The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Cloud computing is incomprehensible creating innovation, the testing issue is the way to successfully share encoded information in cloud computing. Cloud server randomly produces primary, secondary and access keys, after record is made in the server for specific information proprietor. Methods: Data proprietor encodes the record and conceal the data into a picture called steganography. Picture is split and is stored in cloud. Cloud server creates shared key utilizing the primary and secondary keys of data user and data owner in order to avoid unauthorized sharing of data. Data proprietor can share the information to different users by sending mutual key to users by means of e-mail safely. Mutual key is likewise covered into a picture for securing that key. Original information is downloaded strictly to check the mutual key. Findings: The exchange of secret data to the authorized user effectively promotes data confidentiality and integrity. By giving mutual key to the cloud server, the user can see the document. Applications: The method can be applied to share confidential data stored in cloud with small cipher text expansion.

Keywords

Cloud Computing, Data Security, Image Splitting, Key Generation, Steganography.
User