Implementation of an Improved Multi-Channel Security in Cloud Computing Using Image Steganography and RSA Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
The increase use of cloud computing infrastructure has led to a security consciousness by users and cloud service providers to protect data available in the cloud from illegal users. Even though, different techniques have been proposed by different researchers, yet, more techniques are still proposed all in the quest to achieve better and flexible security techniques that will utilize less resource and minimize cost, because user pay as they go in the cloud. In this paper we proposed an improved multi-channel security technique in the cloud using image steganography and RSA algorithm. The proposed method was used to conceal the existence of data communication using the image steganography and protect the concealed data using RSA encryption algorithm in order to prevent illegal access. Different data set such as text, image, audio and video were used to evaluate the system. It is shown in the analysis that text data utilizes less processing time, memory storage and processing power followed by image, video and audio data set. Except, for processing power where all the data set utilizes the same network bandwidth. Also, the technique provides a strong security measure to prevent illegal access to stored data in the cloud.
Authors and Affiliations
Ismail Abdulkarim Adamu, Souley Boukari, Hajara Musa, Fatima Umar Zambuk
Prevention of SQL Injection Attacks having XML Database
XML-based Web applications are broadly utilized in computer world, whose main applications are remote operation performance and bring arbitrary data. It is recently used in cloud interfaces, E-Government, ...
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
In this paper two different methods for Numeral Recognition are proposed and their results are compared. The objective of this paper is to provide an efficient and reliable method for recognition of handwritten...
Reliable Multicast and Energy Conservation in MANET: A Survey
Abstract: Mobile ad hoc networks are networks without any infrastructure and topology. They are self organized and battery powered networks with a large number of mobile nodes. Limited battery power is the most i...
Implementation of Hybrid Wavelet Transform for Adaptive Lossless Image Compression
Abstract: In digital image processing, Image compression is a type of data compression causing reduction in image size but maintain the image quality. It reduce cost and time in image storage and transmission and thuscan...
A Comparitative Survey on Malicious Nodes and Their Attacks in MANET
Abstract: The designation of the mobile ad hoc networks (MANET) is, particularly to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or n...