ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)

Publication Date:

Authors : ; ;

Page : 1944-1949

Keywords : Cloud Computing; Cloud Services; Data-centers; Encryption; Hybrid Cloud; Steganography; Third Party Auditor TPA;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is one among the most recent growing area in the field of IT industry also called on-demand computing. The growth in field of cloud computing can increase threat security aspects. So security has remained a relentless concern for day today usage of internet, networking and cloud computing is affected. However the general public communication channels are liable to security attacks that may cause unauthorized access to some info. Encryption has been accustomed persist and forestall these attacks. However once the data is decrypted it'll be exposed to the attackers once more and it'll not have any security protection. Steganography is that the science of embedding the secret information among different medium files (text, audio, image, and video) during a method that hides the existence of the secret message at all. This paper provides the details of Cloud computing and steganography presents with a quick review of cloud services, trust, privacy, security and also projected numerous steganography techniques recently introduced by various researchers around the globe. The main motive of concerning this paper is to make more secured your cloud data and also introduce the technique to make it better approach. So that user has full trust on cloud data. Hence, it provides responsibleness, measurability, high performance and relatively low value feasible solution as compared to devoted infrastructures.

Last modified: 2021-07-01 14:26:37