You are on page 1of 16

Department of Computer Science and Engineering

Bengaluru-560064

A Novel Cryptography and Steganographic


Approach for Secure Cloud Data Migration
Presented By Under the guidance of
SACHIN KUMAR S Mr. Anand R
Assistant Professor
1BY15CS075 Department of CSE
Contents

1) Abstract
2) Introduction
3) Literature Survey
4) Methodology
5) Results & Discussions
6) Conclusion
7) Future Scope
8) References

Dept. of CSE, BMS Institute of Technology. 1


Abstract

A Novel Cryptography and Steganographic Approach for secure Cloud Data Migration design
for cloud architecture which ensures secure data transmission from the client’s organization
to the servers of the Cloud Service provider.
Secure Cloud Data Migration is combined approach of cryptography and steganography
because it will provide a two way security to the data being transmitted on the network.
First, the data gets converted into a coded format through the use of encryption algorithm
and then this coded format data is again converted into a rough image through the use of
steganography.
Moreover, steganography also hides the existence of the message, thereby ensuring that the
chances of data being tampered are minimal.

Dept. of CSE, BMS Institute of Technology. 2


Introduction
• Cloud Data migration is the process of moving data, applications or other business elements
to a Cloud Migration environment.
• In the Cloud Data Migration the user’s privacy and ensuring secure data migration of their
most valuable data is one of the major challenges among the list of challenges being posed
by the cloud platforms. To ensure such high level data security, the Cloud Service Providers
generally use the process of cryptography.
• Cryptography is a method of storing and transmitting data in a particular form so that only
those for whom it is intended can read and process it.
• In complex systems like Cloud, where data needs to reside at different geographic locations,
securing data with only cryptography approach might not serve the purpose of data security
as cryptography cannot hide the existence of data from being transmitted on the network.
• Another technique that can help in this situation is Steganography, Steganography is data
hidden within data( video, audio, image). Steganography is an encryption technique that can
be used along with cryptography as an extra-secure method to protect data.

Dept. of CSE, BMS Institute of Technology. 3


Literature Survey
SL. Paper Title Authors Ideas
No
This paper is aimed as an attempt to enable secure
[1] Secure Data Migration Chetan Gudisagar data migration among cloud storage systems. The
between Cloud Storage Bibhu Ranjan Sahoo concept of mutual authentication between two
Systems Sushma M parties using nonce messages is extended to three
parties, by combining with key splitting and sharing
techniques to achieve secure data migration.
1) Cloud security handles the weakness and
susceptibility of cloud computing
[2] Survey of data and S. Rajeswari, 2) Data security ensures the privacy and
storage security in R. Kalaiselvi confidentiality of shared data while the storage
cloud computing security ensures the correctness of the uploaded
data stored in untrustworthy cloud servers. But
cloud computing has many challenges regarding
both data and storage security
Dept. of CSE, BMS Institute of Technology. 4
Literature Survey
SL. Paper Title Authors Ideas
No
steganography is combined with encryption in order
Digital Image Sevierda Raniprima , to improve Security. When transmitting secret
[3] Steganography with Bambang Hidayat , information, information is encrypted using DES first
Encryption Based on Nur Andini
and then information is inserted in image through
Rubik’s Cube Principle LSB steganography. Encryption changes the statistical
characteristics of Information, enhancing
antidetection of image steganography.
1) Storing sensitive data in the cloud makes data
Hybrid Model for Moshira A. Ebrahim, security an important issue. Maintaining data
[4] Cloud Data Security Islam A. M. El- availability and providing the highest level of security
using Steganography Maddah, at the same time is a challenging task.
hoda K. Mohamed 2) Cryptography is the science by which data is
transmitted and retrieved securely in insecure
channels.

Dept. of CSE, BMS Institute of Technology. 5


Literature Survey

SL. Paper Title Authors Ideas


No
1)Traditional cryptographic techniques to
[5] Cryptographic and achieve data encryption and visuals
Steganographic Ankit Dhamija steganography algorithms have been used to
Approach for Secure hide the encrypted data.
Cloud Data Migration 2) Multiple cryptography proposed where the
data was encrypted into a cypher and the
cypher will be hidden into a multimedia
image file in the encrypted format.

Dept. of CSE, BMS Institute of Technology. 6


Methodology
Secure Cloud Migration Architecture using
Cryptography and Steganography(SCMACS)
STEPS:
• Client or Sender choose a Cloud Service CSP
Provider, subscribes to a plan offered by
it and creates his account on their Data +Stego Stego
Encryption Object
website. Image
Cloud
• Client selects data to be uploaded on the sender receiver
CSP’s website. CSP
• Before feeding the secret information
into steganography encoder the sender Data Stego Stego
performs data encryption, that is he Decryption Object - Image
converts the original data files of clients
into a secret coded format using a strict
encryption algorithm. cloud Figure 1:depicts the basic block diagram of SCMACS

Dept. of CSE, BMS Institute of Technology. 7


Methodology

• Along with Cypher text, Stego key is fed into


the steganography encoder for extra security
Stego image and cover file which is the file we will use to
hide the information.
• Embedding process is happen in
Steganographic Encoder which generates a
Stego Image. This Stego Image is looks exactly
Cloud like a cover object.
• Now the Stego Image will Store in the cloud.
• On the other end receiver will request
Stego Image particular message from the cloud.
• Stego image along with stego key is then fed
to the steganographic decoder and we get
cypher text.
Figure 2: Steganographycloud
model with Encryption • In order to get the secret message, he uses
decryption algorithm on cypher text

Dept. of CSE, BMS Institute of Technology. 8


Results & Discussions

H e l l o

o 5 ‘ ‘ !

Figure 3: Demonstration of Encryption Approach


Consider Hello is the message we need to store in cloud, 1st process is to Encrypt that Message like Shown
Above.
Dept. of CSE, BMS Institute of Technology 9
Results & Discussion

• Hello will be Encrypted as o5’ ‘ !, similarly every text in the file is converted into
cypher text and we will apply LSB steganography on it.
LSB Steganography
Digital Image- it’s a finite set of digital value called pixel, and thousands of pixel together
cloud
makeup an image.
Each pixel has 3 color component RGB, and RGB can be represented
as 3 set of 8bits.
1 1 1 1 1 1 1 1
R
pixel

G
MSB LSB
B
Most Significant Bit Less Significant Bit

Dept. of CSE, BMS Institute of Technology. 10


Results & Discussion
• Now Consider first letter of Cypher text and the decimal value of ‘o’ is 111 and Binary equivalent of 111 is
‘01101111’
• we will take this letter and put it in image that is,
we consider the following grid as 3 pixels of a 24-bit color image:
(R1) (G1) (B1) (R2) (G2) (B2) (R3) (G3) (B3)
cloud
(00100111 11101000 11001000) ,(00100111 11001000 11101000), (11001000 00100110 11101001)
0110 1111

The text can be hidden in a small part


of the image according to the length of 0- 00100110 (R1) 1- 11001001 (G2)
that text. So, there must be something 1- 11101001 (G1) 1- 11101001 (B2)
to indicate that here we reached the
end of the text. The indicator is simply
1- 11001001 (B1) 1- 11001001 (R3)
8 consecutive zeros. 0- 00100110 (R2) 1- 00100111 (G3)

Dept. of CSE, BMS Institute of Technology. 11


Results & Discussion
Extracting the text from the image Just pass
through the pixels of the image until you
find 8 consecutive zeros. As we are passing,
pick the LSB from each pixel element(R, G, B)
and attach it into an empty value.
When the 8 bits of this value are done,
receiver is going to get the cypher text.
cloud
To decrypt Cypher text and bring back in the
plaintext form, we need to follow the
following approach as shown in the table 4.

Table 4: The Decryption Process

Dept. of CSE, BMS Institute of Technology. 12


Conclusion

• In cryptography process, we make use of very simple yet effective technique for data encryption using one’s
complement method which we called as Secure Cloud Migration Architecture using Cryptography and
Steganography.
• It used symmetric key method where both sender and receiver share the same key for encryption and
decryption.
• The strength of the approach lies in the fact thatcloud
the symmetric key method generates a dynamic value for the
private Key which makes it very safe because no one can have the private key and even some one gain access
to it, it gets changed for each data that needs to be transferred.
• In Steganography part, we used the LSB method that is used and mostly preferred.

Table 4: The Decryption Process

Dept. of CSE, BMS Institute of Technology. 13


Future Scope

1) Steganography on the World Wide Web:


The world wide web(www) makes extensive use of inline Images. There are literally millions of images on various
web pages worldwide. It may be possible to develop an application to serve as a web browser to retrieve data
embedded in web page images. This “ stego-web” could operate on top of the existing WWW and be a means of
covertly disseminating information.
cloud
2)By combining more technique we can increase the capacity, and the system will become more secure.

3)More data can be hidden with the help of video Steganography here the movie still plays, The size of the movie
does increase slightly based on the hidden container, but nothing that would be noticed through casual
inspection. It is quite difficult to detect the presence of the embedded TrueCrypt container without specialized
detection technology This helps to send the confidential data’s about the state or country.

4) several information sources like our private banking information, some military secrets, can be stored in a
cover source. When we are required to unhide the secret information in our cover source, we can easily reveal
our banking data and it will be impossible to prove the existence of the military secrets inside.

Dept. of CSE, BMS Institute of Technology. 14


References

[1]. Chetan Gudisagar, Bibhu Ranjan Sahoo, Sushma M and Jaidhar CD “Secure Data Migration between Cloud
StorageSystems” 2017 IEEE.

[2]. S. Rajeswari, R. Kalaiselvi “Survey of data and storage security in cloud computing” Proceedings of 2017
IEEE International Conference on Circuits and Systems (ICCS 2017).
cloud
[3]. Sevierda Raniprima, Bambang Hidayat, Nur Andini “Digital Image Steganography with Encryption Based on
Rubik’s Cube Principle” The 2016 International Conference on Control, Electronics, Renewable Energy and
Communications (ICCEREC) 2016 IEEE.

[4]. Moshira A. Ebrahim, Islam A. M. El-Maddah, hoda K. Mohamed “Hybrid Model for Cloud Data Security using
Steganography” Proceedings of 2017 IEEE International Conference on Circuits and Systems.

[5]. Ankit Dhamija, Research Scholar “A Novel Cryptographic and Steganographic Approach for Secure Cloud
Data Migration” @2018 IEEE.

Dept. of CSE, BMS Institute of Technology. 15

You might also like