Open Access   Article Go Back

A Survey of Data Hiding methods for data security in Cloud

A Mallareddy1 , R Sridevi2 , Ch G V N Prasad3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 690-694, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.690694

Online published on May 31, 2019

Copyright © A Mallareddy, R Sridevi, Ch G V N Prasad . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A Mallareddy, R Sridevi, Ch G V N Prasad, “A Survey of Data Hiding methods for data security in Cloud,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.690-694, 2019.

MLA Style Citation: A Mallareddy, R Sridevi, Ch G V N Prasad "A Survey of Data Hiding methods for data security in Cloud." International Journal of Computer Sciences and Engineering 7.5 (2019): 690-694.

APA Style Citation: A Mallareddy, R Sridevi, Ch G V N Prasad, (2019). A Survey of Data Hiding methods for data security in Cloud. International Journal of Computer Sciences and Engineering, 7(5), 690-694.

BibTex Style Citation:
@article{Mallareddy_2019,
author = {A Mallareddy, R Sridevi, Ch G V N Prasad},
title = {A Survey of Data Hiding methods for data security in Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {690-694},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4301},
doi = {https://doi.org/10.26438/ijcse/v7i5.690694}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.690694}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4301
TI - A Survey of Data Hiding methods for data security in Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - A Mallareddy, R Sridevi, Ch G V N Prasad
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 690-694
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
478 329 downloads 126 downloads
  
  
           

Abstract

In recent years cloud computing has achieved great development as it provides economic and convenient services. Cloud data services are an interesting and the latest way for storing enterprise data as more companies and users are uploading their data to cloud. The problem of data privacy and security needs to be addressed efficiently to fully utilize the power of cloud data services. Data security is a crucial aspect in cloud data storage and transmission. The use of data hiding methods for the security in data transmission and data storage would be very effective in securing cloud data. In this paper, we present a survey of data encryption methods, steganography methods and hybrid methods, that have been extensively applied in this context. However, majority of these methods suffer the overloads involved with encryption techniques and also have heavy computational time. A new method that specifically addresses security of cloud without the usage of encryption process is essential for reducing the overheads of encryption techniques, thereby improving the overall performance. At this juncture, data hiding techniques are considered to be more suitable and potential substitute over the encryption-based cloud data storage security techniques existing in the literature. We propose to build such data hiding techniques as future work.

Key-Words / Index Term

Data Hiding, Cloud data security, Encryption Techniques, Data aggregation

References

[1] Avizienis A, Laprie J C, Randell B and Landwehr C 2004 “Basic concepts and taxonomy of dependable and secure computing”. IEEE Trans. Depend. Secure Comput. 1(1): 11-33
[2] A. Kaur and M. Bhardwaj, “Hybrid encryption for cloud database security”, International Journal of Engineering Science & Advanced Technology, vol. 2, pp. 737 -741, 2012.
[3] A. Rao, “Centralized database security in cloud”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, pp. 544-549, 2012.
[4] D. Manivannan and R. Sujarani, “Light weight and secure database encryption using tsfs algorithm”, in Proceedings of the International Conference on Computing Communication and Networking Technologies (ICCCNT ’10), pp. 17, IEEE, 2010.
[5] Handa, Karun, and Uma Singh. "Data security in cloud computing using encryption and steganography." International Journal of Computer Science and Mobile Computing vol. 4, pp. 786-791, 2015.
[6] E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing”, in Proceedings of the 8th International Conference on Informatics and Systems (INFOS ’12), pp. CC-12CC-17, IEEE, 2012.
[7] K. Huang and R. Tso, “A commutative encryption scheme based on ElGamal encryption”, in Proceedings of the 3rd International Conference on Information Security and Intelligent Control (ISIC 12), pp. 156-159, IEEE, August 2012.
[8] Kevin Skapinetz, "Virtualisation as a Blackhat Tool," in Network Security, Elsevier., 2007, pp. 4-7.
[9] Kini, K., M. Mithani, R. Naik, D. Raut, et M. Kumbar. “Securing cloud data using crypto-stegno based technique”. Journal of Insect Behavior 5, 178-180, 2016
[10] MR KA Sarkar TR Chatterjee.. “Enhancing Data Storage Security in Cloud Computing Through Steganography”. ACEEE Int. J. on Network Security, Vol. 5, No. 1.2014.
[11] Muhammad Usman, Mian Ahmad Jan, Xiangjian He, “Cryptography-based secure data storage and sharing using HEVC and public clouds”, Information Sciences, Volume 387, 2017, Pages 90-102, ISSN 0020-0255, https://doi.org/10.1016/j.ins.2016.08.059.
[12] N. Garg, and K. Kaur, "Hybrid information security model for cloud storage systems using hybrid data security scheme", International Research Journal of Engineering and Technology, Vol. 3, Issue 4, pp.2194-2196, 2016.
[13] Singla, S. et J. Singh . “Implementing cloud data security by encryption using rijndael algorithm”. Global Journal of Computer Science and Technology Cloud and Distributed 13,19-22.2013
[14] Singla, Surbhi. “Data Embedding Technique for Image Steganography in Cloud Computing”. Diss. 2018.
[15] Suneetha, D., and R. Kiran Kumar. "A Novel Algorithm for Enhancing the Data Storage Security in Cloud through Steganography". Advances in Computational Sciences and Technology,Vol. 10: 2737-2744, 2017
[16] Tirthani, Neha, and R. Ganesan. "Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography" IACR Cryptology ePrint Archive 2014 (2014): 49.