Open Access Open Access  Restricted Access Subscription Access

Securing Data in Cloud Storage by using Steganography and Merkle Hash Tree Algorithm


Affiliations
1 School of Computing, SASTRA University, Thanjavur, Tamilnadu, India
 

Objectives: Cloud computing is incomprehensible creating innovation, the testing issue is the way to successfully share encoded information in cloud computing. Cloud server randomly produces primary, secondary and access keys, after record is made in the server for specific information proprietor. Methods: Data proprietor encodes the record and conceal the data into a picture called steganography. Picture is split and is stored in cloud. Cloud server creates shared key utilizing the primary and secondary keys of data user and data owner in order to avoid unauthorized sharing of data. Data proprietor can share the information to different users by sending mutual key to users by means of e-mail safely. Mutual key is likewise covered into a picture for securing that key. Original information is downloaded strictly to check the mutual key. Findings: The exchange of secret data to the authorized user effectively promotes data confidentiality and integrity. By giving mutual key to the cloud server, the user can see the document. Applications: The method can be applied to share confidential data stored in cloud with small cipher text expansion.

Keywords

Cloud Computing, Data Security, Image Splitting, Key Generation, Steganography.
User

Abstract Views: 179

PDF Views: 0




  • Securing Data in Cloud Storage by using Steganography and Merkle Hash Tree Algorithm

Abstract Views: 179  |  PDF Views: 0

Authors

K. Sasireka
School of Computing, SASTRA University, Thanjavur, Tamilnadu, India
P. Shanthi
School of Computing, SASTRA University, Thanjavur, Tamilnadu, India
A. Umamakeswari
School of Computing, SASTRA University, Thanjavur, Tamilnadu, India

Abstract


Objectives: Cloud computing is incomprehensible creating innovation, the testing issue is the way to successfully share encoded information in cloud computing. Cloud server randomly produces primary, secondary and access keys, after record is made in the server for specific information proprietor. Methods: Data proprietor encodes the record and conceal the data into a picture called steganography. Picture is split and is stored in cloud. Cloud server creates shared key utilizing the primary and secondary keys of data user and data owner in order to avoid unauthorized sharing of data. Data proprietor can share the information to different users by sending mutual key to users by means of e-mail safely. Mutual key is likewise covered into a picture for securing that key. Original information is downloaded strictly to check the mutual key. Findings: The exchange of secret data to the authorized user effectively promotes data confidentiality and integrity. By giving mutual key to the cloud server, the user can see the document. Applications: The method can be applied to share confidential data stored in cloud with small cipher text expansion.

Keywords


Cloud Computing, Data Security, Image Splitting, Key Generation, Steganography.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F140015