Skip to main content

Enhance the Data Security in Cloud Computing by Text Steganography

  • Conference paper
  • First Online:
Smart Trends in Systems, Security and Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 18))

Abstract

Cloud computing is new age computing model. Which gives that how to use the resources even if don’t own them. It gives the facility to share the resources over the internet, without building the necessary infrastructure. This is an on demand service. This model gives faster accessing of the resources and reduces management related problems. In this paper we are going to discuss the different cloud computing models with its advantages, characteristic and various security measures in the current scenario. At last we discussed a new level of security in cloud computing for data diffusion and storage on hybrid cloud in security concern. We are presenting new linguistic text steganography approach for increasing data security. In these techniques first we encrypt our secret data by using substitution method and then embed it in some random cover media for hiding the aspect of original text. We have proposed new method of Indian script encoding method and capital alphabet shape encoding which would be hard to decipher by inarticulate person. We are applying this techniques on private cloud server when we transfer our private data to public cloud so our data will also be secure in transmission and storage on public cloud.Time overhead of this techniques is very less and also it’s not taking too much space as one character of random cover is use to hide one character of encrypted secret text.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Christodorescu, M., Sailer, R., Schales, D.L., Sgandurra, D., Zamboni, D.: Cloud Security is not (just) virtualization security. In: Proceedings of the Conference on Computer and Communication Security, ACM (2009)

    Google Scholar 

  2. Barde, A.S.: Cloud computing and its vision 2015!!. Int. J. Comp. Commun. Eng. 2(4) 2013

    Google Scholar 

  3. Mell, P., Grance, T.: The NIST definition of cloud computing. US Department of Commerce, Jan 2011

    Google Scholar 

  4. Wei, J., Zhang, X., Amimons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceeding of the workshop on cloud computing security, ACM (2009)

    Google Scholar 

  5. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environment Workshop (2008)

    Google Scholar 

  6. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: a berkeley view of cloud computing, UC berkeley reliable adaptive distributed systems laboratory, 10 feb 2009

    Google Scholar 

  7. Ferriman, R.: The benefits of Cloud Computing, White Paper. Third-Brigade. White Paper: Cloud Computing Secsurity: Making Virtual Machines Cloud-Ready

    Google Scholar 

  8. Chadha, K., Bajpai, A.: Security aspects of cloud computing. Int. J. Comp. Appl. 40(8), 43–47 (2012)

    Google Scholar 

  9. Kumar, A., Chadha, K., Asawa, K.: Framework for vulnerability reduction in real time intrusion detection and prevention systems using SOM based IDS with Net filter-Iptables IJCSIS. ISSN Int. J. Comp. Sci. Inf. 8(4), 1947–5500 (2010)

    Google Scholar 

  10. Parte, S., Dehariya, N.: Cloud computing: issues regarding security, applications and mobile cloud computing. Int. J. Advanc. Res. Comp. Sci. Softw. Eng. 5(3), 403–406 (2015)

    Google Scholar 

  11. Chaudhary, S., Dave, M., Sanghi, A.: An elucidation on steganography and cryptography. In: Second International Conference on Information and Communication Technology for Competitive Strategies, ACM, Udaipur, India (2016)

    Google Scholar 

  12. Raoa, R.V., Selvamanib, K.: Data security challenges and its solutions in cloud computing. In: Procedia of Science direct Computer Science International Conference on Computer, Communication and Convergence (ICCC), Vol. 48, pp. 204–209 (2015)

    Google Scholar 

  13. Khan, S.S., Tuteja, R.R.: Security in cloud computing using cryptographic algorithms. Int. J. Innov. Res. Comp. Commun. Eng. 3(1) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Sanghi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sanghi, A., Chaudhary, S., Dave, M. (2018). Enhance the Data Security in Cloud Computing by Text Steganography. In: Yang, XS., Nagar, A., Joshi, A. (eds) Smart Trends in Systems, Security and Sustainability. Lecture Notes in Networks and Systems, vol 18. Springer, Singapore. https://doi.org/10.1007/978-981-10-6916-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6916-1_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6915-4

  • Online ISBN: 978-981-10-6916-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics