Advanced technics to Shared & Protect Cloud Data using Multilayer Steganography and Cryptography

被引:0
|
作者
Ranjan, Alok [1 ]
Bhonsle, Mansi [1 ]
机构
[1] GH Raisoni Coll Engg & Mgmt, Dept Comp Engn, Pune 412207, Maharashtra, India
关键词
Cloud Computing; Hash-LSB (Least Significant Bit); Steganography; Third Party Auditor (TPA); Advance Encryption Standards (AES);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In current scenario, the growth of data in cloud computing may be a vital issue of the complete information reside over a group of interconnected pools that permits via virtual machines. There are various problems that require to be addressed with respect to the service, management and privacy of data etc. To make sure privacy of data in cloud computing, it planned an effective and a unique approach to make sure information security in cloud computing by means of encrypting and concealing the info with multimedia exploitation thought of multilayer steganography with advanced encryption standard (AES). The main focus of this system is to forestall information access from cloud data storage centers by unauthorized users. This theme perfectly stored information at cloud data storage centers and retrieves data from it once it's required. This give the terribly high level knowledge security for online virtual system and save the fraud users to use your knowledge.
引用
收藏
页码:35 / 41
页数:7
相关论文
共 50 条
  • [1] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [2] Multilayer Security Using RSA Cryptography and Dual Audio Steganography
    Bangera, Kripa N.
    Paddambail, Yashika
    Reddy, N. V. Subba
    Shivaprasad, G.
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 492 - 495
  • [3] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [4] A security model to protect the isolation of medical data in the cloud using hybrid cryptography
    Gadde, Swetha
    Amutharaj, J.
    Usha, S.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [5] A Smart Strategy for Data Hiding using Cryptography and Steganography
    Srinivasarao, Tumma
    Yannam, Adilakshmi
    Markapudi, Baburao
    Chaduvula, Kavitha
    Allada, Apparna
    [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2023, 82 (05): : 546 - 551
  • [6] Data hiding on web using combination of Steganography and Cryptography
    Kothari, Lipi
    Thakkar, Rikin
    Khara, Satvik
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 448 - 452
  • [7] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
    Garg, Priyansha
    Sharma, Moolchand
    Agrawal, Shivani
    Kumar, Yastika
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
  • [8] An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique
    Rahman, Mohammad Obaidur
    Hossen, Muhammad Kamal
    Morsad, Md. Golam
    Roy, Animesh Chandra
    Chowdhury, Md. Shahnur Azad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (09): : 85 - 93
  • [9] An Improved Lsb Data Steganography Using Elliptic Cuve Cryptography
    Ravivarma, G.
    Gavaskar, K.
    Kavitha, N. S.
    Banu, K. Shahanas
    Asha, K. G.
    Aarthi, S.
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 06 - 11
  • [10] Security as a Service using Data Steganography in Cloud
    Ramachandran, Anitha Balaji
    Paramjothi, Pradeepan
    Mukherjee, Saswati
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 81 - 90