Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms
Keywords:
Cloud Computing, Data Security, Encryption, RC6 Encryption, SteganographyAbstract
Cloud computing is one of the emerging technologies. The cloud environment is a large open distributed system. Cloud Computing provides various services to the customers with price as pay for use such services are Infrastructure as a service (IaaS), Platform as a service (PaaS), software as a service (SaaS) and Data base as service (DaaS) like so many services. And all these services provide various benefits to its customers, but there are still some challengs. One among them is to protect the data, as well as, privacy of users. The data saved at remote servers is under the control and oservation of unknown people who can do anything with our data, thus there are some Security risks. So, these data security risks are causing a hindrance in the development of the field of cloud computing. This paper has designed a scheme that can help, solve this Security issue. This paper proposes an improved way in guaranting information security by utilizing RC6 algorithm and Steganography algorithms.
References
P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599 – 616, 2009.
C. Cachin, I. Keidar, and A. Shraer, “Trusting the cloud,” SIGACT News, vol. 40, no. 2, pp. 81–86, 2009.
Diogo A. B. Fernandes, Liliana F. B. Soares, Joo V.Gomes, Mrio M. Freire, Pedro R. M. Incio, Security issues in cloud environments: a survey, International Journal of Information Security, doi:10.1007/s10207-013-208-7 (2013) 1 - 58.
V. J. Winkler, “Securing the Cloud,” Cloud Comput.Secur. Tech. tactics. Elsevier., 2011.
F. Zhang and H. Chen, “Security-Preserving Live Migration of Virtual Machines in the Cloud,” J. Netw.Syst. Manag., pp. 562–587, 2012.
Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.
L. Rodero-Merino, L. M. Vaquero, E. Caron, A. Muresan, and F. Desprez, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, pp. 96–108, 2012.
A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, “Security risks and their management in cloud computing,” 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012.
T. Mather, S. Kumaraswamy, and S. Latif, “Cloud Security and Privacy,” p. 299, 2009.
“A Steganography algorithm for hiding secret message inside image using random key” International Journal of Engineering Research & Technology (IJERT) ,ISSN: 2278-0181,Vol. 3 Issue 12, December-2014
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.