Application of Steganography Technique in Cloud Computing

被引:0
作者
Ajala, Jacob Adeboye [1 ]
Singh, Sanika [1 ]
Mukherjee, Saurabh [2 ]
Chakraborty, Sudeshna [1 ]
机构
[1] Sharda Univ, Greater Noida, India
[2] Banasthali Vidyapith, Jaipur, Rajasthan, India
来源
PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019) | 2019年
关键词
Cloud Computing; Data Security; Cryptography; Steganography; stego-image;
D O I
10.1109/iccike47802.2019.9004347
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has played a significant role in data and information management through availing computer system resources for all users without direct active management. In return, a considerable population has embarked on cloud computing to share data and information and communicate through the platform hence enjoying the benefit. However, data security is a crucial aspect in cloud computing as a way of assuring users of their confidentiality and safety of data and information stored and transferred through the platform. As a result, the need for data security techniques has facilitated the evolution of different techniques necessary for ensuring the safety of data and information through the platform hence ensuring effective communication channels. Therefore, Steganography techniques have been identified as one of the cloud computing techniques necessary for enhancing cloud data security. In return, this paper analyzes the application of stenography technique in cloud computing as an approach to enhance cloud data security
引用
收藏
页码:532 / 537
页数:6
相关论文
共 14 条
[1]  
Al-Khanjari Z., 2014, DEV SECURED INTEROPE
[2]  
Al-Khanjari Z., 2014, EUROPEAN SCI J, V10
[3]  
CHANDRA MR, 2015, INT J COMPUTER SCI M, V4, P253
[4]  
Handa K., 2015, INT J COMPUTER SCI M, V4, P786
[5]  
Izevbizua P.O., 2015, Int. J. Appl. Sci. Math, V1, P347
[6]  
Kamboj L., 2017, INT J COMPUTATIONAL, V7, P1
[7]  
Kaur R, 2015, 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), P1198
[8]  
Murakami K, 2013, 2013 INTERNATIONAL JOINT CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY & UBI-MEDIA COMPUTING (ICAST-UMEDIA), P503, DOI 10.1109/ICAwST.2013.6765492
[9]  
Pant VK, 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), P490, DOI 10.1109/ICGCIoT.2015.7380514
[10]  
Reza H., 2016, J Inf Secur, V7, P249