Security as a Service using Data Steganography in Cloud

被引:0
|
作者
Ramachandran, Anitha Balaji [1 ]
Paramjothi, Pradeepan [1 ]
Mukherjee, Saswati [1 ]
机构
[1] Anna Univ, Dept Informat Sci & Technol, Chennai 600025, Tamil Nadu, India
关键词
Security; data storage; metadata; cloud; feistel function; steganography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In cloud era as the data stored is away from the user, privacy and integrity of the data plays a crucial role. This paper proposes a practical and efficient method for providing security to the data stored at the data server through metadata. This method provides security using cipher key which is generated from the attributes of metadata. In this proposed model the time required for generating the cipher key is proportional to the number of attributes in the metadata as well the algorithms used for cipher key generation. Our design enforces security by providing two novel features. 1. Security is provided by the proposed model, where the encryption and decryption keys cannot be compromised without the involvement of data owner and the metadata data server (MDS), hence makes data owner comfortable about the data stored. 2. The cipher key generated using the modified feistel network holds good for the avalanche effect as each round of the feistel function depends on the previous round value. The proposed model also makes data owner reassured about the data stored at the cloud in both cases: (i) Data at Rest and (ii) Data in motion. The steganographic method used is automated based on the input from the metadata server and the user. We have implemented a security model incorporating these ideas and have evaluated the performance and scalability of the proposed model.
引用
收藏
页码:81 / 90
页数:10
相关论文
共 50 条
  • [1] Data Security in Cloud Computing Using Steganography: A Review
    AlKhamese, Aya Y.
    Shabana, Wafaa R.
    Hanafy, Ibrahim M.
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE 2019), 2019, : 549 - 558
  • [2] Hybrid Model for Cloud Data Security using Steganography
    Ebrahim, Moshira A.
    El-Maddah, Islam A. M.
    Mohamed, Hoda K.
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 135 - 140
  • [3] A Survey on Cloud Data Security using Image Steganography
    Albalawi, Afrah
    Hamza, Nermin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 645 - 649
  • [4] Data Security Enhancement in Public Cloud Storage using Data Obfuscation and Steganography
    Amalarethinam, D. I. George
    FathimaMary, B.
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 181 - 184
  • [5] Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
    Hosam, Osama
    Ahmad, Muhammad Hammad
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (02) : 153 - 161
  • [6] An Unique Data Security using Text Steganography
    Torvi, Savitha D.
    ShivaKumar, K. B.
    Dash, Rupam
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3834 - 3838
  • [7] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [8] Enhancing Image Security and Privacy in Cloud System Using Steganography
    Wu, Wen-Chuan
    Yang, Shang-Chian
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,
  • [9] Cloud Security as a Service Using Data Loss Prevention: Challenges and Solution
    Hussain, Mohammad Equebal
    Hussain, Rashid
    INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2022, 340 : 98 - 106
  • [10] Adaptive Security for Cloud Data Warehouse as a Service
    Guermazi, Emna
    Ben Ayed, Mounir
    Ben-Abdallah, Hanene
    2015 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2015, : 647 - 650