Application of Steganography Technique in Cloud Computing

被引:0
|
作者
Ajala, Jacob Adeboye [1 ]
Singh, Sanika [1 ]
Mukherjee, Saurabh [2 ]
Chakraborty, Sudeshna [1 ]
机构
[1] Sharda Univ, Greater Noida, India
[2] Banasthali Vidyapith, Jaipur, Rajasthan, India
关键词
Cloud Computing; Data Security; Cryptography; Steganography; stego-image;
D O I
10.1109/iccike47802.2019.9004347
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has played a significant role in data and information management through availing computer system resources for all users without direct active management. In return, a considerable population has embarked on cloud computing to share data and information and communicate through the platform hence enjoying the benefit. However, data security is a crucial aspect in cloud computing as a way of assuring users of their confidentiality and safety of data and information stored and transferred through the platform. As a result, the need for data security techniques has facilitated the evolution of different techniques necessary for ensuring the safety of data and information through the platform hence ensuring effective communication channels. Therefore, Steganography techniques have been identified as one of the cloud computing techniques necessary for enhancing cloud data security. In return, this paper analyzes the application of stenography technique in cloud computing as an approach to enhance cloud data security
引用
收藏
页码:532 / 537
页数:6
相关论文
共 50 条
  • [1] CLOUD COMPUTING IN CRYPTOGRAPHY AND STEGANOGRAPHY
    Zadiraka, V. K.
    Kudin, A. M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2013, 49 (04) : 584 - 588
  • [2] A Review: Cryptography and Steganography Algorithm for Cloud Computing
    Singla, Surbhi
    Bala, Anju
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 953 - 957
  • [3] Data Security in Cloud Computing Using Steganography: A Review
    AlKhamese, Aya Y.
    Shabana, Wafaa R.
    Hanafy, Ibrahim M.
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE 2019), 2019, : 549 - 558
  • [4] Scheduling Technique of Data Intensive Application Workflows in Cloud Computing
    Lakhani, Jignesh
    Bheda, Hitesh
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [5] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
    Garg, Priyansha
    Sharma, Moolchand
    Agrawal, Shivani
    Kumar, Yastika
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
  • [6] APPLICATION STEGANOGRAPHY METHODS OF REPLACEMENT AND INSERTION TECHNIQUE
    Cajic, Miroslav
    Veinovic, Mladen
    Brkic, Bogdan
    Jankovic, Zoran
    2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 928 - +
  • [7] Application of cloud computing to learning
    Chen, Li-Shan
    AFRICAN JOURNAL OF BUSINESS MANAGEMENT, 2010, 4 (14): : 3217 - 3225
  • [8] Emerging Technique in Libraries: Cloud Computing
    Sethi, Rittu
    2015 4TH INTERNATIONAL SYMPOSIUM ON EMERGING TRENDS AND TECHNOLOGIES IN LIBRARIES AND INFORMATION SERVICES (ETTLIS), 2015, : 29 - 31
  • [9] Filtering Technique on Mobile Cloud Computing
    Changbok
    Chang, Hyokyung
    Kang, Yongho
    Bae, Yumi
    Ahn, Hyosik
    Choi, Euiin
    2012 INTERNATIONAL CONFERENCE ON FUTURE ENERGY, ENVIRONMENT, AND MATERIALS, PT B, 2012, 16 : 1305 - 1311
  • [10] Provisioning Authentication Technique in Cloud Computing
    Jeong, Hoon
    Do, Hana
    Choi, Euiin
    2013 FOURTH INTERNATIONAL CONFERENCE ON EDUCATION AND SPORTS EDUCATION (ESE 2013), PT I, 2013, 11 : 498 - 502