Cloud based Secure Storage of Files using Hybrid Cryptography and Image Steganography
Vinay Poduval1, Ashish Koul2, Daniel Rebello3, Karunesh Bhat4, Revati M. Wahul5
1Vinay Poduval, Pursuing Bachelor’s Degree, Computer Science, MES College of Engineering, Pune University.
2Ashish Koul, Pursuing Bachelor’s Degree in Computer Science, MES College of Engineering, Pune University.
3Daniel Rebello, Pursuing Bachelor of Engineering (BE) degree, Computer, Modern Education Society’s College of Engineering.
4Karunesh Bhat, Pursuing, Bachelor of Engineering (BE) degree, Computer, Modern Education Society’s College of Engineering.
5Miss Revati M Wahul, Faculty, Computer Engineering, M. E. Society’s College of Engineering, Pune.
Manuscript received on February 02, 2020. | Revised Manuscript received on February 10, 2020. | Manuscript published on March 30, 2020. | PP: 665-667 | Volume-8 Issue-6, March 2020. | Retrieval Number: F7227038620/2020©BEIESP | DOI: 10.35940/ijrte.F7227.038620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud Computing has made it possible to provide individuals as well as organizations with a utility that is cost-effective. It empowers businesses by delivering these services using the internet. Files can be shared through the cloud. These files may contain sensitive information that needs to be kept hidden from anonymous users. This is done using cryptographic algorithms. High level of security can be provided using hybrid cryptography to encrypt the data. Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) are the symmetric key encryption algorithms used to secure. An asymmetric key encryption algorithm, Rivest-Shamir-Adleman (RSA) helps in providing a hybrid cryptography model. The security of the key generated can be further enhanced using image steganography method Least Significant Bit (LSB). These issues regarding the security and its challenges will be addressed in this paper and also analyse the measures to handle it.
Keywords: Cloud Security, Cryptography, Encryption, Steganography.
Scope of the Article: Cloud, sensor cloud and mobile cloud security.