Professional Documents
Culture Documents
JXU Article Applying Diff Stenography Techq in CC
JXU Article Applying Diff Stenography Techq in CC
1
Muhammad Muhammad SULEIMAN, 2Muhammad Bello ALIYU & 3Zainab Jibril AHMED
1
Kano State Polytechnic, Nigeria, ORCID: (0000-0002-3646-3715),
2
Computer Professionals (Registration Council of Nigeria), Federal Ministry of Education
3
Yusuf Maitama Sule University, Kano, Nigeria
ABSTRACT - The term "cloud computing" describes a broad range of services that let people offshore their data without
worrying about problems with local storage. Instead of depending on dubious service providers, the most urgent problem to be
solved is keeping a safe and dependable data repository. This paper examines how combining stenography techniques with
digital watermarking can significantly enhance system performance and data security when used in cloud computing. Safe
data management in cloud environments is necessary for such systems, where data is exchanged or transmitted between servers
and users. Steganography, or cloud steganography, is one of the best ways to communicate securely. Writing coded messages
such that only the sender and recipient can securely decipher and view the data concealed in the communication channel is
known as steganography. To guarantee data security in cloud computing, this paper introduces a novel text steganography
technique for concealing a loaded hidden English text file inside a cover English text file. The suggested method enhances
time, data hiding capacity, and data protection.
which can incorporate working systems and applications. spatial area and transform space [13].
The customer doesn't oversee or control the fundamental
As indicated by spatial space implanting, the messages
cloud foundation yet has authority over working systems,
are inserted straightforwardly into the Least Significant
storage, and sent applications; and potentially restricted
Bits (LSBs). The most un-huge pieces (LSB) addition
control of select networking segments (e.g., have
strategy is viewed as the most widely recognized and
firewalls) [3].
easiest Steganography technique. As indicated by the
transform area installation, the messages are implanted by
V. DEPLOYMENT MODELS: adjusting the recurrence coefficients of the cover picture,
Private Cloud: The cloud foundation is provisioned for example, the Fourier transform, discrete cosine
for selective use by a solitary association involving transform or the wavelet transform [1].
different buyers (e.g., speciality units). It could be The picture steganography system includes two
claimed, overseen, and worked by the association, an calculations, one for implanting and one for extraction.
outsider, or a mix of them, and it might exist on or off The installing interaction conceals a mysterious message
premises [3], [10]. within a cover media (cover picture), and the
Community Cloud: The cloud foundation is consequence of the implanting cycle is the stego picture.
provisioned for selective use by a particular local area of The principal issue is that the mysterious message won't
customers from associations that have shared concerns be undetected if an outsider attempts to capture the cover
(e.g., mission, security necessities, strategy, and media (cover picture). The extraction interaction is
consistency contemplations). It very well might be basically because it is the opposite of the installing cycle,
claimed, overseen, and worked by at least one of the where the mysterious message is uncovered toward the
associations locally, an outsider, or a blend of them, and it end [1].
might exist on or off premises [3]. A. APPROACHES OF STEGANOGRAPHY
Public Cloud: The cloud foundation is provisioned for The steganography approaches can be isolated into three
open use by the overall population. It very well might be (3) [1];
claimed, overseen, and worked by a business, scholastic,
or government association, or a blend of them. It exists in a) Pure Steganography: It is a strategy that just uses the
the vicinity of the cloud supplier [3]. steganography approach without consolidating different
techniques. It is chipping away at concealing information
Hybrid Cloud: The cloud framework is an within the cover transporter [1].
organization of at least two unmistakable cloud
foundations (private, local area, or public) that stay
interesting elements, yet are bound together by b) Secret Key Steganography: It utilizes the blend of the
standardized or restrictive technology that empowers data mysterious key cryptography procedure and the
and application convertibility (e.g., cloud blasting for steganography approach. This kind can encode the
load-adjusting between clouds [3]. mysterious message by secret key strategy and then
shroud the scrambled data within the cover transporter
VI. CLOUD COMPUTING SECURITY [1].
REQUIREMENTS c) Public Key Steganography: It is the blend of the
• Audit: It incorporates validations and authorization, to public key cryptography approach and the steganography
guarantee the client's character by executing a solid approach. This sort can scramble the privileged
confirmation measure [11]. information utilizing the public key methodology and
then conceal the encoded data within the cover
• Confidentiality: Protect data put away in the database transporter [1].
from unapproved clients [11].
B. TYPES OF STEGANOGRAPHY
• Integrity: It is utilized to guarantee data consistency,
and to shield data from emphasis [11]. • Text Steganography: Use a text file to hide secret data
[11].
VII. STEGANOGRAPHY OVERVIEW • Image Steganography: Hide secret data in a cover
In this part, we present an outline of steganography, its image [11].
sorts, and its destinations. Steganography is the study of • Audio Steganography: Use an audio file to conceal
concealing restricted information in a media record cited secret data [11].
in [11]. Steganography as a word is the blend of two
Greek words "Oregano" and "Graphy", and the meaning • Video Steganography: Hide secret data in a video file
is "cover stating" cited in [11], [12]. [11].
Steganography is viewed as the craftsmanship and study • DNA-Based Steganography: Employ randomness of
of concealing information in other information. The word DNA to embed secret data [11].
Steganography is derived from the Greek words • Protocol Steganography: Hide secret data in network
"steganos" meaning "impenetrable" and, "grafia" protocols such as IP, TCP and UDP [11].
meaning "expressing" characterizing it as an
"impenetrable composition" [5], [8]. There are two basic C. OBJECTIVES OF STEGANOGRAPHY
procedures for picture installation in steganography; o Security: The attacker unable to detect the secret data
VOLUME 18, ISSUE 1, 2024 98 http://xadzkjdx.cn/
Journal of Xidian University Doi.org/10.37896/jxu18.1/011 ISSN No:1001-2400
o Payload (Capacity): Allow to hide a large amount of privileged information utilizing SHA-256, at that point
data in the cover object use RSA to scramble the hash worth and meeting key. In
the subsequent stage, use AES256 to encode the restricted
o Invisibility (Quality): The changes in the cover object
information. The third stage utilizes a high-level LSB
undetectable by the Human Visual System (HVS)
calculation to conceal encoded data in a cover picture.
The creators have assessed the proposed model and
VIII. JUSTIFICATION contrasted it and different models. The outcome shows
A thorough survey and analysis of the literature reveals this model gives protection from cryptanalysis and
that many research hours have been dedicated to steganalysis assaults and measurable changes and
developing steganography techniques for use with cloud delivers a stego picture with top calibre.
data. Nevertheless, it appears that these techniques are all Rahman et al. [15], [11] proposed another blend of
focused on a single field. Simultaneously, numerous encryption and steganography to get cloud data. They
scholars have emphasized the significance of cloud utilized the blowfish calculation to scramble privileged
computing and the utilization of steganography information, to implant encoded data in a cover picture
techniques to conceal data throughout the cloud. Without E-LSB calculation, and to protect the respectability of the
further explanation, cloud-computing technology delivered stego picture they utilized SHA-256. The
provides customers with several advantages. One of the examination of the proposed model presents the model
greatest advantages of cloud computing is that businesses that gives protection from measurable and visual assaults.
can concentrate on their core competencies rather than
juggling the costs of licenses, servers, and storage instead Shanthakumari and Malliga [16], [11] proposed a mix of
of focusing on IT requirements to suit business needs. the International Data Encryption Standard Algorithm
(IDEA) and Least Significant Bit Grouping (LSBG)
calculation to improve security and limit data implanting
IX. RESEARCH GAP
to the cover picture. In the implanting stage, the IDEA
Since most data is maintained and stored on third-party calculation is performed to encode restricted information,
infrastructures, the current cloud data storage system will at that point, LSBG is applied to install the scrambled data
not offer the highest level of security for organizational into the cover picture and produce a stego picture which is
data resources. For the reasons listed above, it is transferred to the cloud. In the separating stage, download
imperative that multiple security measures be applied to the stego picture from the cloud and use LSBG to
the data, and stenography techniques will ensure tight extricate the restricted information, at that point perform
data privacy and security across all layers [7]. IDEA unscrambling to decode the privileged information.
The creators have assessed the proposed strategy and
X. OBJECTIVES contrasted it and different strategies. The outcome shows
this strategy gives great security to restricted information
The main aim of the present study is to provide more produces a stego picture with the top caliber and
security and privacy in cloud data, below are the increments the installing limit.
objectives;
i) To provide more security to the cloud data travel across XII. SECURITY AND PRIVACY CHALLENGES
all layers
Cloud computing environments are multi-domain settings
ii) To improve the privacy of cloud data where distinct processes, interfaces, and semantics may
be used by each domain, each of which may have
iii) To improve the use of cloud technology in different security, privacy, and trust requirements. These
organizations domains might stand for additional application or
infrastructure components, or they could represent
XI. REVIEW OF THE RELATED LITERATURE independently enabled services. Service-oriented
Numerous strategies have been utilized to give data architectures, which enable service composition and
security whether by utilizing encryption, steganography orchestration, are a technologically appropriate means of
or a blend between them. The high-level encryption enabling such multi-domain formation. Utilizing current
standard (AES) strategy, otherwise called Rijndael, is a research on secure-service composition and multi-domain
symmetric key square code [1]. In contrast to the DES policy integration is crucial for developing an
strategy, the AES technique is a non-feistel figure that all-encompassing policy-based management framework
scrambles and decodes a data square of 128 pieces. It in cloud computing settings [6], [17].
utilizes 10, 12, or 14 rounds [1]. The primary point of the
current investigation is to give greater security and [1]. XIII. DATA-CENTRIC SECURITY AND
The key size, which can be 128, 192, or 256 pieces, and PRIVACY
the number of rounds rely upon the key size since it
permits the mysterious key to be expanded to deliver a Cloud data usually lives in a shared environment, but the
subkey for each round [1]. In this part, we audit a few owner of the data should be in complete control of who
works proposed for cloud data security utilizing may access the data and what can be done with it once
steganography strategies. they have access. A standard-based heterogeneous
data-centric security method is a necessary component
Ebrahim et al. [14], [11] consolidated encryption and that moves data protection from systems and apps to give
steganography to forestall unapproved admittance to this data management in the cloud [6]. This method
cloud data. In the proposed model, there are three stages. requires all papers, regardless of their settings, to be
In the main stage, process the hash estimation of
VOLUME 18, ISSUE 1, 2024 99 http://xadzkjdx.cn/
Journal of Xidian University Doi.org/10.37896/jxu18.1/011 ISSN No:1001-2400
self-descriptive and defensive. It is necessary to take Informatics, vol. 12, no. 1, pp. 462–471, 2023,
usage policies and cryptographic techniques into account. doi: 10.11591/eei.v12i1.4590.
The system should verify its policy rules whenever
someone requests access to data, and it should only reveal [3] G. Peter, Mell Timothy, “The NIST
the data if those criteria are met. Data security can be Definition of Cloud Computing,” in NIST
achieved through the use of existing cryptographic
National Institute of Standards And Technology
techniques, but privacy protection and outsourcing
computing require a great deal of attention as they are U.S Department of Commerce, Special
relatively new research areas. The literature has just Publication 800-145, vol. 728, 2011, pp. 269–
recently started to address data provenance issues. In 274.
certain situations, a piece of data needs to be linked to
information about a specific hardware element (storage, [4] M. M. Suleiman, Z. I. Matinja, Z. M. Aliyu,
processing, or communication) [6], [17]. and Z. Abdulkadir, “Cloud Computing Is An
Integral Tool For E-Government: Challenges
XIV. FUTURE WORK And Prospects,” Mukt Shabd J., vol. 9, no. 6, pp.
For future work during the association, I plan to improve 2824–2836, 2020, [Online]. Available:
proficient arrangements that fulfil the goals of http://shabdbooks.com
steganography. These arrangements ought to permit to
concealment of a lot of data, produce a stego picture with [5] N. K. V Islam, “Review on benefits and
the top calibre and the secret data should be undertable. security challenges of cloud computing,” Int. J.
Comput. Sci. Inf. Technol., vol. 8, no. 2, pp.
XV. CONCLUSION 224–228, 2017, [Online]. Available:
On the cloud, maintaining data security is more http://ijcsit.com/docs/Volume
challenging. When it comes to cloud computing, there is 8/vol8issue2/ijcsit2017080219.pdf
no end to what can be accomplished with this enormous
infrastructure. Users' wants are the basis for creating [6] Security and Privacy Challenges in Cloud
virtual resources and services. Concerns regarding data Computing Environments, vol. 8, no. 2. 2008,
security in the cloud are reducing users' willingness to use pp. 55–55. doi: 10.1109/mitp.2006.47.
the cloud. Although cloud computing has many benefits
for users, there are security issues. Steganography is a [7] S. Yadav, "Development of process
method for securing sensitive data on cloud servers by framework to Migrate Legacy Application to
masking sensitive data with a cover photo. As a result of Cloud Across Layers," Jayoti Vidyapeeth
this paper, a hybrid cloud security paradigm has been
Women's University, Jaipur, Rajasthan, India,
suggested that is successful. The cloud service for
steganography, encryption, and storage is isolated from 2015. doi: 10.31826/9781463235017-toc.
the rest of the service. Three methods are included in the [8] E. L. Tutorials Point Simply, Cloud
steganography service for storing data in the public,
private, and hybrid clouds. Cloud computing is used to
Computing Tutorial. 2014, p. 88. [Online].
evaluate the effectiveness of the strategies. A hybrid Available:
cloud system is more efficient when data is stored using http://www.tutorialspoint.com/cloud_computin
the described strategies. g/cloud_computing_overview.htm
XVI. ACKNOWLEDGMENT [9] D. Shuleski, A. Birsan, C. V. Cristea, and I.
Radu, “Impact of Cloud Computing
We appreciate the effort of Tertiary Education Trust Fund
(TETFund) for funding this research. We also grateful to
Technology Implementation in Public Sector,”
Kano State Polytechnic, Nigeria, my teachers, senior Int. Manag. Conf., pp. 5–7, 2016.
colleagues, editorial board and reviewers of the
[10]S. Tabassam, “Security and Privacy Issues
prestigious JXU who are helping us in one way or another
to make an effort to create this piece of the manuscript. in Cloud Computing Environment,” J. Inf.
Technol. Softw. Eng., vol. 07, no. 05, 2017, doi:
10.4172/2165-7866.1000216.
REFERENCES
[11]A. Albalawi and N. Hamza, “A Survey on
[1] M. A. A. Pujari and M. S. S. Shinde, “Data Cloud Data Security using Image
Security using Cryptography and Steganography,” vol. 11, no. 1, pp. 645–649,
Steganography,” IOSR J. Comput. Eng., vol. 18, 2020.
no. 04, pp. 130–139, 2016, doi:
10.9790/0661-180405130139. [12]N. R. K. Kesa, “Steganography - A Data
Hiding Technique,” in 2019 International
[2] A. A. Fairosebanu and A. C. N. Jebaseeli, Conference on Computational Intelligence and
“Data Security in Cloud Environment Using Knowledge Economy (ICCIKE), 2019, pp. 1–
Cryptographic Mechanism,” Bull. Electr. Eng. 91. [Online]. Available:
VOLUME 18, ISSUE 1, 2024 100 http://xadzkjdx.cn/
Journal of Xidian University Doi.org/10.37896/jxu18.1/011 ISSN No:1001-2400
https://repository.stcloudstate.edu/msia_etds/75
[13]K. Kumar and V. Singh, “REVERSE
WATERMARKING TECHNIQUE,” no.
August, 2019.
[16]R. Shanthakumari and S. Malliga,
[14]M. A. Ebrahim, I. A. M. El-Maddah, and H. “Dual-layer security of image steganography
K. Mohamed, “Hybrid model for cloud data based on IDEA and LSBG algorithm in the
security using steganography,” Proc. ICCES cloud environment,” Sadhana - Acad. Proc.
2017 12th Int. Conf. Comput. Eng. Syst., vol. Eng. Sci., vol. 44, no. 5, pp. 1–12, 2019, doi:
2018-Janua, no. March 2018, pp. 135–140, 10.1007/s12046-019-1106-0.
2018, doi: 10.1109/ICCES.2017.8275292.
[17]M. Ali, S. U. Khan, and A. V. Vasilakos,
[15]M. O. Rahman, M. K. Hossen, G. Morsad, “Security in cloud computing: Opportunities
and A. Chandra, “An Approach for Enhancing and challenges,” Inf. Sci. (Ny)., vol. 305, pp.
Security of Cloud Data using Cryptography and 357–383, 2015, doi: 10.1016/j.ins.2015.01.025.
Steganography with E-LSB Encoding
Technique,” IJCSNS Int. J. Comput. Sci. Netw.
Secure., vol. 18, no. 9, pp. 85–93, 2018.