Journal of Information Security

Volume 7, Issue 4 (July 2016)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.25  Citations  

Enhancing Mobile Cloud Computing Security Using Steganography

HTML  XML Download Download as PDF (Size: 1396KB)  PP. 245-259  
DOI: 10.4236/jis.2016.74020    3,685 Downloads   6,759 Views  Citations

ABSTRACT

Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized user by the cloud administration, but there is no security provision to prevent unauthorized access by the cloud administrators to the client data on the cloud computing. In this paper, we demonstrate how steganography, which is a secrecy method to hide information, can be used to enhance the security and privacy of data (images) maintained on the cloud by mobile applications. Our proposed model works with a key, which is embedded in the image along with the data, to provide an additional layer of security, namely, confidentiality of data. The practicality of the proposed method is represented via a simple case study.

Share and Cite:

Reza, H. and Sonawane, M. (2016) Enhancing Mobile Cloud Computing Security Using Steganography. Journal of Information Security, 7, 245-259. doi: 10.4236/jis.2016.74020.

Cited by

[1] Impact of various image formats supported by android smartphones on image steganography: a preliminary study
Multimedia Tools and Applications, 2024
[2] PIRAP: Chaotic fuzzy encryption (CFE) technique and greedy chemical reaction optimization (GCRO) algorithm-based secured mobi-cloud framework
International Journal …, 2023
[3] A dynamic four-step data security model for data in cloud computing based on cryptography and steganography
Sensors, 2022
[4] Enhancing Data Security for Sharing Personalized Data in Mobile Cloud Environments
… Technologies for Big Data and Cloud …, 2022
[5] Android based Digital Steganography Application using LSB and PSNR Algorithm in Mobile Environment
2021
[6] Enhancing the Security of Mobile Cloud Computing using Audio Steganography with Least Significant Bit Insertion
International Journal of Engineering Research & Technology, 2021
[7] E-university cloud information security issues
2020
[8] Steganographic approach to enhance the data security in public cloud
2020
[9] Application of Steganography Technique in Cloud Computing
2019
[10] Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
2019
[11] Research on cloud computing-based power security management software
2019
[12] Enhancing Cloud Computing Security using Cryptography & Steganography
2019
[13] Enhancing Cloud Computing Security using Cryptography & Steganography.
Iraqi Journal of Information Technology, 2019
[14] Security and Compliance Management in Cloud Computing
2018
[15] A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud
2018
[16] Mobile Cloud Computing Security Frameworks: A Review
Cloud Computing Technologies for Green Enterprises, 2018
[17] Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challenges
International Research Journal of Engineering and Technology, 2017
[18] Secret digital images over cloud computing using meaningful secret sharing technique
2017
[19] An Enhanced Data Integrity Model In Mobile Cloud Environment Using Digital Signature Algorithm And Robust Reversible Watermarking
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, 2017
[20] Enhancing image security and privacy in cloud system using steganography
2017

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.