Cloud computing offers the on demand
computational infrastructure to the users which has the potential
to decrease the huge cost to build IT based services. It can
provide ubiquitous, convenient data storage facility. It is a
significant issue as the whole data stored to a set of
interconnected resource pools which are situated over different
location of the world. Stored data can be accessed through
virtual machines by unauthorized users. There are different
types of security and privacy challenges that are required to
analyze and take care. To ensure privacy and security of data in
cloud computing, we proposed a new data hiding technique
called Steganographic Approach using Huffman Coding (SAHC)
which ensures data security in cloud computing during data-atrest.
Our objective is to prevent data access by unauthorized
users from cloud storage. The main idea of this paper is to
develop a steganographic technique to secure cloud data.
Trijit Chatterjee : received the B.Sc.
degree in Computer Science (Hons.)
from Calcutta University in 2010,
M.Sc. degree in Computer Science
from St. Xavier’s College Kolkata in
2012. Currenlty he is doing his
M.Tech. from MCKV Institute of
Technology, Howrah, and also
working as Teaching Assistant in
MCKV Institute of Technology,
Howrah, India. His current research
interest includes Security in Cloud
Computing and Image Processing.
Mrinal Kanti Sarkar : received the
B.Tech degree in Computer
Science & Engineering from Govt.
College of Engineering & Ceramic
Technology in 2008, M.Tech
degree in Computer Science &
Engineering from Indian Institute of
Technology, Kharagpur in 2010.
Currenlty he is doing his PhD. from
Jaipur National University Jaipur.
He served as a Senior Lecturer in
The ICFAI University Tripura from
2010 to 2012. Now, he is working
as Assistant Professor in University of Engineering and
Management, Jaipur, India. His current research interest
includes Security in Cloud Computing, Distributed System and
Information Security.
Dr. V.S. Dhaka : received his
M.Tech. and Ph.D. in Computer
Science from Dr. B.R. Ambedkar
University, Agra, India. Currently he
is working as a Professor in
Department of Computer Science &
Engineering, Jaipur National
National University, Jaipur, India.
He is is also Head, Dept. of
Computer Science & Engineering,
JNU Jaipur.He has 11 years of
experience in the industry and
academics. He has more than 32
publications in international journals. He always strives to
achieve academic excellence. His current research interest
includes Neural Network, Information Security, and Image
Processing.
Cloud Computing
Data Storage Security
Huffman Coding
Steganography
The main aim of this paper is to present an overview of
security challenges that are happening in cloud data
storage and introduce a new combined encrypting and
data hiding technique to prevent unauthorized data access
in cloud data storage. We applied steganographic
approach to ensure data storage security in cloud
computing using Huffman Coding (SAHC). It is an
efficient steganographic strategy for enhancing security of
cloud data when it is at rest. Simply we stored the data
into images stored in the cloud data storage. Unauthorized
users can not rectify the original content of the data due to
HVS. Through detailed security and performance analysis
we show that our approach gives high security of data
when it is on rest in the data center of any Cloud Service
Provider (CSP).This proposed architecture will be able to
provide customer satisfaction to a great level and it will
attract more clients in the field of cloud computing for
industrial as well as future research firms.
[1] Peter Mell, Timothy Grance, “The NIST Definatin of
Cloud Computing”, Jan, 2011.http://docs. ismgcorp.
com/files/external/Draft-SP-800-145_clouddefinition.
pdf.
[2] Amazon.com, “Amazon Web Services (AWS)”, Online
at hppt://aws.amazon.com, 2008.
[3] Con Wang, Qian Wang, Kui Ren, and Wenjng Lou,
“Ensuring Data Storage Security in Cloud
Computing”,17th International workshop on Quality of
service, USA, pp1-9, 2009, IBSN:978-42443875-4.
[4] Thomas H. Cormen, Charles E. Leiserson, Ronald L.
Rivest, and Clifford Stein. Introduction to Algorithms,
Third Edition, Prentice Hall of India, 2010.
[5] B.P Rimal, Choi Eunmi,I.Lumb, “A Taxonomy and
Survey of Cloud Computing Sytem”, Intl. Joint
Conference on INC, IMS and IDC, 2009,pp.44-51,
Seoul,Aug, 2009. DOI : 10.1109/NCM.2009.218.
[6] M. K Sarkar and T. Chatterjee, “Enhancing Data Storage
Security in Cloud Computing Through Steganography”,
ACEEE International Journal on Network Security,
ISSN: 2152-5064, Vol. 5, Issue. 1, pp: 13-19, Jan 2014.
[7] H. Shacham and B. Waters, “Compact Proofs of
Retrievability”, Proc. of Asiacrypt ’08, Dec. 2008.
[8] A. Juels and J. Burton S. Kaliski, “PORs: Proofs of
Retrievability for Large Files”, Proc. of CCS ’07, pp.
584–597, 2007.
[9] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-
Availability and Integrity Layer for Cloud Storage”,
Cryptology ePrint Archive, Report 2008/489, 2008,
http://eprint.iacr.org/.
[10] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-
Availability and Integrity Layer for Cloud Storage”,
Cryptology ePrint Archive, Report 2008/489, 2008,
http://eprint.iacr.org/.
[11] Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata
Sanyal, “A New Trusted and Collaborative Agent Based
Approach for Ensuring Cloud Security”, Annals of
Faculty Engineering Hunedoara International Journal of
Engineering (Archived copy), scheduled for publication
in vol. 10, issue 1, January 2012. ISSN: 1584-2665.
[12] Flavio Lombardi, Roberto Di Pietro, “Secure
Virtualization for Cloud Computing ”, Journal of
Network and Computer Application, vol. 34, issue 4, pp
1113-1122, July 2011, Academic Press td London, UK.
[13] M. A. Shah, M. Baker, J. C. Mogul, and R.
Swaminathan, “Auditing to Keep Online Storage
Services Honest”, Proc. 11th USENIX Workshop on Hot
Topics in Operating Systems (HOTOS ’07), pp. 1–6,
2007.
[14] S. J. Schwarz and E. L. Miller, “Store, Forget, and
Check: Using Algebraic Signatures to Check Remotely
Administered Storage”, Proc. of ICDCS ’06, pp. 12–12,
2006.
[15] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, “Provable Data
Possession at Untrusted Stores”, Proc. ofCCS ’07, pp.
598–609, 2007.
[16] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik,
“Scalable and Efficient Provable Data Possession”, Proc.
of SecureComm ’08, pp. 1–10, 2008.
[17] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MRPDP:
Multiple-Replica Provable Data Possession”, Proc.
of ICDCS ’08, pp. 411–420, 2008.