Cloud Data Protection Based On Crypto-Steganography Approach

  • Ethar Abdul Wahhab Hachim Department of Computer Science, College of Science, Mustansiriyah University Baghdad, Iraq
Keywords: Cloud computing, Steganography, Data Security, LSB Technique

Abstract

The benefits are numerous for organizations and people who work and learn using or through computers, some of these are scalability, affordability and availability of cloud computing services. However, one of the biggest issues still being faced in this area is that of security, especially concerning data privacy, thus limiting the use of such technologies. This paper seeks to address these concerns by developing a new approach to increasing protection of data in the cloud through development of Crypto-Steganography. The proposed method involves a two-tiered security mechanism: first, the presented data is protected with the use of advanced TWOFISH encipherment, which makes the data completely non-interpretated in case it gets to the hands of the unauthorized users. After that the encrypted data is then steganograghically inserted into a color image through least significant bit approach, where changes of the least significant bits of the image pixels will contain the encrypted data. Such double-layered approach does not only mask the presence of such sensitive information, but also ensures that even if there is an attempted invasion, such data can hardly be retrieved without the decryption passkey. The proposed approach of Crypto-Steganography is thoroughly tested through experiments and evaluation of distortion measures such as Weighted PSNR, UIQ; and C4 similarity measure. As seen in the results, the approach preserves low distortion and the wPSNR values are within the range of 45 – 50 dB, suggesting that the quality of the images is well preserved.

References

Abikoye, O. C., & Ogundokun, R. O. (2021). Efficiency of LSB steganography on medical information. International Journal of Electrical and Computer Engineering (IJECE), 11(5), 4157-4164. https://doi.org/10.11591/ijece.v11i5.pp4157-

Awotunde, J. B., Oladipo, I. D., AbdulRaheem, M., Balogun, G. B., & Tomori, A. R. (2022). An IoMT-based steganography model for securing medical information. International Journal of Healthcare Technology and Management, 19(3-4), 218-236. https://doi.org/10.1504/IJHTM.2022.128195

Dhawan, S., & Gupta, R. (2021). Analysis of various data security techniques of steganography: A survey. Information Security Journal: A Global Perspective, 30(2), 63-87. https://doi.org/10.1080/19393555.2020.1801911

Ferdous, J., Khan, M. F. N., Rezaul, K. M., Tamal, M. A., Aziz, M. A., & Miah, P. (2020). A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms. Int. J. Netw. Secur., 22(4), 638-644. Https://doi.org/10.6633/IJNS.202007

Fu, L., Gao, F., Wu, J., Li, R., Karkee, M., & Zhang, Q. (2020). Application of consumer RGB-D cameras for fruit detection and localization in field: A critical review. Computers and Electronics in Agriculture, 177, 105687. https://doi.org/10.1016/j.compag.2020.105687

Hachim E.A.W., Gaata, M.T. & Abbas, T. (2023). Voice-Authentication Model Based on Deep Learning for Cloud Environment. International Journal on Informatics Visualization, 7(3), pp. 864–870. http://dx.doi.org/10.30630/joiv.7.3.1303

Hachim, E. A. W. (2024). Cloud Data Protection Based On Crypto-Steganography Approach. Journal La Multiapp, 5(4), 324-331. https://doi.org/10.37899/journallamultiapp.v5i4.1337

Hachim, E. A. W., Gaata, M. T., & Abbas, T. (2022, July). Iris-based authentication model in cloud environment (iamce). In 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET) (pp. 1-6). IEEE. https://doi.org/10.1109/ICECET55527.2022.9873499

Hashim, M. M., Mahmood, A. A., & Mohammed, M. Q. (2021). A pixel contrast based medical image steganography to ensure and secure patient data. International Journal of Nonlinear Analysis and Applications, 12(Special Issue), 1885-1904. https://doi.org/10.22075/ijnaa.2021.5939

Hassaballah, M., Hameed, M. A., Awad, A. I., & Muhammad, K. (2021). A novel image steganography method for industrial internet of things security. IEEE Transactions on Industrial Informatics, 17(11), 7743-7751. https://doi.org/10.1109/TII.2021.3053595

Iftikhar, A., Qureshi, K. N., Shiraz, M., & Albahli, S. (2023). Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review. Journal of King Saud University-Computer and Information Sciences, 101788. https://doi.org/10.1016/j.jksuci.2023.101788

Jan, A., Parah, S. A., Hussan, M., & Malik, B. A. (2022). Double layer security using crypto-stego techniques: a comprehensive review. Health and Technology, 12(1), 9-31. https://doi.org/10.1007/s12553-021-00602-1

Kannadhasan, S., & Nagarajan, R. (2021). Secure framework data security using cryptography and steganography in internet of things. In Multidisciplinary approach to modern digital steganography (pp. 258-278). IGI Global. https://doi.org/10.4018/978-1-7998-7160-6.ch012

Liu, Z., Xu, B., Cheng, B., Hu, X., & Darbandi, M. (2022). Intrusion detection systems in the cloud computing: A comprehensive and deep literature review. Concurrency and Computation: Practice and Experience, 34(4), e6646. https://doi.org/10.1002/cpe.6646

Mawgoud, A. A., Taha, M. H. N., Abu-Talleb, A., & Kotb, A. (2022). A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system. Journal of Cloud Computing, 11(1), 97. https://doi.org/10.1186/s13677-022-00339-w

Mohamed, M. M., Ghoniemy, S., & Ghali, N. I. (2022). A Survey on Image Data Hiding Techniques. International Journal of Intelligent Computing and Information Sciences, 22(3), 14-38. https://doi.org/10.21608/ijicis.2022.130393.1174

Nabil, B., & Herráiz, J. J. M. (2024). A Robust Cloud Security Model Leveraging a Hybrid of Cryptography and Steganography. TechRxiv. https://doi.org/10.22541/au.171221467.72775845/v1

Patel, A., Shah, N., Ramoliya, D., & Nayak, A. (2020, November). A detailed review of cloud security: issues, threats & attacks. In 2020 4th International conference on electronics, communication and aerospace technology (ICECA) (pp. 758-764). IEEE. https://doi.org/10.1109/ICECA49313.2020.9297572

Poduval, V., Koul, A., Rebello, D., Bhat, K., & Wahul, R. M. (2020). Cloud based secure storage of files using hybrid cryptography and image steganography. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 665-667. https://doi.org/10.35940/ijrte.F7227.038620

Rahman, S., Uddin, J., Zakarya, M., Hussain, H., Khan, A. A., Ahmed, A., & Haleem, M. (2023). A comprehensive study of digital image steganographic techniques. IEEE Access, 11, 6770-6791. https://doi.org/10.1109/ACCESS.2023.3237393

Sahu, A. K., & Sahu, M. (2020). Digital image steganography and steganalysis: A journey of the past three decades. Open Computer Science, 10(1), 296-342. https://doi.org/10.1515/comp-2020-0136

Shekhawat, V. S., Tiwari, M., & Patel, M. (2020). A secured steganography algorithm for hiding an image and data in an image using LSB technique. In Computational Methods and Data Engineering: Proceedings of ICMDE 2020, Volume 2 (pp. 455-468). Singapore: Springer Singapore. https://doi.org/10.1007/978-981-15-7907-3_35

Stević, Ž., Pamučar, D., Puška, A., & Chatterjee, P. (2020). Sustainable supplier selection in healthcare industries using a new MCDM method: Measurement of alternatives and ranking according to COmpromise solution (MARCOS). Computers & industrial engineering, 140, 106231. https://doi.org/10.1016/j.cie.2019.106231

Sun, S., Ma, H., Song, Z., & Zhang, R. (2020). WebCloud: Web-based cloud storage for secure data sharing across platforms. IEEE Transactions on Dependable and Secure Computing, 19(3), 1871-1884. https://di.org/10.1109/TDSC.2020.3040784

Zhang, Y., Liu, B., Gong, Y., Huang, J., Xu, J., & Wan, W. (2024). Application of Machine Learning Optimization in Cloud Computing Resource Scheduling and Management. arXiv preprint arXiv:2402.17216. https://doi.org/10.48550/arXiv.2402.17216

Published
2024-08-05
How to Cite
Abdul Wahhab Hachim, E. (2024). Cloud Data Protection Based On Crypto-Steganography Approach. Journal La Multiapp, 5(4), 336-345. https://doi.org/10.37899/journallamultiapp.v5i4.1337