Securing The Data in Cloud Storage Using Cryptosystem Along With Stegnography
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
Cloud Computing is a highly developing technology where user data (both critical and non-critical) is shared on a centralized server. The sharing of the user’s critical data on a third party cloud server does not guarantee the promised level of security and there is a threat to compromise user data. The security issues are classified in to two categories where one is related to the cloud provider and the other to the consumer. In order to safeguard the data and improve the security measures in the consumer side, cryptographic encryption technique is used where aggregate key and steganography concepts are implemented. This project aspires to provide secured data sharing in cloud storage with the help of steganography concepts in addition with the sharing of aggregate keys between data owners and data users.
Authors and Affiliations
S. Priyanka, R. Lavanya
Static Load Balancing Using ASA Max-Min Algorithm
In recent times, a huge demand for computational resources has led to the development of large network known as a Grid [1]. A grid allows resources to be acquired in real time on an on-demand basis making sophisticated...
Improved Performance by Trusted Path Under Various Attacks in Mobile Ad Hoc Network
MANET is self-configuring, autonomous and dynamic infrastructure in which the nodes can acts as hosts as well as router in the network. MANET is having an open-source, decentralized, and dynamic infrastructure which mea...
VBIOT: Building a Virtual Brain to Life for the Secrets
The main aim is to upload to any secure document any other. After the death of the body, the virtual brain will act as the man's brain. Human brain was the most valuable creation of God. The man is called intelligent be...
Implementing Random Encoding for Image Steganography
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Stega...
Utilization of Plastic Waste in Foundry Sand Bricks.
There has been a considerable imbalance between the availability of conventional building materials and their demand in the recent past. On the other hand the foundry waste Sand is abundantly available and the disposal...