透過您的圖書館登入
IP:18.222.119.148
  • 期刊

Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing

摘要


Cloud computing allows users to store their data remotely. Users can enjoy cloud applications on-demand without the burden of maintaining personal hardware and managing software. Although its advantages are clear, cloud storage requires users to relinquish physical possession of data, and thus, it poses security risks with regard to the correctness of data. In this paper, we propose a new cloud scheme to enhance data security, thereby addressing the aforementioned issue whilst achieving a secure cloud storage service and dependability. A secret image is encrypted by using the Advanced Encryption Standard (AES) algorithm. Then, the encrypted image is embedded into the host image via a steganography technique, which combines Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) to obtain the stego image. To preserve data integrity, a hash value is generated for the stego image using the Secure Hash Algorithm 2 (SHA-2) prior to storing the image in the cloud. After the image is retrieved from the cloud, its hash value is generated using the same algorithm (i.e. SHA-2). Both hash values are then compared to verify whether the data stored in the cloud are changing and to obtain the secret image. The proposed scheme is proven to be secure and highly efficient through an extensive security and performance analysis.

延伸閱讀