Enhancing Multi-Level Security for Data Sharing in Cloud Computing through Cryptography and Steganography

Authors

  • Syeda Tamrakar

Keywords:

Cloud Security, Cryptography, Steganography, Data Sharing

Abstract

Cloud computing has become the backbone of modern digital infrastructure, enabling organizations and individuals to store, access, and share vast amounts of data efficiently. However, the shift of sensitive information to remote servers has raised critical concerns regarding confidentiality, integrity, and privacy. Traditional security measures, while effective to some extent, often fall short in addressing sophisticated threats such as insider attacks, side-channel exploits, and advanced persistent threats. This study proposes a multi-level security framework that integrates cryptography and steganography to enhance data sharing in cloud environments. Cryptography provides mathematical protection by encrypting sensitive information, ensuring that only authorized users with proper keys can access the data. Steganography complements this by embedding the encrypted data within digital carrier files, such as images or audio, thereby concealing its very existence. The dual-layered approach strengthens cloud security by protecting both the content and its visibility, significantly reducing the likelihood of detection and interception. Furthermore, integrity checks and authentication mechanisms such as hashing and digital signatures are incorporated to safeguard against tampering and impersonation. The proposed model is adaptable across different cloud deployment models and particularly relevant for domains like healthcare, finance, and government, where secure data sharing is paramount. This research contributes to advancing hybrid security solutions, balancing robustness with practicality in cloud computing.

References

Armbrust, M., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.

Gentry, C. (2009). A fully homomorphic encryption scheme. Stanford University.

Hemalatha, S., et al. (2013). “Enhanced data security using cryptography and steganography.” International Journal of Computer Applications, 68(16), 1–6.

Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26–34.

Kaur, A., & Juneja, M. (2014). “Improved image steganography using discrete wavelet transform.” International Journal of Computer Applications, 96(19), 36–42.

Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2012). “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.” IEEE Transactions on Parallel and Distributed Systems, 24(1), 131–143.

Mazumdar, A., & Banerjee, P. (2015). “Hybrid steganography-cryptography techniques for secure data transmission.” Procedia Computer Science, 45, 404–411.

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. NIST Special Publication 800-145.

Popa, R. A., et al. (2011). “CryptDB: Protecting confidentiality with encrypted query processing.” SOSP ’11 Proceedings, 85–100.

Provos, N., & Honeyman, P. (2003). “Hide and seek: An introduction to steganography.” IEEE Security & Privacy Magazine, 1(3), 32–44.

Ristenpart, T., et al. (2009). “Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds.” ACM CCS, 199–212.

Subashini, S., & Kavitha, V. (2011). “A survey on security issues in service delivery models of cloud computing.” Journal of Network and Computer Applications, 34(1), 1–11.

Wang, C., Wang, Q., Ren, K., & Lou, W. (2012). “Privacy-preserving public auditing for secure cloud storage.” IEEE Transactions on Computers, 62(2), 362–375.

Downloads

How to Cite

Syeda Tamrakar. (2018). Enhancing Multi-Level Security for Data Sharing in Cloud Computing through Cryptography and Steganography. International Journal of Engineering, Science and Humanities, 8(4), 09–18. Retrieved from https://www.ijesh.com/j/article/view/243

Similar Articles

<< < 1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.