INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 258    Submit Your Rating     Cite This   Download        Certificate

A REVIEW OF PRIVACY PROTECTION OF CLOUD STORAGE BY STEGANOGRAPHY TECHNIQUES

    1 Author(s):  GAURAV . MR. B.L. PAL

Vol -  6, Issue- 2 ,         Page(s) : 28 - 37  (2016 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Cloud computing is one among the most recent growing area in the field of IT industry also called on-demand computing.The growth in field of cloud computing can increase threat security aspects. So security has remained a relentless concern for day today usage of internet, networking and cloud computing is affected. However the general public communication channels are liable to security attacks that may cause unauthorized access to some info. Encryption has been accustomed persist and forestall these attacks. However once the data is decrypted it'll be exposed to the attackers once more and it'll not have any security protection.

  1. Seung-Hyun S. and Xiaoyu D., “An Efficient Certificate less Encryption for Secure Data Sharing in Public Clouds”, IEEE Trans. on Knowledge And DataEngineering, Vol. 26, No. 9, Sept 2014. 
  2. Imran H. S., Bhagyashree B. R., “Cloud Information Security Using Third Party Auditor and Cryptographic Concepts”, International Journal of Application, Vol.3, Issue 11, Nov 2014. 
  3. Hsiao-Ying L., Wen-Guey T., “A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding”, IEEE Trans. on Parallel and DistributedSystems, Vol. 23, No. 6, June 2012. 
  4. Abhishek Mohta, Ravi Kant Sahu and LK Awasthi, “Robust Data Security for Cloud while using Third Party Auditor”, IJARCSSE, Vol No. 2, Issue 2, Feb2012.
  5. Namita T., Dr. MadhuSandilya and Dr. Meenu Chawla, “Spatial Domain Image Steganography based on Security and Randomization”,IJACSA, Vol. 5, No.1, 2014. 
  6. Rakhi and Suresh G., “A Review On Steganography Methods”,IJAREEIE,Vol. 2, Issue 10, October 2013 
  7. Jeremiah J. H. and William A. P., “Capacity of Steganographic Channels”, In proceeding with IEEE Transactions on Information Theory, Dec. 2012. 
  8. X. Zhifeng and X. Yang, “Security and privacy in cloud computing”, IEEE Communications Surveys andtutorials, pp 2394-187, April 2015. 
  9. Lori M. Kaufman John Harauz, “Data security in the world of cloud computing”, IEEE Computer andReliability society, pp2456-245, JAN 15. 
  10. Indrajit Rajput, “Enhanced data security in cloud computing with third party auditor”, in proceeding ofIJARCSSE, March 2013. 
  11. SanjoliSingla and Jasmeet Singh, “Cloud Data Security using Authentication and Encryption Technique”, Inproceeding of IJARCET, Vol 2, Issue 7, July 2013.
  12. ParulMukhi and Bhawna Chauhan, “Survey on triple system security in cloud computing”,In proceeding ofIJCSMC, Vol. 3, Issue. 4, April 2014. 
  13. Aparjita Sidhu and Rajiv Mahajan, “Enhancing security in cloud computing structure”, In IJRSR Vol. 5, Issue,1, pp.128-132, January, 2014. 
  14. K. S. Wagh, Swapnil Chaudhari, and Anita Deshmukh at al., “Data Security in Cloud Computing”, Inproceeding of International Journal of Current Engineering and Technology, 2014. 
  15. R. BalaChandar, M. S. Kavitha and K. Seenivasan, “A proficient model for high end security in cloud computing”, ICTACT journal on soft computing, Vol.04, issue: 02, Jan 2014. 
  16. M. K. Sarkar and Trijit Chatterjee, “Enhancing Data Storage Security in Cloud Computing Through Steganography”, ACEEE Int. J. on Network Security,Vol. 5, No. 1, Jan 2014. 
  17. Varsha Y. and Preeti A., “Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment”, IJCSMC, Vol. 3, and Issue.5, May 2014. 
  18. Wikipedia, “Cloud computing”, https://en.wikipedia.org/wiki/Cloud_computing#Origin _of_the_term”, visited on 10/10/2015.
  19. Muthakshi, Meyyappan and Phil, “Survey on Security Services in Cloud”, In Proceeding of NIST, Sept 2011.
  20. Wikipedia, “Steganography”, https://en.wikipedia.org/wiki/Steganography, visited on 10/10/2015.
  21. Wikipedia, “Advance Encryption Standars”, http://en.wikipedia.org/Advanced_Encryption_Standar d. 
  22. Amazon.com, “Amazon Web Services (AWS)”, Onlineat hppt://aws.amazon.com, 2014. 
  23. Michael M., “Cloud Computing”, 1stedition, pearson, 2009.
  24. T. Pasquier, B. Shand, and J. M. Bacon, “Information flow control for a medical web,” In e-Society, IADIS,2013. 
  25. Google, “The white paper was released in the Official Google Blog post”, Gmail:It’scooler in the cloud,2013.
  26. Gurpreet S., “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”,InInternational Journal   of   Computer   Applications(IJCA), Vol.67, No.19, April 2013.
  27. Kritika S., “Hash Based Approach for Secure Image Steganography Using Canny Edge Detection Method”, IJCSC, Vol.3, No., 1 pp.155-157, June 2012. 
  28. “Steganogrphy Research Paper”, http://www.engpaper.net/steganography-research-papers-2014.htm, visited on 10/11/2015. 
  29. Github, “WiFly Library, https://github.com/openshift,visited on 2/10/2015. 

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details