Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms

Authors

  • Sirisha Aguru Dept. of CSE, Sri Vasavi Engineering College, JNT UK, Kakinada, India
  • Batteri Madhava Rao Dept. of CSE, Sri Vasavi Engineering College, JNT UK, Kakinada, India

Keywords:

Cloud Computing, Data Security, Encryption, RC6 Encryption, Steganography

Abstract

Cloud computing is one of the emerging technologies. The cloud environment is a large open distributed system. Cloud Computing provides various services to the customers with price as pay for use such services are Infrastructure as a service (IaaS), Platform as a service (PaaS), software as a service (SaaS) and Data base as service (DaaS) like so many services. And all these services provide various benefits to its customers, but there are still some challengs. One among them is to protect the data, as well as, privacy of users. The data saved at remote servers is under the control and oservation of unknown people who can do anything with our data, thus there are some Security risks. So, these data security risks are causing a hindrance in the development of the field of cloud computing. This paper has designed a scheme that can help, solve this Security issue. This paper proposes an improved way in guaranting information security by utilizing RC6 algorithm and Steganography algorithms.

 

References

P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.

R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599 – 616, 2009.

C. Cachin, I. Keidar, and A. Shraer, “Trusting the cloud,” SIGACT News, vol. 40, no. 2, pp. 81–86, 2009.

Diogo A. B. Fernandes, Liliana F. B. Soares, Joo V.Gomes, Mrio M. Freire, Pedro R. M. Incio, Security issues in cloud environments: a survey, International Journal of Information Security, doi:10.1007/s10207-013-208-7 (2013) 1 - 58.

V. J. Winkler, “Securing the Cloud,” Cloud Comput.Secur. Tech. tactics. Elsevier., 2011.

F. Zhang and H. Chen, “Security-Preserving Live Migration of Virtual Machines in the Cloud,” J. Netw.Syst. Manag., pp. 562–587, 2012.

Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.

L. Rodero-Merino, L. M. Vaquero, E. Caron, A. Muresan, and F. Desprez, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, pp. 96–108, 2012.

A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, “Security risks and their management in cloud computing,” 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012.

T. Mather, S. Kumaraswamy, and S. Latif, “Cloud Security and Privacy,” p. 299, 2009.

“A Steganography algorithm for hiding secret message inside image using random key” International Journal of Engineering Research & Technology (IJERT) ,ISSN: 2278-0181,Vol. 3 Issue 12, December-2014

Downloads

Published

2019-02-28

How to Cite

[1]
S. Aguru and B. M. Rao, “Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 7, no. 1, pp. 6–9, Feb. 2019.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.