Increasing Security for Cloud Computing By Steganography in Image Edges

Authors

  • Hassan Hadi Saleh College of Physical education and sport sciences, University of Diyala

DOI:

https://doi.org/10.23851/mjs.v27i4.10

Keywords:

Cloud Computing, Data Storage, Security, Steganography, Edges of image.

Abstract

The security of data storage in “cloud” is big challenge because the data keep within resources that may be accessed by particular machines. The managing of these data and services may not be high reliable. Therefore, the security of data is highly challenging. To increase the security of data in data center of cloud, we have introduced good method to ensure data security in “cloud computing” by methods of data hiding using color images which is called steganography. The fundamental objective of this paper is to prevent "Data Access” by unauthorized or opponent users. This scheme stores data at data centers within edges of color images and retrieves data from it when it is wanted.

Downloads

Download data is not yet available.

References

P. Mell , T. Grance; "NIST Definition of Cloud Computing", National Institute of Standards and Technology, vol. 15, no. 10.07, 2009.

J.SRINIVAS, K.VENKATA SUBBA, Dr. A.MOIZ QYSER3; “Cloud Computing Basic”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 5, pp. 343-347, 2012.

Rajeev Kumar ; " Data Hiding Images Using spread spectrum in Cloud Computing"; International Journal of Technical Research and Applications, vol. 1, Issue 3, PP. 76-79, 2013.

Al-khanjari, Z. , Alani, A.; "Developing Secured Interoperable Cloud Computing Services"; European Scientific Journal, vol. 10, no.24, pp. 341-350, 2014.

Marinal Kanti Sarkar, Trijit Chatterjee; “Enhancing data Storage Security in Cloud Computing through Steganography”; ACEEE Int. on Network Security, vol. 5, no.1, pp. 13, 2014.

Sanjima Manocha, Sheveda Vashesht. “A Novel Hybrid Approach for Secure Cloud Mining using Lossless Image Format"; International Journal of Computer Applications, vol. 98, no. 7, pp. 7-11, 2014.

Tutorialspoint, "Cloud Computing Tutorial", online Tutorial available on www.TutorialsPoint.com.

Jijo .S. Nair , BaholaNath Roy, “Data Security in Cloud "; International Journal of Computational Engineering Research(IJCER).

"Introduction to Cloud Computing", Office of the Privacy Commissioner of Canada. www.priv.gc.ca.

Garima Saini , Naveen Sharma, “Triple Security of data in cloud computing”; International Journal of Computer Science and Information Technologies(IJCSIT), vol. 5, 2014.

Tariq Ahmed , Abdulla Aljumah; "Cloud Computing and Steganography-attack Threat Relation"; MAGNT Research Report, vol.2, no.4, pp.72-75, 2014.

Jaydip Sen; "Security and Privacy Issues in Cloud Computing "; Innovation Labs, Tata Consultancy Services Ltd., Kolkata, India, pp. 1-45, 2013.

Wojciech Mazurczyk, Krzysztof Szcypiorski; " Is Cloud Computing Steganography-Proof?"; Institute of Telecommunications, Warsaw University of Technology Warsaw, Poland, pp. 441-442, 2011.

Downloads

Key Dates

Published

01-03-2017

Issue

Section

Original Article

How to Cite

[1]
H. H. Saleh, “Increasing Security for Cloud Computing By Steganography in Image Edges”, Al-Mustansiriyah Journal of Science, vol. 27, no. 4, Mar. 2017, doi: 10.23851/mjs.v27i4.10.

Similar Articles

1-10 of 147

You may also start an advanced similarity search for this article.