A Review on Recent Steganography Techniques in Cloud Computing
DOI:
https://doi.org/10.25007/ajnu.v6n3a91Keywords:
Steganography, Cloud Computing, Security, PrivacyAbstract
As with the growth of information on the cloud, cloud security is seen as more essential than before. Presently, millions of users are utilizing the cloud. The security of cloud computing is urgently required, where data are being transmitted or transferred between the users and servers. Steganography is considered as the most effective techniques for securing the communication in the cloud. Steganography refers to writing hidden messages in a way that only the sender and receiver have the ability to safely know and transfer the hidden information in the means of communications. This paper review some of the recent steganography techniques that have been proposed to improve the security of data in the cloud and to make it more immune to cyber-attacks and eavesdropping.
Downloads
References
Ahamad, T., & Aljumah, A. (2014). Cloud Computing and Steganography – Attack Threat Relation. MAGNT Research Report, 2(4), 1444–8939.
Bokhari, M. U., Shallal, Q. M., & Tamandani, Y. K. (2016). Cloud computing service models: A comparative study. IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 16–18.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, (July), 1. https://doi.org/10.1109/CCGRID.2009.97
Garg, N., & Kaur, K. (2016). Hybrid information security model for cloud storage systems using hybrid data security scheme. International Research Journal of Engineering and Technology (IRJET), 3(4), 2194–2196.
Ke, Q., & Dong-qing, X. (2012). An Adaptive Steganography for 3D Point Cloud Models. IEEE 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
Mandai, S., & Bhattacharyya, S. (2015). Secret Data Sharing in Cloud Environment Using Steganography and Encryption Using GA. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 1469–1474. https://doi.org/10.1109/ICGCIoT.2015.7380699
Mazurczyk, W., & Szczypiorski, K. (2011). Is cloud computing steganography-proof? Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011, 441–442. https://doi.org/10.1109/MINES.2011.95
Mohis, M., & Devipriya, V. S. (2016). An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique. IEEE In Inventive Computation Technologies (ICICT).
Murakami, K., Hanyu, R., Zhao, Q., & Kaneda, Y. (2013). Improvement of security in cloud systems based on steganography. 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013), 503–508. https://doi.org/10.1109/ICAwST.2013.6765492
Nimmy, K., & Sethumadhavan, M. (2014). Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography. 2014 Fifth International Conference on the Applications of Digital Information and Web Technologies (Icadiwt), 101–106.
Pant, V. K., Prakash, J., & Asthana, A. (2015). Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 490–494. https://doi.org/10.1109/ICGCIoT.2015.7380514
Patidar, S., Rane, D., & Jain, P. (2011). A survey paper on cloud computing. Proceedings - 2012 2nd International Conference on Advanced Computing and Communication Technologies, ACCT 2012, 394–398. https://doi.org/10.1109/ACCT.2012.15
Ranjan, A., & Bhonsle, M. (2016). Advanced technics to shared & protect cloud data using multilayer steganography and cryptography. IEEE 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 35–41.
Saini, G., & Sharma, N. (2014). Triple Security of Data in Cloud Computing. International Journal of Compuetr Science and Information Technologies, 5(4), 5825–5827.
Saravanakumar, C., & Arun, C. (2014). An efficient ASCII-BCD based steganography for cloud security using common deployment model. Journal of Theoretical and Applied Information Technology, 65(3), 687–694.
Sarkar, M. K., & Chatterjee, T. (2014). Enhancing Data Storage Security in Cloud Computing Through Steganography. ACEEE International Journal of Network Security Network Security, 5(1), 13–19.
Sarvabhatla, M., M.Giri, & Vorugunti, C. S. (2014). A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography. 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
Yang, C. L., Hwang, B. N., & Yuan, B. J. C. (2012). Key consideration factors of adopting cloud computing for science. CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, 597–600. https://doi.org/10.1109/CloudCom.2012.6427610
Yang, C., Lin, W., & Liu, M. (2013). A novel triple encryption scheme for hadoop-based cloud data security. Proceedings - 4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013, 437–442. https://doi.org/10.1109/EIDWT.2013.80
Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- Copyright
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.