This paper is published in Volume-2, Issue-6, 2016
Area
Cloud Computing
Author
Ataussamad, Dr. Shiva Prakash
Org/Univ
Madan Mohan Malaviya University of Technology, Gorakhpur, UP, India
Keywords
Steganography, Security, CSP, Cryptography, Iaas, Paas, Saas.
Citations
IEEE
Ataussamad, Dr. Shiva Prakash. A Review in Cloud Computing Security using Steganography, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Ataussamad, Dr. Shiva Prakash (2016). A Review in Cloud Computing Security using Steganography. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.IJARIIT.com.
MLA
Ataussamad, Dr. Shiva Prakash. "A Review in Cloud Computing Security using Steganography." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.IJARIIT.com.
Ataussamad, Dr. Shiva Prakash. A Review in Cloud Computing Security using Steganography, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Ataussamad, Dr. Shiva Prakash (2016). A Review in Cloud Computing Security using Steganography. International Journal of Advance Research, Ideas and Innovations in Technology, 2(6) www.IJARIIT.com.
MLA
Ataussamad, Dr. Shiva Prakash. "A Review in Cloud Computing Security using Steganography." International Journal of Advance Research, Ideas and Innovations in Technology 2.6 (2016). www.IJARIIT.com.
Abstract
Cloud Computing is a flexible, cost-efficient, and authentic platform for providing business or consumer IT enabled services on the Internet. However, Cloud computing represents an added level of risk factors because important and essential services are often outsourced to a third party connected to cloud network, which makes it even harder to maintain the level of data security. Steganography is the technique of hiding or encapsulating information in digital media in order to prevent the existence of information. The digital media with hidden information within are called stego media and the data without hidden information are called cover media. Steganography can be used for hiding both the legal as well as illegal information. For example, civilians can use it for maintaining privacy while the government may use it for the security reasons of the country. In this paper we have discussed about the various techniques by which we can enhance the cloud service in relation to security and data privacy.