TITLE:
Enhancing Mobile Cloud Computing Security Using Steganography
AUTHORS:
Hassan Reza, Madhuri Sonawane
KEYWORDS:
Cloud Computing, Mobile Computing, Software Security, Software Privacy, Data Hiding, Steganography, Encryption
JOURNAL NAME:
Journal of Information Security,
Vol.7 No.4,
July
19,
2016
ABSTRACT: Cloud computing is an emerging and popular method of accessing shared and
dynamically configurable resources via the computer network on demand. Cloud
computing is excessively used by mobile applications to offload data over the
network to the cloud. There are some security and privacy concerns using both
mobile devices to offload data to the facilities provided by the cloud
providers. One of the critical threats facing cloud users is the unauthorized
access by the insiders (cloud administrators) or the justification of location
where the cloud providers operating. Although, there exist variety of security
mechanisms to prevent unauthorized access by unauthorized user by the cloud
administration, but there is no security provision to prevent unauthorized access
by the cloud administrators to the client data on the cloud computing. In this
paper, we demonstrate how steganography, which is a secrecy method to hide
information, can be used to enhance the security and privacy of data (images)
maintained on the cloud by mobile applications. Our proposed model works with a
key, which is embedded in the image along with the data, to provide an
additional layer of security, namely, confidentiality of data. The practicality
of the proposed method is represented via a simple case study.