ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Enhancement of Security for Data Storage in Cloud

Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 4)

Publication Date:

Authors : ; ;

Page : 80-82

Keywords : cloud computing; data sharing; jar; logger; steganography;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing is the use of computing resources such as hardware and software that are delivered as a service over the internet. Since the user�s data are usually processed or stored remotely in unknown machines, user may not have full control over the data and it can be accessed by some third party. The data stored in the cloud should be decentralized in order to adapt to nature of cloud. In the existing system the jar file is used to hide the data which can be subjected to attack. To overcome the above problem the proposed system uses the Steganography method. In this method the data is hidden behind the image and the image is converted into a Jar file and stored in the Cloud, when the data access take place the reverse process is carried out to get the original data and the user is allowed to access the contents in the data. When the data is accessed by the user a separate logger is created to keep track of the user and it is periodically sent to the data owner.

Last modified: 2021-06-30 20:15:34