Professional Documents
Culture Documents
Bengaluru-560064
1) Abstract
2) Introduction
3) Literature Survey
4) Methodology
5) Results & Discussions
6) Conclusion
7) Future Scope
8) References
A Novel Cryptography and Steganographic Approach for secure Cloud Data Migration design
for cloud architecture which ensures secure data transmission from the client’s organization
to the servers of the Cloud Service provider.
Secure Cloud Data Migration is combined approach of cryptography and steganography
because it will provide a two way security to the data being transmitted on the network.
First, the data gets converted into a coded format through the use of encryption algorithm
and then this coded format data is again converted into a rough image through the use of
steganography.
Moreover, steganography also hides the existence of the message, thereby ensuring that the
chances of data being tampered are minimal.
H e l l o
o 5 ‘ ‘ !
• Hello will be Encrypted as o5’ ‘ !, similarly every text in the file is converted into
cypher text and we will apply LSB steganography on it.
LSB Steganography
Digital Image- it’s a finite set of digital value called pixel, and thousands of pixel together
cloud
makeup an image.
Each pixel has 3 color component RGB, and RGB can be represented
as 3 set of 8bits.
1 1 1 1 1 1 1 1
R
pixel
G
MSB LSB
B
Most Significant Bit Less Significant Bit
• In cryptography process, we make use of very simple yet effective technique for data encryption using one’s
complement method which we called as Secure Cloud Migration Architecture using Cryptography and
Steganography.
• It used symmetric key method where both sender and receiver share the same key for encryption and
decryption.
• The strength of the approach lies in the fact thatcloud
the symmetric key method generates a dynamic value for the
private Key which makes it very safe because no one can have the private key and even some one gain access
to it, it gets changed for each data that needs to be transferred.
• In Steganography part, we used the LSB method that is used and mostly preferred.
3)More data can be hidden with the help of video Steganography here the movie still plays, The size of the movie
does increase slightly based on the hidden container, but nothing that would be noticed through casual
inspection. It is quite difficult to detect the presence of the embedded TrueCrypt container without specialized
detection technology This helps to send the confidential data’s about the state or country.
4) several information sources like our private banking information, some military secrets, can be stored in a
cover source. When we are required to unhide the secret information in our cover source, we can easily reveal
our banking data and it will be impossible to prove the existence of the military secrets inside.
[1]. Chetan Gudisagar, Bibhu Ranjan Sahoo, Sushma M and Jaidhar CD “Secure Data Migration between Cloud
StorageSystems” 2017 IEEE.
[2]. S. Rajeswari, R. Kalaiselvi “Survey of data and storage security in cloud computing” Proceedings of 2017
IEEE International Conference on Circuits and Systems (ICCS 2017).
cloud
[3]. Sevierda Raniprima, Bambang Hidayat, Nur Andini “Digital Image Steganography with Encryption Based on
Rubik’s Cube Principle” The 2016 International Conference on Control, Electronics, Renewable Energy and
Communications (ICCEREC) 2016 IEEE.
[4]. Moshira A. Ebrahim, Islam A. M. El-Maddah, hoda K. Mohamed “Hybrid Model for Cloud Data Security using
Steganography” Proceedings of 2017 IEEE International Conference on Circuits and Systems.
[5]. Ankit Dhamija, Research Scholar “A Novel Cryptographic and Steganographic Approach for Secure Cloud
Data Migration” @2018 IEEE.