Advanced technics to Shared & Protect Cloud Data using Multilayer Steganography and Cryptography

被引:0
|
作者
Ranjan, Alok [1 ]
Bhonsle, Mansi [1 ]
机构
[1] GH Raisoni Coll Engg & Mgmt, Dept Comp Engn, Pune 412207, Maharashtra, India
关键词
Cloud Computing; Hash-LSB (Least Significant Bit); Steganography; Third Party Auditor (TPA); Advance Encryption Standards (AES);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In current scenario, the growth of data in cloud computing may be a vital issue of the complete information reside over a group of interconnected pools that permits via virtual machines. There are various problems that require to be addressed with respect to the service, management and privacy of data etc. To make sure privacy of data in cloud computing, it planned an effective and a unique approach to make sure information security in cloud computing by means of encrypting and concealing the info with multimedia exploitation thought of multilayer steganography with advanced encryption standard (AES). The main focus of this system is to forestall information access from cloud data storage centers by unauthorized users. This theme perfectly stored information at cloud data storage centers and retrieves data from it once it's required. This give the terribly high level knowledge security for online virtual system and save the fraud users to use your knowledge.
引用
收藏
页码:35 / 41
页数:7
相关论文
共 50 条
  • [41] A New Approach for Maintaining Data Security using Cryptography in a Hybrid Cloud Environment
    Jebaseli, Nisha
    Banu, A. Fairose
    [J]. JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (02) : 214 - 224
  • [42] Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing
    Kumar, Anuj
    [J]. PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1529 - 1535
  • [43] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment
    Acharya, Shreenath
    Manoj, K.
    Gayana, M. N.
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873
  • [44] Image Steganography using Advanced Encryption Standard for implantation of Audio/Video Data
    Lalengmawia, C.
    Bhattacharya, A.
    Datta, A.
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2016,
  • [45] Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
    Hosam, Osama
    Ahmad, Muhammad Hammad
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (02) : 153 - 161
  • [46] Implementation Stage for High Securing Cover-File of Hidden Data Using Computation between Cryptography and Steganography
    Zaidan, A. A.
    Zaidan, B. B.
    Abdulrazzaq, M. M.
    Raji, R. Z.
    Mohammed, S. M.
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 482 - 489
  • [47] Securing Cover-File Without Limitation of Hidden Data Size Using Computation Between Cryptography and Steganography
    Zaidan, A. A.
    Othman, Fazidah
    Zaidan, B. B.
    Raji, R. Z.
    Hasan, Ahmed K.
    Naji, A. W.
    [J]. WORLD CONGRESS ON ENGINEERING 2009, VOLS I AND II, 2009, : 259 - +
  • [48] Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm
    Shanthakumari, R.
    Malliga, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (5-6) : 3975 - 3991
  • [49] AN EFFECTIVE SEARCH OF CLOUD DATA USING ABC BASED CRYPTOGRAPHY AND MULTIPLE KEYWORD SEMANTICS
    Kumari, P. Senthil
    Kamal, A. R. Nadira Banu
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2015, 11 (04): : 1257 - 1267
  • [50] Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review
    Mamta
    Khare, Mayank Deep
    Yadav, Chandra Shekhar
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017), 2017, : 413 - 416