{"title":"Hybrid model for cloud data security using steganography","authors":"Moshira A. Ebrahim, I. El-Maddah, H. K. Mohamed","doi":"10.1109/ICCES.2017.8275292","DOIUrl":null,"url":null,"abstract":"Cloud computing combines a huge number of virtual resources and presents flexible service to users by pay-as-you-need concept. However, cloud computing has many advantages like resource sharing and conjunction; also still there are some problems such as data security which is one of the critical factors in cloud environment. This paper proposed security model to protect cloud data from unauthorized access using cryptography and steganography. This model consist of three phases, in the first phase we hash data using Secure Hash Algorithm (SHA), Then encrypt data using Advanced Encryption Standard (AES) algorithm and encrypt the hash code and the new key by Public key cryptography. Finally we use Least Significant Bit (LSB) steganography to embed all information after encryption in any type of images.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2017.8275292","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Cloud computing combines a huge number of virtual resources and presents flexible service to users by pay-as-you-need concept. However, cloud computing has many advantages like resource sharing and conjunction; also still there are some problems such as data security which is one of the critical factors in cloud environment. This paper proposed security model to protect cloud data from unauthorized access using cryptography and steganography. This model consist of three phases, in the first phase we hash data using Secure Hash Algorithm (SHA), Then encrypt data using Advanced Encryption Standard (AES) algorithm and encrypt the hash code and the new key by Public key cryptography. Finally we use Least Significant Bit (LSB) steganography to embed all information after encryption in any type of images.