Open Access   Article Go Back

Extended Information Hiding Procedure in Cloud Computing Environment using Random Security Codes

Arvind Kumar1 , Ayush Gupta2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 848-853, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.848853

Online published on Apr 30, 2019

Copyright © Arvind Kumar, Ayush Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Arvind Kumar, Ayush Gupta, “Extended Information Hiding Procedure in Cloud Computing Environment using Random Security Codes,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.848-853, 2019.

MLA Style Citation: Arvind Kumar, Ayush Gupta "Extended Information Hiding Procedure in Cloud Computing Environment using Random Security Codes." International Journal of Computer Sciences and Engineering 7.4 (2019): 848-853.

APA Style Citation: Arvind Kumar, Ayush Gupta, (2019). Extended Information Hiding Procedure in Cloud Computing Environment using Random Security Codes. International Journal of Computer Sciences and Engineering, 7(4), 848-853.

BibTex Style Citation:
@article{Kumar_2019,
author = {Arvind Kumar, Ayush Gupta},
title = {Extended Information Hiding Procedure in Cloud Computing Environment using Random Security Codes},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {848-853},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4129},
doi = {https://doi.org/10.26438/ijcse/v7i4.848853}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.848853}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4129
TI - Extended Information Hiding Procedure in Cloud Computing Environment using Random Security Codes
T2 - International Journal of Computer Sciences and Engineering
AU - Arvind Kumar, Ayush Gupta
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 848-853
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
1160 238 downloads 109 downloads
  
  
           

Abstract

Growth in the cloud computing evidenced in the recent past has accentuated the need for higher levels of security for obvious reasons. Various algorithms and techniques have been developed by the researchers to provide the security at multiple ends in multiple locations of the cloud data. The researchers have attempted to provide the security using various methodologies developed over time. However, there are frequent breaches of security in the recent times observed globally. Though the use of finger reference key in the security of data over the cryptography algorithm has enhanced the level of security, yet there are still loopholes in the framework providing opportunity for hackers for unauthorized access. In this paper, we propose a methodology to enhance the security by introducing the random security codes on the existing security framework. We establish that this procedure is more robust as compared to only using the finger reference key suggested by previous researchers and analysts.

Key-Words / Index Term

Cloud Computing, Random Security Code, Data Hiding

References

[1] Flaherty K.O., “Breaking Down Five 2018 Breaches -- And What They Mean For Security In 2019”, Forbes Report, 2019.
[2] Siddharth V., “Seven Cyber security trends that India will witness in 2019”, PWC Report, 2018.
[3] Mudasir Ahmed Muttoo, Pooja Ahlawat, ” A Secure Information Hiding Approach in Cloud Using LSB”, International Journal of Science and Research, Vol. 4, Issue.,7, pp.1171-1776,2013.
[4] Nazir Mohsin, “Cloud Computing: Overview & Current Research Challenges “,IOSR Journal of Computer Engineering, Vol. 8, Issue.,1, pp. 14-22,2012.
[5] Ashik Mohamed M., Sankara Nayanan A., Nithyananda Kumari, ”Typical Security Measures Of Cloud Computing”,International Journal of Computer Trends and Technology, Vol. 5, No.,6, pp.299-304, 2013.
[6] Geeta C. M., RaghavendraS, RajkumarBuyya, Venugopal K R, S SIyengar, L M Patnaik,“Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions”, International Journal of Computer, Vol. 28, No.,1,pp.8-57, 2018.
[7] Kiran, Sandeep Sharma, “A Comparative Review Of Various Approaches To Ensure Data Security In Cloud Computing “, International Journal of Engineering Research and General Science, Vol.5, Issue.,2, pp.124-130, 2017.
[8] Ayman Ibaida, Ibrahim Khalil, ”Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems” , IEEE Transactions on Biomedical Engineering ,Vol. 60 , Issue., 12, pp.3322-3330, 2013.
[9] Ahmed Monjur, Mohammad Ashraf Hossain,“Cloud Computing and Security Issues in the Cloud” International Journal of Network Security & Its Applications, Vol.6, No., 1, pp.25-36,2014.
[10] Mudasir Ahmed Muttoo, Pooja Ahlawat,” A Secure Information Hiding Approach in Cloud Using LSB”, International Journal of Science and Research, Vol. 4, Issue.,7, pp.1171-1776,2013.
[11] C.-C. Chang, C.-C. Lin, C.-S. Tseng, W.-L. Tai, “Reversible hiding in DCT-based compressed images”, Information Sciences, Vol. 177, Issue., 13, pp. 2768–2786, 2007.
[12] Deepika,” Enhancement of Data Security for Cloud Environment Using Cryptography and Steganography Technique” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue.,1, pp.225-237, 2017.
[13] Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham,” Security Issues for Cloud Computing”, International Journal of Information Security and Privacy, Vol. 4, Issue.,2, pp. 39-51, 2010.
[14] Wid A. Awadh, Ali S. Hashim,” Using Steganography for Secure Data Storage in Cloud Computing”, International Research Journal of Engineering and Technology, Vol. 4, Issue., 4, pp. 3668-3772, 2017.
[15] Lubacz Józef; Wojciech Mazurczyk ; Krzysztof Szczypiorski,” Principles and overview of network steganography”, INSPEC, Vol. 52 , Issue., 5 , pp. 225 – 229,2014.
[16] Athanasios Vasilakos, Muhammad Baqer Mollah, Md. Abul Kalam Azad, “Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things”, IEEE Cloud Computing, Vol. 4, Issue.,1,pp. 34-43, 2017.
[17] Pankaj Arora, RubalChaudhry, Wadhawan Er. Satinder Pal Ahuja,” Cloud Computing Security Issues in Infrastructure as a Service”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2, Issue.,1, 2012.
[18] Ramalingam Sugumar, K. Arul Marie Joycee, “FEDSACE: A Framework for Enhanced user Data Security algorithms in Cloud Computing Environment”, International Journal on Future Revolution in Computer Science & Communication Engineering, Vol. 4, Issue., 3, pp. 49-52, 2018.
[19] Baowei Wang,Zhihua Xia ,Xinhui Wang and Xingming Sun, ”Steganalysis of least significant bit matching using multi order differences”, Wiley online liabrary,2013; https://doi.org/10.1002/sec.864.
[20] Mandy Douglas, Karen Bailey, Mark Leeney, Kevin Curran,” An overview of Steganography techniques applied to the protection of biometric data” July 2018, Volume 77, Issue 13, pp 17333–17373.
[21] Balaji. S, Mandy Sonio Newcastle,”SECURE DATA TRANSMISSION BY STEGANOGRAPHY USING PRIVATE KEY IN CLOUD” International Journal of Pure and Applied Mathematics,Vol. 119, No., 14, pp. 1653-1660, 2018.
[22] Nancy Garg, Kamalinder Kaur, ”Data Storage Security Using Steganography Techniques”, International Journal of Technical Research and Applications, Vol. 4, Issue.,6, pp. 93-98, 2016.
[23] A. Mahesh Babu, G.A. Ramachandra, M. Suresh Babu, “Implementation of Security in Cloud Systems Based using Encryption and Steganography”, International Journal of Electrical, Electronics and Computer Systems, Vol. 3, Issue., 11, 80-84, 2015.
[24] Shelly, Rajesh Kumar Bawa,” Secure Image Transmission for Cloud Storage System Using Hybrid Scheme”, International Journal of Engineering Research and Development, Vol. 11, Issue., 9, pp. 18-26, 2015.
[25] Gowthami Garikapati, Yakobu D, Gnaneswara Rao Nitta, Amudhavel J,” AN ANALYSIS OF CLOUD DATA SECURITY ISSUES AND MECHANISMS”, International Journal of Pure and Applied Mathematics, Vol. 116, No. 6, pp. 141-147,2017.
[26] Ayush Gupta, Arvind Kumar, “Information Security using the ensemble approach of Steganography and Cryptography”, in the proceedings of International Conference on Sustainable Computing in Science, Technology & Management, SUSCOM-2019, pp. 66-73, 2019, http://dx.doi.org/10.2139/ssrn.3350895.
[27] Pramod Ambadas Rao Pawar, Aparna G. Korde, “A Solution to Cloud Security: Image Steganography”, International Journal of Multidisciplinary Research, Vol. 2, Issue. ,2, pp.83-90, 2016.
[28] Mohammad Obaidur Rahman, Muhammad Kamal Hossen, Md. GolamMorsad, Animesh Chandra Roy, Md. Shahnur Azad Chowdhury, “An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique “, IJCSNS International Journal of Computer Science and Network Security, Vol. 18, No.9, pp.85-93, 2018.
[29] Adamu Ismail Abdulkarim, Boukari Souley, “An Enhanced Cloud Based Security System Using RSA as Digital Signature and Image Steganography”, International Journal of Scientific & Engineering Research, Vol. 8, Issue.,7, pp. 1512-1517, 2017.
[30] Anuradha Porwal, “Hybrid Protocol Employing Steganography &Cryptography for Cloud Storage Security”, International Journal of Advanced Research in Computer Science & Technology, Vol. 4, Issue.,2, pp. 208-209, 2016.
[31] Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier, “Hidden and Uncontrolled – On the Emergence of Network Steganography Threats”, ISSE 2014 Securing Electronic Business Processes Conference Proceedings, pp. 123-133.
[32] Dhivyaprabha E. , R. Madhubala, M. Abarna, “Security Framework for Cloud Data Sharing”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol.3,Issue.3, pp. 665-671, 2018.
[33] Mishra Ajeet , Umesh Kumar Lilhore, Nitesh Gupta, “Review of Various Data Storage and Retrieval Method for Cloud Computing”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol.2,Issue.5, pp. 584-588, 2017.
[34] Varsha Yadav, Preeti Aggarwal,” Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue., 5, pp. 702 – 707, 2014.