EFFICIENT SECURITY FRAMEWORK FOR DATA INTEGRITY AND DATA ACCESS IN CLOUD ENVIRONMENT
Main Article Content
Abstract
Cloud computing is a highly emerging area in the market and provide the way of mechanism for global challengers. The priority of Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers.This paper attempts a combination of cryptography andsteganography, which provides a big determination for its security. The secret message can be encrypted before its actual process. The main goal of this work to hide a secret message into pixels of the image so that the hacker does not difference between the original and steganography image.The embedding can be using LSB techniques. Steganography can be replaced by unused bits in the data (such as graphics, sound, audio, video, text). The existing work, AES algorithm can be used to cryptography. The hackers can easily to theft the information due to the insecure links. To overcome this problem to implement the F5 matrix encoding to improve the efficiency of embedding. This present work focuses on enlarge the technique to secure text, video, audio, image with authenticity and integrity.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.