Data Security in Cloud Computing Using Steganography: A Review

被引:0
|
作者
AlKhamese, Aya Y. [1 ]
Shabana, Wafaa R. [1 ]
Hanafy, Ibrahim M. [2 ]
机构
[1] Port Said Univ, Fac Engn, Dept Phys & Engn Math, Port Said, Egypt
[2] Port Said Univ, Fac Sci, Dept Math & Comp Sci, Port Said, Egypt
关键词
Cloud Computing; Steganogrphy; Cryptography; LSB; DCT; information hiding;
D O I
10.1109/itce.2019.8646434
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is one of the largest developments in the field of information technology during recent years. It is a service oriented computing which offers everything as a service via the internet by the pay-as-you-go model. It becomes more desirable for all organizations (such as education, banking, healthcare and manufacturing) and also for personal use as it provides a flexible, scalable, and reliable infrastructure and services. For the user, the most important issue is to store, retrieve and transmit the data over the cloud network and storage in a secure manner. Steganography and cryptography are some of the security techniques applied in the cloud to secure the user data transmitting. The objective of steganography is to hide the existence of communication from the unintended users; whereas cryptography encrypts the data to make it more secure. Steganography is considered as the most effective technique for securing the communication in the cloud. Digital images are most commonly used as a cover medium in steganography. In the literature, there exist several image steganography techniques for hiding information in images; which were developed and implemented in the time domain as well as in the frequency domain. Fundamentals of spatial domain and frequency domain techniques are reviewed in this paper with emphasis on the Least Significant Bit (LSB) and the Discrete Cosine Transform (DCT) techniques.
引用
收藏
页码:549 / 558
页数:10
相关论文
共 50 条
  • [1] Security as a Service using Data Steganography in Cloud
    Ramachandran, Anitha Balaji
    Paramjothi, Pradeepan
    Mukherjee, Saswati
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 81 - 90
  • [2] Hybrid Model for Cloud Data Security using Steganography
    Ebrahim, Moshira A.
    El-Maddah, Islam A. M.
    Mohamed, Hoda K.
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 135 - 140
  • [3] A Survey on Cloud Data Security using Image Steganography
    Albalawi, Afrah
    Hamza, Nermin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 645 - 649
  • [4] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
    Garg, Priyansha
    Sharma, Moolchand
    Agrawal, Shivani
    Kumar, Yastika
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
  • [5] Data Access Security in Cloud Computing: A Review
    Markandey, Anagha
    Dhamdhere, Prajakta
    Gajmal, Yogesh
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 633 - 636
  • [6] Cloud Computing USING DATA IN THE CLOUD—WHAT IT MEANS FOR DATA SECURITY
    Ward, Stuart
    Lab Manager, 2019, 14 (09): : 24 - 27
  • [7] Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques
    Pant, Vinay Kumar
    Prakash, Jyoti
    Asthana, Amit
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 490 - 494
  • [8] Data Security Implementations in Cloud Computing: A Critical Review
    Firdhous, M. F. M.
    Hussien, Naseer Ali
    2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY RESEARCH (ICITR), 2018,
  • [9] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537
  • [10] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) : 2517 - 2527