Cloud Data Protection Based On Crypto-Steganography Approach
Abstract
The benefits are numerous for organizations and people who work and learn using or through computers, some of these are scalability, affordability and availability of cloud computing services. However, one of the biggest issues still being faced in this area is that of security, especially concerning data privacy, thus limiting the use of such technologies. This paper seeks to address these concerns by developing a new approach to increasing protection of data in the cloud through development of Crypto-Steganography. The proposed method involves a two-tiered security mechanism: first, the presented data is protected with the use of advanced TWOFISH encipherment, which makes the data completely non-interpretated in case it gets to the hands of the unauthorized users. After that the encrypted data is then steganograghically inserted into a color image through least significant bit approach, where changes of the least significant bits of the image pixels will contain the encrypted data. Such double-layered approach does not only mask the presence of such sensitive information, but also ensures that even if there is an attempted invasion, such data can hardly be retrieved without the decryption passkey. The proposed approach of Crypto-Steganography is thoroughly tested through experiments and evaluation of distortion measures such as Weighted PSNR, UIQ; and C4 similarity measure. As seen in the results, the approach preserves low distortion and the wPSNR values are within the range of 45 – 50 dB, suggesting that the quality of the images is well preserved.
References
Abikoye, O. C., & Ogundokun, R. O. (2021). Efficiency of LSB steganography on medical information. International Journal of Electrical and Computer Engineering (IJECE), 11(5), 4157-4164. https://doi.org/10.11591/ijece.v11i5.pp4157-
Awotunde, J. B., Oladipo, I. D., AbdulRaheem, M., Balogun, G. B., & Tomori, A. R. (2022). An IoMT-based steganography model for securing medical information. International Journal of Healthcare Technology and Management, 19(3-4), 218-236. https://doi.org/10.1504/IJHTM.2022.128195
Dhawan, S., & Gupta, R. (2021). Analysis of various data security techniques of steganography: A survey. Information Security Journal: A Global Perspective, 30(2), 63-87. https://doi.org/10.1080/19393555.2020.1801911
Ferdous, J., Khan, M. F. N., Rezaul, K. M., Tamal, M. A., Aziz, M. A., & Miah, P. (2020). A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms. Int. J. Netw. Secur., 22(4), 638-644. Https://doi.org/10.6633/IJNS.202007
Fu, L., Gao, F., Wu, J., Li, R., Karkee, M., & Zhang, Q. (2020). Application of consumer RGB-D cameras for fruit detection and localization in field: A critical review. Computers and Electronics in Agriculture, 177, 105687. https://doi.org/10.1016/j.compag.2020.105687
Hachim E.A.W., Gaata, M.T. & Abbas, T. (2023). Voice-Authentication Model Based on Deep Learning for Cloud Environment. International Journal on Informatics Visualization, 7(3), pp. 864–870. http://dx.doi.org/10.30630/joiv.7.3.1303
Hachim, E. A. W. (2024). Cloud Data Protection Based On Crypto-Steganography Approach. Journal La Multiapp, 5(4), 324-331. https://doi.org/10.37899/journallamultiapp.v5i4.1337
Hachim, E. A. W., Gaata, M. T., & Abbas, T. (2022, July). Iris-based authentication model in cloud environment (iamce). In 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET) (pp. 1-6). IEEE. https://doi.org/10.1109/ICECET55527.2022.9873499
Hashim, M. M., Mahmood, A. A., & Mohammed, M. Q. (2021). A pixel contrast based medical image steganography to ensure and secure patient data. International Journal of Nonlinear Analysis and Applications, 12(Special Issue), 1885-1904. https://doi.org/10.22075/ijnaa.2021.5939
Hassaballah, M., Hameed, M. A., Awad, A. I., & Muhammad, K. (2021). A novel image steganography method for industrial internet of things security. IEEE Transactions on Industrial Informatics, 17(11), 7743-7751. https://doi.org/10.1109/TII.2021.3053595
Iftikhar, A., Qureshi, K. N., Shiraz, M., & Albahli, S. (2023). Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review. Journal of King Saud University-Computer and Information Sciences, 101788. https://doi.org/10.1016/j.jksuci.2023.101788
Jan, A., Parah, S. A., Hussan, M., & Malik, B. A. (2022). Double layer security using crypto-stego techniques: a comprehensive review. Health and Technology, 12(1), 9-31. https://doi.org/10.1007/s12553-021-00602-1
Kannadhasan, S., & Nagarajan, R. (2021). Secure framework data security using cryptography and steganography in internet of things. In Multidisciplinary approach to modern digital steganography (pp. 258-278). IGI Global. https://doi.org/10.4018/978-1-7998-7160-6.ch012
Liu, Z., Xu, B., Cheng, B., Hu, X., & Darbandi, M. (2022). Intrusion detection systems in the cloud computing: A comprehensive and deep literature review. Concurrency and Computation: Practice and Experience, 34(4), e6646. https://doi.org/10.1002/cpe.6646
Mawgoud, A. A., Taha, M. H. N., Abu-Talleb, A., & Kotb, A. (2022). A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system. Journal of Cloud Computing, 11(1), 97. https://doi.org/10.1186/s13677-022-00339-w
Mohamed, M. M., Ghoniemy, S., & Ghali, N. I. (2022). A Survey on Image Data Hiding Techniques. International Journal of Intelligent Computing and Information Sciences, 22(3), 14-38. https://doi.org/10.21608/ijicis.2022.130393.1174
Nabil, B., & Herráiz, J. J. M. (2024). A Robust Cloud Security Model Leveraging a Hybrid of Cryptography and Steganography. TechRxiv. https://doi.org/10.22541/au.171221467.72775845/v1
Patel, A., Shah, N., Ramoliya, D., & Nayak, A. (2020, November). A detailed review of cloud security: issues, threats & attacks. In 2020 4th International conference on electronics, communication and aerospace technology (ICECA) (pp. 758-764). IEEE. https://doi.org/10.1109/ICECA49313.2020.9297572
Poduval, V., Koul, A., Rebello, D., Bhat, K., & Wahul, R. M. (2020). Cloud based secure storage of files using hybrid cryptography and image steganography. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 665-667. https://doi.org/10.35940/ijrte.F7227.038620
Rahman, S., Uddin, J., Zakarya, M., Hussain, H., Khan, A. A., Ahmed, A., & Haleem, M. (2023). A comprehensive study of digital image steganographic techniques. IEEE Access, 11, 6770-6791. https://doi.org/10.1109/ACCESS.2023.3237393
Sahu, A. K., & Sahu, M. (2020). Digital image steganography and steganalysis: A journey of the past three decades. Open Computer Science, 10(1), 296-342. https://doi.org/10.1515/comp-2020-0136
Shekhawat, V. S., Tiwari, M., & Patel, M. (2020). A secured steganography algorithm for hiding an image and data in an image using LSB technique. In Computational Methods and Data Engineering: Proceedings of ICMDE 2020, Volume 2 (pp. 455-468). Singapore: Springer Singapore. https://doi.org/10.1007/978-981-15-7907-3_35
Stević, Ž., Pamučar, D., Puška, A., & Chatterjee, P. (2020). Sustainable supplier selection in healthcare industries using a new MCDM method: Measurement of alternatives and ranking according to COmpromise solution (MARCOS). Computers & industrial engineering, 140, 106231. https://doi.org/10.1016/j.cie.2019.106231
Sun, S., Ma, H., Song, Z., & Zhang, R. (2020). WebCloud: Web-based cloud storage for secure data sharing across platforms. IEEE Transactions on Dependable and Secure Computing, 19(3), 1871-1884. https://di.org/10.1109/TDSC.2020.3040784
Zhang, Y., Liu, B., Gong, Y., Huang, J., Xu, J., & Wan, W. (2024). Application of Machine Learning Optimization in Cloud Computing Resource Scheduling and Management. arXiv preprint arXiv:2402.17216. https://doi.org/10.48550/arXiv.2402.17216
Copyright (c) 2024 Journal La Multiapp
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.