Open Access   Article Go Back

A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud

Konakanti. Bhargavi1 , Thota. Bhaskara Reddy2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 670-681, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.670681

Online published on Jun 30, 2018

Copyright © Konakanti. Bhargavi, Thota. Bhaskara Reddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Konakanti. Bhargavi, Thota. Bhaskara Reddy, “A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.670-681, 2018.

MLA Style Citation: Konakanti. Bhargavi, Thota. Bhaskara Reddy "A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud." International Journal of Computer Sciences and Engineering 6.6 (2018): 670-681.

APA Style Citation: Konakanti. Bhargavi, Thota. Bhaskara Reddy, (2018). A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud. International Journal of Computer Sciences and Engineering, 6(6), 670-681.

BibTex Style Citation:
@article{Bhargavi_2018,
author = {Konakanti. Bhargavi, Thota. Bhaskara Reddy},
title = {A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {670-681},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2237},
doi = {https://doi.org/10.26438/ijcse/v6i6.670681}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.670681}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2237
TI - A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Konakanti. Bhargavi, Thota. Bhaskara Reddy
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 670-681
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
757 350 downloads 167 downloads
  
  
           

Abstract

Cloud is the Internet based computing that provides resources on-demand. This has become an attractive solution to data owners as the can outsource data and computing. There is potential risk in terms of security and privacy of the outsourced data as the cloud servers are treated untrusted. In this context, there are two security mechanisms that are widely used. They are known as cryptography and steganography. The cryptography converts data into some format that cannot be comprehended by humans while the steganography hides the presence of a message (may be encrypted one) in an image or any digital media. If both are used independently they have their own limitations. When both are combined, it forms a realizable mechanism with both security and secrecy. Thus, the Crypto-steganography is the approach that overcomes the limitations of individual mechanisms as it proves to be difficult to adversaries to launch attacks. In this paper an LSB substitution method and quadruple efficient image encryption method are used to secure sensitive messages when they are outsourced to public cloud. We built a prototype application to show the utility of the proposed hybrid method. The results revealed that the proposed is capable of increasing security to the data outsourced to public cloud.

Key-Words / Index Term

Cloud computing, cryptography, steganography, crypto-steganography

References

[1] M.Y. Wu, M.C. Yu, J.S. Leu, and S.K. Chen, "Improving security and privacy of images on cloud storage by histogram shifting and secret sharing," Proceedings of the 83th IEEE Vehicular Technology Conference, Nanjing China, pp. 1-5, May 2016.
[2] H. Reza, and M. Sonawane, "Enhancing mobile cloud computing security using steganography," Journal of Information Security, Vol. 7, No. 4, pp. 245-259, July 2016.
[3] J. Stone, "Reddit Fappening ban triggers outraged response from nude photo distributor," International Business Times, September 2014. (http://www.ibtimes.com/reddit-fappening-ban-triggers-outragedresponse-nude-photo-distributor-1681708)
[4] T. Gopalakrishnan, and S. Ramakrishnan, "Image encryption in blockwise with multiple chaotic maps for permutation and diffusion," ICTAT Journal on Image and Video Processing, Vol. 6, No. 3, pp. 1220-1227, February 2016.
[5] S.S. Dharwadkar, and R.M. Jogdand, "A user identity management protocol using efficient dynamic credentials," International Journal of Scientific Engineering and Research, Vol. 2, pp. 42-47, June 2014.
[6] M.G. Charate, and S.R. Bhosale, "Cloud computing security using Shamir’s secret sharing algorithm from single cloud to multi cloud," International Journal of Advanced Technology in Engineering and Science, Vol. 3, pp. 349-357, April 2015.
[7] K.S. Seethalakshmi, Usha. B, Sangeetha. K. N, “Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography”, IEEE Int. Conf.Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016.
[8] SadafBukhari, Muhammad ShoaibArif, M.R. Anjum, and SamiaDilbar, “Enhancing security of images by Steganography and Cryptography techniques”, IEEE Int. Conf. Innovative Computing Technology (INTECH), 2016.
[9] Ria Das, Indrajit Das, “Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques”, IEEE Int. Conf. on Research in Computational Intelligence and Communication Networks (ICRCICN), 2016.
[10] AnkitGambhir and SibaramKhara, “Integrating RSA Cryptography & Audio Steganography”, IEEE ICCCA, 2016.
[11] Kamaldeep Joshi, RajkumarYadav, “A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication”, IEEE ICIIP, 2015.
[12] Vipul Shanna and Madhusudan “Two New Approaches for Image Steganography Using Cryptography” IEEE Int. Conf. Image Information Processing, 2015.
[13] MoreshMukhedkar, PrajktaPowar and Peter Gaikwad, “Secure non real time image encryption algorithm development using cryptography & Steganography”, IEEE INDICON, 2015.
[14] RiniIndrayani, HanungAdiNugroho, RisanuriHidayat, IrfanPratama, “Increasing the Security of MP3 Steganography Using AES Encryption and MD5 Hash Function”, International Conference on Science and Technology-Computer (ICST), IEEE, 2016.
[15] Nikhil Patel, ShwetaMeena, “LSB Based Image Steganography Using Dynamic Key Cryptography”, International Conference on Emerging Trends in Communication Technologies (ETCT), 2016.
[16] Dan Gonzales, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, And Dulani Woods, “Triple Security Of File System For Cloud Computing,” Ieee Transactions On Cloud Computing. 5 (3), P1-14, 2017.
[17] Mark Stieninger, Dietmar Nedbal, Werner Wetzlinger, Gerold Wagner And Michael A. Erskine, “Factors Influencing The Organizational Adoption Of Cloud Computing: A Survey Among Cloud Workers,” International Journal Of Information Systems And Project Management. 6 (1), P1-19, 2018.
[18] G. Preethi And N.P.Gopalan, “Data Embedding Into Image Encryption Using The Symmetric Key For Rdh In Cloud Storage,” International Journal Of Applied Engineering Research. 13, P3861-3866, 2018.
[19] C. Kaleeswari, P. Maheswari, Dr. K. Kuppusamy, Dr. Mahalakshmi Jeyabalu, “A Brief Review On Cloud Security Scenarios,” Ijsrst. 4 (5), P1-6, 2018.
[20] Zheng Yan,Robert H. Deng And Vijay Varadharajan, “Cryptography And Data Security In Cloud Computing,” Ieee, P1-5, 2017.
[21]Swapnil Rajesh Telrandhe And Deepak Kapgate, “Authentication Model On Cloud Computing,” International Journal Of Computer Sciences And Engineering. 2 (10), P1-5, 2014.
[22] Richa Arya, “Triple Security Of File System For Cloud Computing,” International Journal Of Computer Science And Engineering. 2 (3), P1-7, 2014.