A SURVEY: AN APPROACH TO SECURELY SHARE INFORMATIONIN CLOUD USING STEGANOGRAPHY TECHNIQUE

Main Article Content

Trupti Patel
juikhamar

Abstract

In recent years, cloud computing services have become a must in our daily lives. Cloud computing is a hub of various server and many database to store data. cloud computing provide many services to user which is reliable ,efficient and low cost. As it is internet based technology security becomes a big issue to the cloud data. Due to storing data on cloud there is an issue of data security, integrity and confidentiality. The main problem is that existing systems and/or programs usually have some unknown issues and can be attacked by some unauthorized persons in some unexpected ways. To solve the problem, at least partially, we have proposed a new steganography protocol for improving information security in cloud storage services. Initial analysis shows that the new protocol is very secure. This paper formulates the protocol in a more formal way, so that based on the formulation, we can find possible weak points more easily, and make the protocol more practically useful.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Trupti Patel, and juikhamar. “A SURVEY: AN APPROACH TO SECURELY SHARE INFORMATIONIN CLOUD USING STEGANOGRAPHY TECHNIQUE”. Technix International Journal for Engineering Research, vol. 2, no. 5, May 2015, pp. 119-21, https://tijer.org/index.php/tijer/article/view/88.
Dimension
Section
Research Articles

References

Rabi Prasad Padhy, ManasRanjanPatra, Suresh Chandra Satapathy , “Cloud Computing: Security Issues and Research Challenges”. (IJCSITS) Vol. 1, No. 2, December 2011.

AncaApostu, FlorinaPuican, GeaninaUlaru, George Suciu, GyorgyTodoran, “Study On Advantages And Disadvantages Of Cloud Computing” ISBN 2013.

Mehdi Hussain and MureedHussain, “A Survey of Image Steganography Techniques”, International Journal of Advanced Science and Technology Vol. 54, May, 2013.

Mohammed Salem Atoum, Subariah Ibrahim, GhazaliSulong and MazdakZamani, “A New Method for Audio Steganography Using Message Integrity”, Journal of Convergence Information Technology (JCIT) Volume8, Number14, September 2013.

Murakami, Qiangfu Zhao, RyotaHanyu, “A new Steganography Protocol for Improving Security” IEEE 2014.

Deshpande Neeta, KamalapurSnehal, “Implementation of LSB Steganography and its Evaluation for Various Bits” computer Science Dept, India. IEEE 2014.

Nimmy k., M.Sethumadhavan, “Novel Mutual Authentication Protocol for cloud using secret sharing and Steganography” IEEE 2014.

GarimaSaini, Naveen Sharma, “Triple Security of Data in Cloud Computing”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 2014.

MrinalkantiSarkar,TrijitChatterjee, “Enhancing Data Storage Security in Cloud computingThrough Steganography”,ACEEE.Int.J.on.Network Security,Vol.5,No.1,January2014.

Mr. Falesh M. Shelke, Miss. Ashwini A. Dongre, Mr. Pravin D. Soni, “Comparison of different techniques for Steganography in images”,International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 3, Issue 2, February 2014.

Vaishali, AnkurGoyal, “An Implementation of 4 Bit Image Steganography for Data Security in Clouds”,Volume 4, Issue 11, November 2014,www.ijarcsse.com.

Karun Handa, Uma Singh,“Data Security in Cloud Computing using Encryption and Steganography”IJCSMC, Vol. 4, Issue. 5, May 2015.

DomenicoBloisi and Luca Iocchi, IMAGE BASED STEGANOGRAPHY AND CRYPTOGRAPHY, http://www.dis.uniroma1.it /~bloisi/steganography/isc.pdf