Sameen Fatima, Y. Saleem, Shafiq Hussain, Badar ul Din, W. Sajjad, Nimra Shahzadi
{"title":"云中的多层数据安全模型","authors":"Sameen Fatima, Y. Saleem, Shafiq Hussain, Badar ul Din, W. Sajjad, Nimra Shahzadi","doi":"10.1109/ETECTE55893.2022.10007161","DOIUrl":null,"url":null,"abstract":"The field of cloud computing is constantly growing. Users can use cloud to access the resources of the computer system without directly maintaining them. In order to deal with current security and privacy issues, this research main objective is to provide a data security model based which is based on hybrid encryption and steganography. A multi stage data security model is used which is based on Rivest-Shamir-Adleman (RSA), identity-based encryption (IBE), Advanced Encryption Standard (AES), and Least Significant Bit steganography (LSB). The four phases includes data sharing, data backup and recovery, steganography, and data encryption to protect and secure data. By defending data integrity, confidentiality, and privacy from intruders, this method increases data redundancy on cloud, flexibility of cloud, efficiency, and security of cloud.","PeriodicalId":131572,"journal":{"name":"2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Multi-Layer Data Security Model in Cloud\",\"authors\":\"Sameen Fatima, Y. Saleem, Shafiq Hussain, Badar ul Din, W. Sajjad, Nimra Shahzadi\",\"doi\":\"10.1109/ETECTE55893.2022.10007161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The field of cloud computing is constantly growing. Users can use cloud to access the resources of the computer system without directly maintaining them. In order to deal with current security and privacy issues, this research main objective is to provide a data security model based which is based on hybrid encryption and steganography. A multi stage data security model is used which is based on Rivest-Shamir-Adleman (RSA), identity-based encryption (IBE), Advanced Encryption Standard (AES), and Least Significant Bit steganography (LSB). The four phases includes data sharing, data backup and recovery, steganography, and data encryption to protect and secure data. By defending data integrity, confidentiality, and privacy from intruders, this method increases data redundancy on cloud, flexibility of cloud, efficiency, and security of cloud.\",\"PeriodicalId\":131572,\"journal\":{\"name\":\"2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETECTE55893.2022.10007161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETECTE55893.2022.10007161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The field of cloud computing is constantly growing. Users can use cloud to access the resources of the computer system without directly maintaining them. In order to deal with current security and privacy issues, this research main objective is to provide a data security model based which is based on hybrid encryption and steganography. A multi stage data security model is used which is based on Rivest-Shamir-Adleman (RSA), identity-based encryption (IBE), Advanced Encryption Standard (AES), and Least Significant Bit steganography (LSB). The four phases includes data sharing, data backup and recovery, steganography, and data encryption to protect and secure data. By defending data integrity, confidentiality, and privacy from intruders, this method increases data redundancy on cloud, flexibility of cloud, efficiency, and security of cloud.