Abstract
Cloud computing is new age computing model. Which gives that how to use the resources even if don’t own them. It gives the facility to share the resources over the internet, without building the necessary infrastructure. This is an on demand service. This model gives faster accessing of the resources and reduces management related problems. In this paper we are going to discuss the different cloud computing models with its advantages, characteristic and various security measures in the current scenario. At last we discussed a new level of security in cloud computing for data diffusion and storage on hybrid cloud in security concern. We are presenting new linguistic text steganography approach for increasing data security. In these techniques first we encrypt our secret data by using substitution method and then embed it in some random cover media for hiding the aspect of original text. We have proposed new method of Indian script encoding method and capital alphabet shape encoding which would be hard to decipher by inarticulate person. We are applying this techniques on private cloud server when we transfer our private data to public cloud so our data will also be secure in transmission and storage on public cloud.Time overhead of this techniques is very less and also it’s not taking too much space as one character of random cover is use to hide one character of encrypted secret text.
References
Christodorescu, M., Sailer, R., Schales, D.L., Sgandurra, D., Zamboni, D.: Cloud Security is not (just) virtualization security. In: Proceedings of the Conference on Computer and Communication Security, ACM (2009)
Barde, A.S.: Cloud computing and its vision 2015!!. Int. J. Comp. Commun. Eng. 2(4) 2013
Mell, P., Grance, T.: The NIST definition of cloud computing. US Department of Commerce, Jan 2011
Wei, J., Zhang, X., Amimons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceeding of the workshop on cloud computing security, ACM (2009)
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environment Workshop (2008)
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: a berkeley view of cloud computing, UC berkeley reliable adaptive distributed systems laboratory, 10 feb 2009
Ferriman, R.: The benefits of Cloud Computing, White Paper. Third-Brigade. White Paper: Cloud Computing Secsurity: Making Virtual Machines Cloud-Ready
Chadha, K., Bajpai, A.: Security aspects of cloud computing. Int. J. Comp. Appl. 40(8), 43–47 (2012)
Kumar, A., Chadha, K., Asawa, K.: Framework for vulnerability reduction in real time intrusion detection and prevention systems using SOM based IDS with Net filter-Iptables IJCSIS. ISSN Int. J. Comp. Sci. Inf. 8(4), 1947–5500 (2010)
Parte, S., Dehariya, N.: Cloud computing: issues regarding security, applications and mobile cloud computing. Int. J. Advanc. Res. Comp. Sci. Softw. Eng. 5(3), 403–406 (2015)
Chaudhary, S., Dave, M., Sanghi, A.: An elucidation on steganography and cryptography. In: Second International Conference on Information and Communication Technology for Competitive Strategies, ACM, Udaipur, India (2016)
Raoa, R.V., Selvamanib, K.: Data security challenges and its solutions in cloud computing. In: Procedia of Science direct Computer Science International Conference on Computer, Communication and Convergence (ICCC), Vol. 48, pp. 204–209 (2015)
Khan, S.S., Tuteja, R.R.: Security in cloud computing using cryptographic algorithms. Int. J. Innov. Res. Comp. Commun. Eng. 3(1) (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sanghi, A., Chaudhary, S., Dave, M. (2018). Enhance the Data Security in Cloud Computing by Text Steganography. In: Yang, XS., Nagar, A., Joshi, A. (eds) Smart Trends in Systems, Security and Sustainability. Lecture Notes in Networks and Systems, vol 18. Springer, Singapore. https://doi.org/10.1007/978-981-10-6916-1_22
Download citation
DOI: https://doi.org/10.1007/978-981-10-6916-1_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6915-4
Online ISBN: 978-981-10-6916-1
eBook Packages: EngineeringEngineering (R0)