Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)  
  Authors : Trijit Chatterjee; Mrinal Kanti Sarkar; Dr. V S Dhaka
  Cite as:

 

Cloud computing offers the on demand computational infrastructure to the users which has the potential to decrease the huge cost to build IT based services. It can provide ubiquitous, convenient data storage facility. It is a significant issue as the whole data stored to a set of interconnected resource pools which are situated over different location of the world. Stored data can be accessed through virtual machines by unauthorized users. There are different types of security and privacy challenges that are required to analyze and take care. To ensure privacy and security of data in cloud computing, we proposed a new data hiding technique called Steganographic Approach using Huffman Coding (SAHC) which ensures data security in cloud computing during data-atrest. Our objective is to prevent data access by unauthorized users from cloud storage. The main idea of this paper is to develop a steganographic technique to secure cloud data.

 

Published In : IJCSN Journal Volume 4, Issue 2

Date of Publication : April 2015

Pages : 198 - 207

Figures : 05

Tables : --

Publication Link : Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)

 

 

 

Trijit Chatterjee : received the B.Sc. degree in Computer Science (Hons.) from Calcutta University in 2010, M.Sc. degree in Computer Science from St. Xavier’s College Kolkata in 2012. Currenlty he is doing his M.Tech. from MCKV Institute of Technology, Howrah, and also working as Teaching Assistant in MCKV Institute of Technology, Howrah, India. His current research interest includes Security in Cloud Computing and Image Processing.

Mrinal Kanti Sarkar : received the B.Tech degree in Computer Science & Engineering from Govt. College of Engineering & Ceramic Technology in 2008, M.Tech degree in Computer Science & Engineering from Indian Institute of Technology, Kharagpur in 2010. Currenlty he is doing his PhD. from Jaipur National University Jaipur. He served as a Senior Lecturer in The ICFAI University Tripura from 2010 to 2012. Now, he is working as Assistant Professor in University of Engineering and Management, Jaipur, India. His current research interest includes Security in Cloud Computing, Distributed System and Information Security.

Dr. V.S. Dhaka : received his M.Tech. and Ph.D. in Computer Science from Dr. B.R. Ambedkar University, Agra, India. Currently he is working as a Professor in Department of Computer Science & Engineering, Jaipur National National University, Jaipur, India. He is is also Head, Dept. of Computer Science & Engineering, JNU Jaipur.He has 11 years of experience in the industry and academics. He has more than 32 publications in international journals. He always strives to achieve academic excellence. His current research interest includes Neural Network, Information Security, and Image Processing.

 

 

 

 

 

 

 

Cloud Computing

Data Storage Security

Huffman Coding

Steganography

The main aim of this paper is to present an overview of security challenges that are happening in cloud data storage and introduce a new combined encrypting and data hiding technique to prevent unauthorized data access in cloud data storage. We applied steganographic approach to ensure data storage security in cloud computing using Huffman Coding (SAHC). It is an efficient steganographic strategy for enhancing security of cloud data when it is at rest. Simply we stored the data into images stored in the cloud data storage. Unauthorized users can not rectify the original content of the data due to HVS. Through detailed security and performance analysis we show that our approach gives high security of data when it is on rest in the data center of any Cloud Service Provider (CSP).This proposed architecture will be able to provide customer satisfaction to a great level and it will attract more clients in the field of cloud computing for industrial as well as future research firms.

 

 

 

 

 

 

 

 

 

[1] Peter Mell, Timothy Grance, “The NIST Definatin of Cloud Computing”, Jan, 2011.http://docs. ismgcorp. com/files/external/Draft-SP-800-145_clouddefinition. pdf. [2] Amazon.com, “Amazon Web Services (AWS)”, Online at hppt://aws.amazon.com, 2008. [3] Con Wang, Qian Wang, Kui Ren, and Wenjng Lou, “Ensuring Data Storage Security in Cloud Computing”,17th International workshop on Quality of service, USA, pp1-9, 2009, IBSN:978-42443875-4. [4] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms, Third Edition, Prentice Hall of India, 2010. [5] B.P Rimal, Choi Eunmi,I.Lumb, “A Taxonomy and Survey of Cloud Computing Sytem”, Intl. Joint Conference on INC, IMS and IDC, 2009,pp.44-51, Seoul,Aug, 2009. DOI : 10.1109/NCM.2009.218. [6] M. K Sarkar and T. Chatterjee, “Enhancing Data Storage Security in Cloud Computing Through Steganography”, ACEEE International Journal on Network Security, ISSN: 2152-5064, Vol. 5, Issue. 1, pp: 13-19, Jan 2014. [7] H. Shacham and B. Waters, “Compact Proofs of Retrievability”, Proc. of Asiacrypt ’08, Dec. 2008. [8] A. Juels and J. Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files”, Proc. of CCS ’07, pp. 584–597, 2007. [9] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High- Availability and Integrity Layer for Cloud Storage”, Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/. [10] K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High- Availability and Integrity Layer for Cloud Storage”, Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/. [11] Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal, “A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security”, Annals of Faculty Engineering Hunedoara International Journal of Engineering (Archived copy), scheduled for publication in vol. 10, issue 1, January 2012. ISSN: 1584-2665. [12] Flavio Lombardi, Roberto Di Pietro, “Secure Virtualization for Cloud Computing ”, Journal of Network and Computer Application, vol. 34, issue 4, pp 1113-1122, July 2011, Academic Press td London, UK. [13] M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage Services Honest”, Proc. 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS ’07), pp. 1–6, 2007. [14] S. J. Schwarz and E. L. Miller, “Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage”, Proc. of ICDCS ’06, pp. 12–12, 2006. [15] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores”, Proc. ofCCS ’07, pp. 598–609, 2007. [16] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession”, Proc. of SecureComm ’08, pp. 1–10, 2008. [17] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MRPDP: Multiple-Replica Provable Data Possession”, Proc. of ICDCS ’08, pp. 411–420, 2008.