| Literature DB >> 35161853 |
Rose Adee1, Haralambos Mouratidis1,2.
Abstract
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data manipulation, and data theft. To identify the problem and determine its core cause, we studied various literature on existing cloud computing security models. This study utilizes design science research methodology. The design science research approach includes problem identification, requirements elicitation, artifact design and development, demonstration, and assessment. Design thinking and the Python programming language are used to build the artifact, and discussion about its working is represented using histograms, tables, and algorithms. This paper's output is a four-step data security model based on Rivest-Shamir-Adleman, Advanced Encryption Standard, and identity-based encryption algorithms alongside Least Significant Bit steganography. The four steps are data protection and security through encryption algorithms, steganography, data backup and recovery, and data sharing. This proposed approach ensures more cloud data redundancy, flexibility, efficiency, and security by protecting data confidentiality, privacy, and integrity from attackers.Entities:
Keywords: cloud computing; cryptography; cybersecurity; data; privacy; security model; steganography
Year: 2022 PMID: 35161853 PMCID: PMC8839104 DOI: 10.3390/s22031109
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Showing the Design Science Research Converse.
To improve data security through encryption and decryption. To add an extra layer of security by applying steganography. To provide data backups. To enable data recovery in the cloud. To facilitate secure data sharing. Be simple/easy to use.Be simple/easy to use. Be ethical. Be effective. Be reliable. Be scalable. | ||
The table below summarizes the security models reviewed in the document review process.
| Security Model | Cryptographic Algorithms | Steganography | Backup and Recovery | Data Share | References |
|---|---|---|---|---|---|
| The private cloud for software as a service (SaaS) | AES | LSB video technique of steganography | No mention of data backups and recovery | Deliver services to end users in a pay-as-you-go manner | [ |
| Image-Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients | No clear mention of cryptographic algorithms | LSB Image steganography using pseudo-random sequence function with 2D-DCT | No mention of data backups and recovery | Provide services in a pay-as-you-go manner | [ |
| The hybrid encryption in Bluetooth innovation and in cloud computing | AES, FHE | Steganography not applied | Maintain data redundancy and security | Bluetooth | [ |
| Data security in cloud computing using Elliptic Curve Cryptography | ECC | Steganography not applied | No mention of backups and recovery | Data share not specified | [ |
| Visually Imperceptible Hybrid Crypto Steganography (VIHCS) model | AES, RSA | 2D-Discrete Wavelet Transform (2D-DWT-2L) AGA-OPAP with LSB | No clear mention of backups and recovery | Combined cryptosystems with Steganography for data transmission | [ |
| RGB shuffling method using combined steganography and cryptography | RGB shuffling algorithm and Message Digest 5 (MD5) algorithm | LSB image, video, or audio technique of steganography | Mention of image recovery in one of the phases | No specific mention of data sharing using the model | [ |
Figure 1A description of how AES and RSA work in the first step.
Figure 2A description of how the LSB steganography works in the security model.
Figure 3A description of the data backup step of the security model.
Figure 4A description of the four steps of the security model.
The table shows the response time in seconds.
| Response Time in Seconds | |||||||
|---|---|---|---|---|---|---|---|
| Cover image | Size | LSB Encryption | LSB decryption | Total LSB time | |||
| 1 | 1.2 MB | 6.618632 | 0.681449 | 7.300081 | |||
| 2 | 2.9 MB | 12.194479 | 1.134509 | 13.328988 | |||
| 3 | 7.2 MB | 31.071637 | 2.842029 | 33.913666 | |||
|
| |||||||
| AES Encryption time | AES decryption time | Total AES time | RSA Encryption time | RSA decryption time | Total RSA time | Total time | |
| 0.011895 | 0.002815 | 0.121765 | 0.502411 | 0.684402 | 1.186813 | 1.308578 | |
The table below shows the cover images, stego images, and the histograms.
| Cover1 image | Histogram of cover1 image |
|
|
|
| Stego1 image | Histogram of Stego1 image |
|
|
|
| Cover2 image | Histogram of cover2 image |
|
|
|
| Stego2 image | Histogram of Stego2 image |
|
|
|
| Cover3 image | Histogram of cover3 image |
|
|
|
| Stego3 image | Histogram of stego3 image |
|
|
|