Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
CRYPTOGRAPHY
ABSTRACT:
Data Storage Security is a biggest trouble in Cloud Storage. Cloud storage has a number of advantages over
traditional data storage. Users store their data on a cloud, you can get at it from any location that has internet
access and there are hundreds of different cloud storage systems available. However, in this cloud storage
process, they lose control over their data. For that reason, mainly give a review on security cloud storage in
which steganography and cryptography techniques have been used. Cryptography means keep the content of a
message secret and Steganography means keep the existence of a message secret or embedding the information
in a cover image. The novelty is that one can aggregate any set of secret keys and make them as compact as a
single key, but encompassing the power of all the keys being aggregated. The main role of steganography and
cryptography are both ways to protect the information from third parties and these methods provide secure and
reliable data storage through easy to use interfaces convenient for various users and application. Try to enhance
the security and robustness of the information against attacks.
Keywords: cloud storage, steganography, cryptography, drop box, aggregate key and data storage security.
1. INTRODUCTION
Cloud storage
www.iaetsd.in
35
ISBN: 978-15-08772460-24
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
challenging.
warehouse.
SECURITY CONTROL
computing
challenging
surges in workload.
unavoidably
poses
new
www.iaetsd.in
36
ISBN: 978-15-08772460-24
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
3. Authorization practices
Encryption: A complex algorithm is used to encode
Cloud security controls
create
practices:
a system.
Reliability
security.
attack is occurring.
the market.
Advantages
techniques:
name
and
password.
Authorization
1. Encryption
2. Authentication processes
www.iaetsd.in
37
ISBN: 978-15-08772460-24
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
data owner get there file location & key on mail and
the
data.
cryptosystem
or
www.iaetsd.in
38
ISBN: 978-15-08772460-24
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
Process
Kerckhoffs's principle.
block:
(plaintext).
Steganography
manipulation.
information
includes
within
steganography,
the
computer
electronic
concealment
files.
In
communications
of
digital
may
block
1.
2.
3.
B.STEGANOGRAPH
www.iaetsd.in
39
ISBN: 978-15-08772460-24
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
2.
3.
4.
5.
Performance Evaluation
7.
concept
of
steganography.
Our
experiment
is
is frequently used
for
www.iaetsd.in
40
ISBN: 978-15-08772460-24
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
introduction
significant
computation
and
of cloud computing.
VII. CONCLUION
Provider (CSP).
www.iaetsd.in
41
ISBN: 978-15-08772460-24
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
[5]
definition.pdf.
[6]
4.
steganographic
issues
are
employed
then
the
[9]
[10]
storage,
IEEE
Transactions
on
Parallel
and
Hunedoara
issue 1, January
[11]
MR-PDP:
[4] F. Guo,
International
Journal
of Engineering
Multiple-Replica
Provable
Data
www.iaetsd.in
42
ISBN: 978-15-08772460-24
Date: 8.3.2015
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
www.iaetsd.in
43