A Review on Security of Data in Cloud Computing Using Steganography Techniques
DOI:
https://doi.org/10.32628/CSEIT228393Keywords:
Steganography, Cloud Computing, Security, Privacy.Abstract
With the growth of information on the cloud, cloud security is seen as more essential than before. Currently, millions of users are utilizing the cloud. The security of cloud computing is exigently required, where data are being transmitted or transferred between the users and servers. Steganography is considered as the most effective techniques for securing the communication in the cloud. Steganography refers to writing hidden messages in a way that only the sender and receiver have the ability to safely know and transfer the hidden information in the means of communications. This paper review some of the recent steganography techniques that have been proposed to improve the security of data in the cloud and to make it more immune to cyber-attacks and eavesdropping.
References
- Abduallah, W. M., & Rahma, A. M. S. (2016). A Review on Steganography Techniques. American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), 131–150.
- Ahamad, T., & Aljumah, A. (2014). Cloud Computing and Steganography – Attack Threat Relation. MAGNT Research Report, 2(4), 1444–8939.
- Bokhari, M. U., Shallal, Q. M., & Tamandani, Y. K. (2016). Cloud computing service models: A comparative study. IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 16–18.
- Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, (July), 1. https://doi.org/10.1109/CCGRID.2009.97
- Garg, N., & Kaur, K. (2016). Hybrid information security model for cloud storage systems using hybrid data security scheme. International Research Journal of Engineering and Technology (IRJET), 3(4), 2194–2196.
- Ke, Q., & Dong-qing, X. (2012). An Adaptive Steganography for 3D Point Cloud Models. IEEE 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
- Mandai, S., & Bhattacharyya, S. (2015). Secret Data Sharing in Cloud Environment Using Steganography and Encryption Using GA. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 1469–1474. https://doi.org/10.1109/ICGCIoT.2015.7380699
- Mazurczyk, W., & Szczypiorski, K. (2011). Is cloud computing steganography-proof? Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011, 441–442. https://doi.org/10.1109/MINES.2011.95
- Mohis, M., & Devipriya, V. S. (2016). An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique. IEEE In Inventive Computation Technologies (ICICT).
- Murakami, K., Hanyu, R., Zhao, Q., & Kaneda, Y. (2013). Improvement of security in cloud systems based on steganography. 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013), 503–508. https://doi.org/10.1109/ICAwST.2013.6765492
- Nimmy, K., & Sethumadhavan, M. (2014). Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography. 2014 Fifth International Conference on the Applications of Digital Information and Web Technologies (Icadiwt), 101–106.
- Pant, V. K., Prakash, J., & Asthana, A. (2015). Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques. 2015 Academic Journal of Nawroz University (AJNU) 111
- International Conference on Green Computing and Internet of Things (ICGCIoT), 490–494. https://doi.org/10.1109/ICGCIoT.2015.7380514
- Patidar, S., Rane, D., & Jain, P. (2011). A survey paper on cloud computing. Proceedings - 2012 2nd International Conference on Advanced Computing and Communication Technologies, ACCT 2012, 394–398. https://doi.org/10.1109/ACCT.2012.15
- Ranjan, A., & Bhonsle, M. (2016). Advanced technics to shared & protect cloud data using multilayer steganography and cryptography. IEEE 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 35–41.
- Saini, G., & Sharma, N. (2014). Triple Security of Data in Cloud Computing. International Journal of Compuetr Science and Information Technologies, 5(4), 5825–5827.
- Saravanakumar, C., & Arun, C. (2014). An efficient ASCII-BCD based steganography for cloud security using common deployment model. Journal of Theoretical and Applied Information Technology, 65(3), 687–694.
- Sarkar, M. K., & Chatterjee, T. (2014). Enhancing Data Storage Security in Cloud Computing Through Steganography. ACEEE International Journal of Network Security Network Security, 5(1), 13–19.
- Sarvabhatla, M., M.Giri, & Vorugunti, C. S. (2014). A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography. 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
- Yang, C. L., Hwang, B. N., & Yuan, B. J. C. (2012). Key consideration factors of adopting cloud computing for science. CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, 597–600. https://doi.org/10.1109/CloudCom.2012.6427610
- Yang, C., Lin, W., & Liu, M. (2013). A novel triple encryption scheme for hadoop-based cloud data security. Proceedings - 4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013, 437–442. https://doi.org/10.1109/EIDWT.2013.80
- Wid A. Awadh & Ali S. Hashim.(2017) Using Steganography for Secure Data Storage in Cloud Computing. International Research Journal of Engineering and Technology (IRJET)
- Sreeja Cherillath Sukumaran & Misbahuddin Mohammed.(2018) “DNA Cryptography for Secure Data Storage in Cloud” International Journal of Network Security, Vol.20, No.3, PP.447-454
- Osama Hosam.2019 “Hybrid Design for Cloud Data Security Using Combination of AES, ECC and LSB-Steganography” International Journal of Computational Science and Engineering
- Denis R & Madhubala P.(2020) “Evolutionary Computing Assisted VisuallyImperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment” International Journal of Computer Networks and Applications (IJCNA)
- Lalit Kumar, Sanjeev Kumar Mandal, Srinivasan S, Omkar Singh, Sabari Giri Murugan.(2021) “A Secure Communication with One Time Pad Encryption and Steganography Method in cloud Turkish Journal of Computer and Mathematics Education2021
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.