Data Security in Cloud Computing Using Steganography: A Review

被引:0
|
作者
AlKhamese, Aya Y. [1 ]
Shabana, Wafaa R. [1 ]
Hanafy, Ibrahim M. [2 ]
机构
[1] Port Said Univ, Fac Engn, Dept Phys & Engn Math, Port Said, Egypt
[2] Port Said Univ, Fac Sci, Dept Math & Comp Sci, Port Said, Egypt
关键词
Cloud Computing; Steganogrphy; Cryptography; LSB; DCT; information hiding;
D O I
10.1109/itce.2019.8646434
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is one of the largest developments in the field of information technology during recent years. It is a service oriented computing which offers everything as a service via the internet by the pay-as-you-go model. It becomes more desirable for all organizations (such as education, banking, healthcare and manufacturing) and also for personal use as it provides a flexible, scalable, and reliable infrastructure and services. For the user, the most important issue is to store, retrieve and transmit the data over the cloud network and storage in a secure manner. Steganography and cryptography are some of the security techniques applied in the cloud to secure the user data transmitting. The objective of steganography is to hide the existence of communication from the unintended users; whereas cryptography encrypts the data to make it more secure. Steganography is considered as the most effective technique for securing the communication in the cloud. Digital images are most commonly used as a cover medium in steganography. In the literature, there exist several image steganography techniques for hiding information in images; which were developed and implemented in the time domain as well as in the frequency domain. Fundamentals of spatial domain and frequency domain techniques are reviewed in this paper with emphasis on the Least Significant Bit (LSB) and the Discrete Cosine Transform (DCT) techniques.
引用
收藏
页码:549 / 558
页数:10
相关论文
共 50 条
  • [31] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [32] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [33] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [34] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [35] Modeling of Data Security in Cloud Computing
    Balogh, Zoltan
    Turcani, Milan
    2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 940 - 945
  • [36] An Overview on Data Security in Cloud Computing
    Kacha, Lynda
    Zitouni, Abdelhafid
    CYBERNETICS APPROACHES IN INTELLIGENT SYSTEMS: COMPUTATIONAL METHODS IN SYSTEMS AND SOFTWARE 2017, VOL. 1, 2018, 661 : 250 - 261
  • [37] Cryptography and Data Security in Cloud Computing
    Yan, Zheng
    Deng, Robert H.
    Varadharajan, Vijay
    INFORMATION SCIENCES, 2017, 387 : 53 - 55
  • [38] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [39] A Study in Data Security in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    Majid, Mazlina Binti Abdul
    Khan, Nusrat Ullah
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 367 - 371
  • [40] Cloud Computing, Security and Data Concealment
    Delettre, Christian
    Boudaoud, Karima
    Riveill, Michel
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,