each domain, each of which may have
iii) To improve the use of cloud technology in different security, privacy, and trust requirements. These
organizations domains might stand for additional application or
infrastructure components, or they could represent
XI. REVIEW OF THE RELATED LITERATURE independently enabled services. Service-oriented
Numerous strategies have been utilized to give data architectures, which enable service composition and
security whether by utilizing encryption, steganography orchestration, are a technologically appropriate means of
or a blend between them. The high-level encryption enabling such multi-domain formation. Utilizing current
standard (AES) strategy, otherwise called Rijndael, is a research on secure-service composition and multi-domain
symmetric key square code [1]. In contrast to the DES policy integration is crucial for developing an
strategy, the AES technique is a non-feistel figure that all-encompassing policy-based management framework
scrambles and decodes a data square of 128 pieces. It in cloud computing settings [6], [17].
utilizes 10, 12, or 14 rounds [1]. The primary point of the
current investigation is to give greater security and [1]. XIII. DATA-CENTRIC SECURITY AND
The key size, which can be 128, 192, or 256 pieces, and PRIVACY
the number of rounds rely upon the key size since it
permits the mysterious key to be expanded to deliver a Cloud data usually lives in a shared environment, but the
subkey for each round [1]. In this part, we audit a few owner of the data should be in complete control of who
works proposed for cloud data security utilizing may access the data and what can be done with it once
steganography strategies. they have access. A standard-based heterogeneous
data-centric security method is a necessary component
Ebrahim et al. [14], [11] consolidated encryption and that moves data protection from systems and apps to give
steganography to forestall unapproved admittance to this data management in the cloud [6]. This method
cloud data. In the proposed model, there are three stages. requires all papers, regardless of their settings, to be
In the main stage, process the hash estimation of
VOLUME 18, ISSUE 1, 2024 99 http://xadzkjdx.cn/
Journal of Xidian University Doi.org/10.37896/jxu18.1/011 ISSN No:1001-2400

self-descriptive and defensive. It is necessary to take Informatics, vol. 12, no. 1, pp. 462–471, 2023,
usage policies and cryptographic techniques into account. doi: 10.11591/eei.v12i1.4590.
The system should verify its policy rules whenever
someone requests access to data, and it should only reveal [3] G. Peter, Mell Timothy, “The NIST
the data if those criteria are met. Data security can be Definition of Cloud Computing,” in NIST
achieved through the use of existing cryptographic
National Institute of Standards And Technology
techniques, but privacy protection and outsourcing
computing require a great deal of attention as they are U.S Department of Commerce, Special
relatively new research areas. The literature has just Publication 800-145, vol. 728, 2011, pp. 269–
recently started to address data provenance issues. In 274.
certain situations, a piece of data needs to be linked to
information about a specific hardware element (storage, [4] M. M. Suleiman, Z. I. Matinja, Z. M. Aliyu,
processing, or communication) [6], [17]. and Z. Abdulkadir, “Cloud Computing Is An
Integral Tool For E-Government: Challenges
XIV. FUTURE WORK And Prospects,” Mukt Shabd J., vol. 9, no. 6, pp.
For future work during the association, I plan to improve 2824–2836, 2020, [Online]. Available:
proficient arrangements that fulfil the goals of http://shabdbooks.com
steganography. These arrangements ought to permit to
concealment of a lot of data, produce a stego picture with [5] N. K. V Islam, “Review on benefits and
the top calibre and the secret data should be undertable. security challenges of cloud computing,” Int. J.
Comput. Sci. Inf. Technol., vol. 8, no. 2, pp.
XV. CONCLUSION 224–228, 2017, [Online]. Available:
On the cloud, maintaining data security is more http://ijcsit.com/docs/Volume
challenging. When it comes to cloud computing, there is 8/vol8issue2/ijcsit2017080219.pdf
no end to what can be accomplished with this enormous
infrastructure. Users' wants are the basis for creating [6] Security and Privacy Challenges in Cloud
virtual resources and services. Concerns regarding data Computing Environments, vol. 8, no. 2. 2008,
security in the cloud are reducing users' willingness to use pp. 55–55. doi: 10.1109/mitp.2006.47.
the cloud. Although cloud computing has many benefits
for users, there are security issues. Steganography is a [7] S. Yadav, "Development of process
method for securing sensitive data on cloud servers by framework to Migrate Legacy Application to
masking sensitive data with a cover photo. As a result of Cloud Across Layers," Jayoti Vidyapeeth
this paper, a hybrid cloud security paradigm has been
Women's University, Jaipur, Rajasthan, India,
suggested that is successful. The cloud service for
steganography, encryption, and storage is isolated from 2015. doi: 10.31826/9781463235017-toc.
the rest of the service. Three methods are included in the [8] E. L. Tutorials Point Simply, Cloud
steganography service for storing data in the public,
private, and hybrid clouds. Cloud computing is used to
Computing Tutorial. 2014, p. 88. [Online].
evaluate the effectiveness of the strategies. A hybrid Available:
cloud system is more efficient when data is stored using http://www.tutorialspoint.com/cloud_computin
the described strategies. g/cloud_computing_overview.htm
XVI. ACKNOWLEDGMENT [9] D. Shuleski, A. Birsan, C. V. Cristea, and I.
Radu, “Impact of Cloud Computing
We appreciate the effort of Tertiary Education Trust Fund
(TETFund) for funding this research. We also grateful to
Technology Implementation in Public Sector,”
Kano State Polytechnic, Nigeria, my teachers, senior Int. Manag. Conf., pp. 5–7, 2016.
colleagues, editorial board and reviewers of the
[10]S. Tabassam, “Security and Privacy Issues
prestigious JXU who are helping us in one way or another
to make an effort to create this piece of the manuscript. in Cloud Computing Environment,” J. Inf.
Technol. Softw. Eng., vol. 07, no. 05, 2017, doi:
10.4172/2165-7866.1000216.
REFERENCES
[11]A. Albalawi and N. Hamza, “A Survey on
[1] M. A. A. Pujari and M. S. S. Shinde, “Data Cloud Data Security using Image
Security using Cryptography and Steganography,” vol. 11, no. 1, pp. 645–649,
Steganography,” IOSR J. Comput. Eng., vol. 18, 2020.
no. 04, pp. 130–139, 2016, doi:
10.9790/0661-180405130139. [12]N. R. K. Kesa, “Steganography - A Data
Hiding Technique,” in 2019 International
[2] A. A. Fairosebanu and A. C. N. Jebaseeli, Conference on Computational Intelligence and
“Data Security in Cloud Environment Using Knowledge Economy (ICCIKE), 2019, pp. 1–
Cryptographic Mechanism,” Bull. Electr. Eng. 91. [Online]. Available:
VOLUME 18, ISSUE 1, 2024 100 http://xadzkjdx.cn/
Journal of Xidian University Doi.org/10.37896/jxu18.1/011 ISSN No:1001-2400

https://repository.stcloudstate.edu/msia_etds/75
[13]K. Kumar and V. Singh, “REVERSE
WATERMARKING TECHNIQUE,” no.
August, 2019.
[16]R. Shanthakumari and S. Malliga,
[14]M. A. Ebrahim, I. A. M. El-Maddah, and H. “Dual-layer security of image steganography
K. Mohamed, “Hybrid model for cloud data based on IDEA and LSBG algorithm in the
security using steganography,” Proc. ICCES cloud environment,” Sadhana - Acad. Proc.
2017 12th Int. Conf. Comput. Eng. Syst., vol. Eng. Sci., vol. 44, no. 5, pp. 1–12, 2019, doi:
2018-Janua, no. March 2018, pp. 135–140, 10.1007/s12046-019-1106-0.
2018, doi: 10.1109/ICCES.2017.8275292.
[17]M. Ali, S. U. Khan, and A. V. Vasilakos,
[15]M. O. Rahman, M. K. Hossen, G. Morsad, “Security in cloud computing: Opportunities
and A. Chandra, “An Approach for Enhancing and challenges,” Inf. Sci. (Ny)., vol. 305, pp.
Security of Cloud Data using Cryptography and 357–383, 2015, doi: 10.1016/j.ins.2015.01.025.
Steganography with E-LSB Encoding
Technique,” IJCSNS Int. J. Comput. Sci. Netw.
Secure., vol. 18, no. 9, pp. 85–93, 2018.

VOLUME 18, ISSUE 1, 2024 101 http://xadzkjdx.cn/

You might also like