Implementation of an Improved Multi-Channel Security in Cloud Computing Using Image Steganography and RSA Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
The increase use of cloud computing infrastructure has led to a security consciousness by users and cloud service providers to protect data available in the cloud from illegal users. Even though, different techniques have been proposed by different researchers, yet, more techniques are still proposed all in the quest to achieve better and flexible security techniques that will utilize less resource and minimize cost, because user pay as they go in the cloud. In this paper we proposed an improved multi-channel security technique in the cloud using image steganography and RSA algorithm. The proposed method was used to conceal the existence of data communication using the image steganography and protect the concealed data using RSA encryption algorithm in order to prevent illegal access. Different data set such as text, image, audio and video were used to evaluate the system. It is shown in the analysis that text data utilizes less processing time, memory storage and processing power followed by image, video and audio data set. Except, for processing power where all the data set utilizes the same network bandwidth. Also, the technique provides a strong security measure to prevent illegal access to stored data in the cloud.
Authors and Affiliations
Ismail Abdulkarim Adamu, Souley Boukari, Hajara Musa, Fatima Umar Zambuk
Analytical Review of Feature Extraction Techniques for Automatic Speech Recognition
Speech recognition is a multileveled pattern recognition task, in which acoustical signals are examined and structured into a hierarchy of sub word units (e.g., phonemes), words, phrases, and sentences. Each l...
Virtual Teaching and Painting Platform for the Colour Blind
Abstract: Education involves perception of colour and unfortunately some of us are not blessed with this gift of proper vision. Lacking the ability to distinguish certain colours is commonly known as Colour Blindne...
New Dynamical Key Dependent S-Box based on chaotic maps
Abstract: The strength and security of cryptographic algorithms is determined by substitution non-linear Sboxes, so the construction of cryptographically strong S-boxes is important in the design of secure cryptosystems....
Data Mining Techniques: Contemporary Amalgam System to Predict Diabetes.
Abstract: Diabetes is a never ending disease which affects many major organs of the human body, including heart, blood vessels, nerves, eyes and kidneys. The World Health Organization (WHO) estimates that nearly 200 mill...
Simulation of Route Optimization with load balancing Using AntNet System
This paper is based on analysis of the performance of load balancing and route optimization in computerized networks. The complete system model shows the scenario of Packet distribution between nodes, and if cong...