A Review on Recent Steganography Techniques in Cloud Computing
As with the growth of information on the cloud, cloud security is seen as more essential than before. Presently, millions of users are utilizing the cloud. The security of cloud computing is urgently required, where data are being transmitted or transferred between the users and servers. Steganography is considered as the most effective techniques for securing the communication in the cloud. Steganography refers to writing hidden messages in a way that only the sender and receiver have the ability to safely know and transfer the hidden information in the means of communications. This paper review some of the recent steganography techniques that have been proposed to improve the security of data in the cloud and to make it more immune to cyber-attacks and eavesdropping.
Ahamad, T., & Aljumah, A. (2014). Cloud Computing and Steganography – Attack Threat Relation. MAGNT Research Report, 2(4), 1444–8939.
Bokhari, M. U., Shallal, Q. M., & Tamandani, Y. K. (2016). Cloud computing service models: A comparative study. IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 16–18.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, (July), 1. https://doi.org/10.1109/CCGRID.2009.97
Garg, N., & Kaur, K. (2016). Hybrid information security model for cloud storage systems using hybrid data security scheme. International Research Journal of Engineering and Technology (IRJET), 3(4), 2194–2196.
Ke, Q., & Dong-qing, X. (2012). An Adaptive Steganography for 3D Point Cloud Models. IEEE 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
Mandai, S., & Bhattacharyya, S. (2015). Secret Data Sharing in Cloud Environment Using Steganography and Encryption Using GA. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 1469–1474. https://doi.org/10.1109/ICGCIoT.2015.7380699
Mazurczyk, W., & Szczypiorski, K. (2011). Is cloud computing steganography-proof? Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011, 441–442. https://doi.org/10.1109/MINES.2011.95
Mohis, M., & Devipriya, V. S. (2016). An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique. IEEE In Inventive Computation Technologies (ICICT).
Murakami, K., Hanyu, R., Zhao, Q., & Kaneda, Y. (2013). Improvement of security in cloud systems based on steganography. 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013), 503–508. https://doi.org/10.1109/ICAwST.2013.6765492
Nimmy, K., & Sethumadhavan, M. (2014). Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography. 2014 Fifth International Conference on the Applications of Digital Information and Web Technologies (Icadiwt), 101–106.
Pant, V. K., Prakash, J., & Asthana, A. (2015). Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 490–494. https://doi.org/10.1109/ICGCIoT.2015.7380514
Patidar, S., Rane, D., & Jain, P. (2011). A survey paper on cloud computing. Proceedings - 2012 2nd International Conference on Advanced Computing and Communication Technologies, ACCT 2012, 394–398. https://doi.org/10.1109/ACCT.2012.15
Ranjan, A., & Bhonsle, M. (2016). Advanced technics to shared & protect cloud data using multilayer steganography and cryptography. IEEE 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 35–41.
Saini, G., & Sharma, N. (2014). Triple Security of Data in Cloud Computing. International Journal of Compuetr Science and Information Technologies, 5(4), 5825–5827.
Saravanakumar, C., & Arun, C. (2014). An efficient ASCII-BCD based steganography for cloud security using common deployment model. Journal of Theoretical and Applied Information Technology, 65(3), 687–694.
Sarkar, M. K., & Chatterjee, T. (2014). Enhancing Data Storage Security in Cloud Computing Through Steganography. ACEEE International Journal of Network Security Network Security, 5(1), 13–19.
Sarvabhatla, M., M.Giri, & Vorugunti, C. S. (2014). A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography. 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
Yang, C. L., Hwang, B. N., & Yuan, B. J. C. (2012). Key consideration factors of adopting cloud computing for science. CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, 597–600. https://doi.org/10.1109/CloudCom.2012.6427610
Yang, C., Lin, W., & Liu, M. (2013). A novel triple encryption scheme for hadoop-based cloud data security. Proceedings - 4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013, 437–442. https://doi.org/10.1109/EIDWT.2013.80
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
AJNU is committed to protecting the privacy of the users of this journal website. The names, personal particulars and e-mail addresses entered in this website will be used only for the stated purposes of this journal and will not be made available to third parties without the user's permission or due process. Users consent to receive communication from the AJNU for the stated purposes of the journal. Queries with regard to privacy may be directed to email@example.com.