Cloud based Secure Storage of Files using Hybrid Cryptography and Image Steganography (original) (raw)

Secure File Storage on Cloud using Hybrid Cryptography

International Journal of Computer Sciences and Engineering, 2019

In this era cloud computing is used in various fields like industry, military, college, etc. for various services and storage of huge amount of data. Data stored in this cloud can be accessed or retrieved on the users request without direct access to the server computer. But the major concern regarding storage of data online that is on the cloud is the Security. This Security concern can be solved using various ways, the most commonly used techniques are cryptography and steganography. But sometimes a single technique or algorithm alone cannot provide high-level security. So we have introduces a new security mechanism that uses a combination of multiple cryptographic algorithms of symmetric key and steganography. In this proposed system 3DES (Triple Data Encryption Standard), RC6 (Rivest Cipher 6) and AES (Advanced Encryption Standard) algorithms are used to provide security to data. All the algorithms use 128-bit keys. LSB steganography technique is used to securely store the key information. Key information will contain the information regarding the encrypted part of the file, the algorithm and the key for the algorithm. File during encryption is split into three parts. These individual parts of the file will be encrypted using different encryption algorithm simultaneously with the help of multithreading technique. The key information is inserted into an image using the LSB technique. Our methodology guarantees better security and protection of customer data by storing encrypted data on a single cloud server, using AES, 3DES and RC6 algorithm.

CLOUD SECURITY USING LEAST SIGNIFICANT BIT STEGANOGRAPHY AND DATA ENCRYPTION STANDARD ALGORITHM

GESJ: Computer Science and Telecommunications, 2020

Cloud security is getting more important than ever before. The cloud platform and services are regards as massive accessible data centers that can be accessed anywhere and anytime. The increase in the cloud users has unfortunately also, been accompanied by the growth in malicious activities in the cloud. Millions of people are surfing the cloud for different purposes, hence they need a highly secured environment and consistent services. The future trend of cloud computing, especially in expanding the series of applications that requires a deeper degree of privacy and authentication. Cryptography and steganography are the two famous security measures to prevent unauthorized users to access information in the cloud. The goal of cryptography is data protection while that of steganography is to enable secret communication. Cryptography transforms the original data into an unreadable format (that is, ciphertext) to the typical user whereas steganography embedded a vital message in other digital media. We proposed a simple data protection model where data is encrypted using data encryption standard (DES) and least significant bit (LSB) steganography. The proposed model was able to provide two layer security strength to the documents by preventing unauthorized users from gaining access to the documents in the cloud.

Secure Data Storage in Cloud Using Encryption and Steganography

In this project, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible scheme combining cryptography and steganography. Encryption module encrypts the files before they are uploaded and decryption module decrypts them when they are downloaded. The text steganography inserts a watermark within an html file to uniquely identify it's owner. The image steganography embeds the watermark within an image file.

Secure File Storage on Cloud Using Cryptography

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

Hacking became a serious drawback lately. Transference of secure knowledge or communication through the web turns out to be difficult because of security considerations. to anticipate these security hurdles, we tend to use Cryptography, and Image Steganography. Day's cloud computing is currently employed in several areas like business, colleges, and Universities to store a great amount of knowledge. We will extract knowledge from the cloud for the asking of users. To store knowledge on the cloud we've to face several errors and issues. Cryptography and steganography techniques area unit well-liked currently a day's for knowledge security. using one algorithmic rule isn't effective for prime-level security to knowledge in cloud computing. during this paper, we initiated a new security mechanism using symmetrical key cryptography algorithmic rules and steganography. during this projected system AES, blowfish, RC6, and 3DES algorithms area units were used to supply blockwise security to knowledge. All algorithms have a key size of 128 bits. Key data contains that a part of the file is encrypted using that algorithmic rule and key. The file is split into eight components. every part of the file is encrypted using different algorithmic rules. All components of the file area unit are encrypted at the same time with the assistance of the multithreading technique. encoding Keys area unit inserted into cowl image using LSB technique. Steganography image is sent to a valid receiver using email. For file secret writing purposes reverse method of cryptography is applied.

An Enhanced Cloud Based Security System Using RSA as Digital Signature and Image Steganography

Ismail Abdulkarim Adamu, 2017

cloud computing is a collection of configurable shareable resources accessible via the internet. Cloud computing save individuals and organizations the cost of buying and maintaining resources such as memory storage, software, network, server, operating system by using the one available on cloud by paying according the resources used. The major drawback of cloud computing is security challenges. This is because cloud resources are managed by third party. Some security techniques such as cryptography and steganography are used to protect data to be stored on the cloud from intruders. This work proposed an enhanced security system using RSA as digital signature and image steganography to improve the security of data stored on the cloud in order to prevent the access of those data when uploading or downloading them from the cloud from unauthorized users and also evaluate the efficiency of the system by measuring the computing resources such as memory storage, CPU processing, power and network bandwidth consumed by the algorithms using different data types and size.

TRIPLE LAYER SECURE ENCRYPTION: BY COMBINED RSA, IMAGE STEGANOGRAPHY&DIGITAL SIGNATURE

With increase in use of Internet among public and availability of digital data sharing has taken industry professionals and researchers to giveindependent focus on information security. With growing internet users frequently required digital media store space toreceive and sendprivate information and this information requires protected against unauthorized attacks &access.In this paper I have presented a new technique for providing secure encryption to the user data. New proposed secure encryption will consists of a combination of RSA Encryption,Steganography along with digital signature.

Development of Secure File Storage on Cloud using Hybrid Cryptography

2020

In today’s world, security and privacy are the most important commodity. Compromising of privacy may lead to destroying the life of an individual. Now a days Cloud Computing is used in many areas like industries, military, colleges, etc,.to store huge amount of data. We can store and retrieve data on the command of one or many users. Storing data on cloud is a risky process like important files belonging to a company which can reveal confidential information which is not supposed to be revealed other than respective authorities. To provide the solution for these issues there are number of ways. There are numerous techniques such as cryptography, steganography etc., We have taken strongest feature of all the techniques and designed a hybrid cryptographic system involving one of the three strongest algorithms known to man. The algorithms used in this system are AES-256, SHA-256, MD5. The use of 256 bit algorithms makes it impossible to crack. We are using random generator to generate ...

Using Steganography for Secure Data Storage in Cloud Computing

Cloud computing is one of the popular method of accessing shared and dynamically configurable resources via the computer network on demand. The secure data storage on cloud environments is the primary requirement of such applications, where data are being transferred or transmitted between the servers and their users. One of the most effective techniques for secure communicating is steganography in cloud. The steganography refers to the method of writing hidden messages in a manner that no one other person but sender and receiver would be able to securely understand and communicate the information hidden in the means of communications. To ensure security of data in cloud computing, this paper presents a new text steganography approach for hide loaded secret English text file in a cover English text file. The proposed approach improved data security, data hiding capacity, and time.

Novel and secure encoding and hiding techniques using image steganography: A survey

2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM), 2012

The recent enlargement in computational power and technology has propelled the requirements for extremely secured data in cloud. One of the most effective techniques for secure communicating is steganography in cloud. The method of applying steganography in conjunction with cryptography, referred to as twin steganography, develops a durable model that adds a lot of challenges in distinguishing any hidden and encoded information. Therefore using steganography within steganography, create to better interpretation of twin steganography which is able to give higher security in cloud. A ProofLess Public Key Encoding (PL: PUKE) clears the key written agreement drawbacks in identity free-based encoding and certification annulment drawbacks in PU Key cryptography. A tends to (PL: PUKE) design while not exploitation matching operations. Each Data owner first register in the cloud service provider. It can submit Thumb Finger Print and Aadhaar Card Number. Both Finger Print and Aadhar Card Number are stored in the SEcurity-as-a-Service (SEaaS). The KeyProvider-as-a-Service (KPaas) to provide key to Cloud data owner. The cloud is applied as safe compute storage as well as Key Creating Center-as-a-Service (KCCaaS). The data owner encrypts the sensitive data using the cloud, KCCaaS making user key (UR Key) based on its data owner public key (PU Key) and upload the encoding data store to the STorage-as-a-Service (STaaS) in the cloud. Upon successful authorization, the cloud partly decipherment the encoding data for the users by using Security Negotiation Host-as-a-Service (SNHaaS). The users subsequently fully decoding the partially decrypted data using their private key (SEC Key) as well as UR Key. A method for concealment knowledge with two level of security to plant knowledge at the side of sensible sensory activity transparency and high payload capability. A tend to carry out a CL-PUKE theme and the overall cloud primarily based system and assess its security and performance.