A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)Publication Date: 2015-11-05
Authors : Alok Ranjan; Mansi Bhonsle;
Page : 1944-1949
Keywords : Cloud Computing; Cloud Services; Data-centers; Encryption; Hybrid Cloud; Steganography; Third Party Auditor TPA;
Abstract
Cloud computing is one among the most recent growing area in the field of IT industry also called on-demand computing. The growth in field of cloud computing can increase threat security aspects. So security has remained a relentless concern for day today usage of internet, networking and cloud computing is affected. However the general public communication channels are liable to security attacks that may cause unauthorized access to some info. Encryption has been accustomed persist and forestall these attacks. However once the data is decrypted it'll be exposed to the attackers once more and it'll not have any security protection. Steganography is that the science of embedding the secret information among different medium files (text, audio, image, and video) during a method that hides the existence of the secret message at all. This paper provides the details of Cloud computing and steganography presents with a quick review of cloud services, trust, privacy, security and also projected numerous steganography techniques recently introduced by various researchers around the globe. The main motive of concerning this paper is to make more secured your cloud data and also introduce the technique to make it better approach. So that user has full trust on cloud data. Hence, it provides responsibleness, measurability, high performance and relatively low value feasible solution as compared to devoted infrastructures.
Other Latest Articles
- Interaction Effect of Brain Hemispheric Dominance and Home Environment on Academic Achievement in Mathematics
- Cyst's of the Jaw ? A Retrospective Study of Five Years
- Integration of Geographic Information Systems (GIS) and Spatial Data Mining Techniques in Fight against Boko Haram Terrorist in Nigeria
- School Banking: A New Idea of Banking Operation in Bangladesh
- Refractory Epistaxis: Role of Endoscopic Cauterisation of Sphenopalatine Artery
Last modified: 2021-07-01 14:26:37