Fortifying Cloud through Steganography

Authors

  • Payal Garg GL Bajaj Institute of Engineering and Technology
  • Lalita Cahudhary I.T.S Engineering College
  • Hradesh Kumar I.T.S Engineering College

Keywords:

Cloud computing, Stenography, Security

Abstract

The rising trends of computer technology in collaboration with Internet services has boosted the aeon of
cloud computing. But with everything positive comes something negative. As cloud computing is an asset for the IT
industry as well as for the individual users, but it is also a liability as it leads to various security issues. Till date many
cryptographic techniques are being used to secure the data at rest. The strongest cryptographic algorithms which are
being used are AES (Advanced Encryption Standard), DES (Data Encryption standard) for symmetric encryption,
ECC (Elliptic Curve Cryptography) and RSA for asymmetric encryption. For ensuring data security of the stored data,
we have proposed to secure the data with stereography instead of regular cryptographic techniques from unauthorized
access. This scheme is expected to work perfectly for storing the data at cloud and successfully retrieving the data.

Downloads

Published

2019-03-31

How to Cite

Payal Garg, Lalita Cahudhary, & Hradesh Kumar. (2019). Fortifying Cloud through Steganography. International Journal of Technical Innovation in Modern Engineering & Science, 5(19), -. Retrieved from https://ijtimes.com/index.php/ijtimes/article/view/3360