A Review on Recent Steganography Techniques in Cloud Computing

Authors

  • Omar M. Ahmed Department of Computer Science, Faculty of Science, Zakho University, Duhok, Kurdistan Region – Iraq
  • Wafaa M. Abduallah College of Computer and Information Technology, Department of Computer Science, Nawroz University, Duhok, Kurdistan Region - Iraq

DOI:

https://doi.org/10.25007/ajnu.v6n3a91

Keywords:

Steganography, Cloud Computing, Security, Privacy

Abstract

As with the growth of information on the cloud, cloud security is seen as more essential than before. Presently, millions of users are utilizing the cloud. The security of cloud computing is urgently required, where data are being transmitted or transferred between the users and servers. Steganography is considered as the most effective techniques for securing the communication in the cloud. Steganography refers to writing hidden messages in a way that only the sender and receiver have the ability to safely know and transfer the hidden information in the means of communications. This paper review some of the recent steganography techniques that have been proposed to improve the security of data in the cloud and to make it more immune to cyber-attacks and eavesdropping.

Downloads

Download data is not yet available.

References

Abduallah, W. M., & Rahma, A. M. S. (2016). A Review on Steganography Techniques. American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), 131–150.
Ahamad, T., & Aljumah, A. (2014). Cloud Computing and Steganography – Attack Threat Relation. MAGNT Research Report, 2(4), 1444–8939.
Bokhari, M. U., Shallal, Q. M., & Tamandani, Y. K. (2016). Cloud computing service models: A comparative study. IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 16–18.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, (July), 1. https://doi.org/10.1109/CCGRID.2009.97
Garg, N., & Kaur, K. (2016). Hybrid information security model for cloud storage systems using hybrid data security scheme. International Research Journal of Engineering and Technology (IRJET), 3(4), 2194–2196.
Ke, Q., & Dong-qing, X. (2012). An Adaptive Steganography for 3D Point Cloud Models. IEEE 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
Mandai, S., & Bhattacharyya, S. (2015). Secret Data Sharing in Cloud Environment Using Steganography and Encryption Using GA. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 1469–1474. https://doi.org/10.1109/ICGCIoT.2015.7380699
Mazurczyk, W., & Szczypiorski, K. (2011). Is cloud computing steganography-proof? Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011, 441–442. https://doi.org/10.1109/MINES.2011.95
Mohis, M., & Devipriya, V. S. (2016). An improved approach for Enhancing Public Cloud Data Security through Steganographic Technique. IEEE In Inventive Computation Technologies (ICICT).
Murakami, K., Hanyu, R., Zhao, Q., & Kaneda, Y. (2013). Improvement of security in cloud systems based on steganography. 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013), 503–508. https://doi.org/10.1109/ICAwST.2013.6765492
Nimmy, K., & Sethumadhavan, M. (2014). Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography. 2014 Fifth International Conference on the Applications of Digital Information and Web Technologies (Icadiwt), 101–106.
Pant, V. K., Prakash, J., & Asthana, A. (2015). Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 490–494. https://doi.org/10.1109/ICGCIoT.2015.7380514
Patidar, S., Rane, D., & Jain, P. (2011). A survey paper on cloud computing. Proceedings - 2012 2nd International Conference on Advanced Computing and Communication Technologies, ACCT 2012, 394–398. https://doi.org/10.1109/ACCT.2012.15
Ranjan, A., & Bhonsle, M. (2016). Advanced technics to shared & protect cloud data using multilayer steganography and cryptography. IEEE 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 35–41.
Saini, G., & Sharma, N. (2014). Triple Security of Data in Cloud Computing. International Journal of Compuetr Science and Information Technologies, 5(4), 5825–5827.
Saravanakumar, C., & Arun, C. (2014). An efficient ASCII-BCD based steganography for cloud security using common deployment model. Journal of Theoretical and Applied Information Technology, 65(3), 687–694.
Sarkar, M. K., & Chatterjee, T. (2014). Enhancing Data Storage Security in Cloud Computing Through Steganography. ACEEE International Journal of Network Security Network Security, 5(1), 13–19.
Sarvabhatla, M., M.Giri, & Vorugunti, C. S. (2014). A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography. 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
Yang, C. L., Hwang, B. N., & Yuan, B. J. C. (2012). Key consideration factors of adopting cloud computing for science. CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, 597–600. https://doi.org/10.1109/CloudCom.2012.6427610
Yang, C., Lin, W., & Liu, M. (2013). A novel triple encryption scheme for hadoop-based cloud data security. Proceedings - 4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013, 437–442. https://doi.org/10.1109/EIDWT.2013.80

Published

2017-08-29

How to Cite

Ahmed, O. M., & Abduallah, W. M. (2017). A Review on Recent Steganography Techniques in Cloud Computing. Academic Journal of Nawroz University, 6(3), 106–111. https://doi.org/10.25007/ajnu.v6n3a91

Issue

Section

Articles