Data Security in Cloud Computing Using Steganography: A Review

被引:0
|
作者
AlKhamese, Aya Y. [1 ]
Shabana, Wafaa R. [1 ]
Hanafy, Ibrahim M. [2 ]
机构
[1] Port Said Univ, Fac Engn, Dept Phys & Engn Math, Port Said, Egypt
[2] Port Said Univ, Fac Sci, Dept Math & Comp Sci, Port Said, Egypt
关键词
Cloud Computing; Steganogrphy; Cryptography; LSB; DCT; information hiding;
D O I
10.1109/itce.2019.8646434
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is one of the largest developments in the field of information technology during recent years. It is a service oriented computing which offers everything as a service via the internet by the pay-as-you-go model. It becomes more desirable for all organizations (such as education, banking, healthcare and manufacturing) and also for personal use as it provides a flexible, scalable, and reliable infrastructure and services. For the user, the most important issue is to store, retrieve and transmit the data over the cloud network and storage in a secure manner. Steganography and cryptography are some of the security techniques applied in the cloud to secure the user data transmitting. The objective of steganography is to hide the existence of communication from the unintended users; whereas cryptography encrypts the data to make it more secure. Steganography is considered as the most effective technique for securing the communication in the cloud. Digital images are most commonly used as a cover medium in steganography. In the literature, there exist several image steganography techniques for hiding information in images; which were developed and implemented in the time domain as well as in the frequency domain. Fundamentals of spatial domain and frequency domain techniques are reviewed in this paper with emphasis on the Least Significant Bit (LSB) and the Discrete Cosine Transform (DCT) techniques.
引用
收藏
页码:549 / 558
页数:10
相关论文
共 50 条
  • [21] Review of cloud computing security
    School of Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China
    Tien Tzu Hsueh Pao, 2013, 2 (371-381):
  • [22] Using data taxonomy to achieve security in cloud computing
    Ennajjar, Ibtissam
    Tabii, Youness
    Benkaddour, Abdelhamid
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2019, 60 (04) : 333 - 338
  • [23] Providing data security using DNA computing in the cloud computing environment
    Kumar, Tarun
    Namasudra, Suyel
    Kumar, Prabhat
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2023, 19 (04) : 463 - 486
  • [24] Data Security in Cloud Computing Using AES Under HEROKU Cloud
    Lee, Bih-Hwang
    Dewi, Ervin Kusuma
    Wajdi, Muhammad Farid
    2018 27TH WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2018, : 242 - 246
  • [25] A Short Review on Data Security and Privacy Issues in Cloud Computing
    Arjun, U.
    Vinay, S.
    2016 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC), 2016,
  • [26] Data Security Challenges and Solutions in Cloud Computing: Critical Review
    Al-Otaibi, Shuruq Zayed
    COMMUNICATIONS IN MATHEMATICS AND APPLICATIONS, 2022, 13 (02): : 795 - 806
  • [27] DATA SECURITY IN CLOUD COMPUTING USING CRAMER - SHOUP CRYPTOSYSTEM
    Raju, S.
    Sirajudeen, Y. Mohamed
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 343 - 346
  • [28] Data Storage Security in Cloud Computing Using Container Clustering
    Gupta, Rohan Raj
    Mishra, Gaurav
    Katara, Subham
    Agarwal, Arpit
    Sarkar, Mrinal Kanti
    Das, Rupayan
    Kumar, Sanjay
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [29] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225
  • [30] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64