Cryptostega Mesh: A Triadic Approach for Secure Information Transfer using Cloud Environments

Authors

  • Leelendra Reddy Gogula Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India, 522302
  • Harshith Kurapati Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India, 522302
  • Bhuvana Reddy Bhimireddy Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India, 522302
  • Alekhya Nimmagadda Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India, 522302
  • Radhika Rani Chintala Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India, 522302
  • Vijaya Chandra Jadala Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India, 522302

Keywords:

Cryptography, Steganography, Cloud Computing, Storage, Hashing

Abstract

As technology evolves every day, the risks related to the internet are increasing rapidly. Some of the most common threats over the Internet include insecure data transmission and MITM attacks. Data integrity, privacy, and confidentiality are the main pillars to avoid these types of attacks. With the intention of tackling the risks mentioned, this paper presents an innovative approach where the information can be shared from one user to another in a secure way where the transfer was user specific i.e., no person other than the sender and the intended receiver can even know that the data was getting shared. The methods used in this paper include Cryptography, Steganography and Cloud Computing. This research implements a methodology combining cryptography and steganography along with cloud computing to provide more security that helps us avoid data security issues. The implementation includes RSA and DES encryption from Cryptography, data hiding in images using LSB Steganography, configuring cloud sources for storage, data transmission using cloud user management, and instant data deletion in the cloud with the help of various services offered by the cloud environment. The analysis of this approach is done by comparing the image obtained after completion of steganography which hides the data attained after encrypting it using hybrid cryptography with the image that is used for steganography to examine whether the changes made in the image can be identified easily or not. It is done using various types of graphs such as histograms, bar graphs, and difference images which are further explained in the results and analysis section.

Downloads

Download data is not yet available.

References

S. A. Grishaeva and V. I. Borzov, "Information Security Risk Management," 2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), Yaroslavl, Russia, 2020, pp. 96-98, doi: 10.1109/ITQMIS51053.2020.9322901.

B. Reddy Bhimireddy, A. Nimmagadda, H. Kurapati, L. Reddy Gogula, R. Rani Chintala and V. Chandra Jadala, "Web Security and Web Application Security: Attacks and Prevention," 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2023, pp. 2095-2096, doi: 10.1109/ICACCS57279.2023.10112741.

P. L. Sri, C. Nanda Krishna, A. D. Sai and S. Roshini, "Concealing the Data using Cryptography," 2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2023, pp. 368-372, doi: 10.1109/ICAIS56108.2023.10073878.

V. Sathya, K. Balasubramaniyam, N. Murali, M. Rajakumaran and Vigneswari, "Data hiding in audio signal, video signal text and JPEG images," IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012), Nagapattinam, India, 2012, pp. 741-746.

S. Mishra, M. Kumar, N. Singh and S. Dwivedi, "A Survey on AWS Cloud Computing Security Challenges & Solutions," 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2022, pp. 614-617, doi: 10.1109/ICICCS53718.2022.9788254.

G. Maji, S. Mandal, S. Sen and N. C. Debnath, "Dual image based LSB steganography," 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), Ho Chi Minh City, Vietnam, 2018, pp. 61-66, doi: 10.1109/SIGTELCOM.2018.8325806.

A. G. Benedict, "Improved File Security System Using Multiple Image Steganography," 2019 International Conference on Data Science and Communication (IconDSC), Bangalore, India, 2019, pp. 1-5, doi: 10.1109/IconDSC.2019.8816946.

R. Ahluwalia, A. Gupta and P. Chaudhary, "Steganography: Double Encrypted Image Deployed In Cloud," 2020 International Conference on Intelligent Engineering and Management (ICIEM), London, UK, 2020, pp. 519-525, doi: 10.1109/ICIEM48762.2020.9160279.

M. Alajmi, I. Elashry, H. S. El-Sayed and O. S. Farag Allah, "Steganography of Encrypted Messages Inside Valid QR Codes," in IEEE Access, vol. 8, pp. 27861-27873, 2020, doi: 10.1109/ACCESS.2020.2971984.

T. Kalaichelvi and P. Apuroop, "Image Steganography Method to Achieve Confidentiality Using CAPTCHA for Authentication," 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2020, pp. 495-499, doi: 10.1109/ICCES48766.2020.9138073.

M. S. Abbas, S. S. Mahdi and S. A. Hussien, "Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography," 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, 2020, pp. 123-127, doi: 10.1109/CSASE48920.2020.9142072.

S. Pramanik, S. K. Bandyopadhyay and R. Ghosh, "Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts," 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India, 2020, pp. 665-669, doi: 10.1109/ICIMIA48430.2020.9074957.

J. A. Ajala, S. Singh, S. Mukherjee and S. Chakraborty, "Application of Steganography Technique in Cloud Computing," 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emirates, 2019, pp. 532-537, doi: 10.1109/ICCIKE47802.2019.9004347.

L. Kothari, R. Thakkar and S. Khara, "Data hiding on web using combination of Steganography and Cryptography," 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur, India, 2017, pp. 448-452, doi: 10.1109/COMPTELIX.2017.8004011.

W. -C. Wu and S. -C. Yang, "Enhancing image security and privacy in cloud system using steganography," 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), Taipei, Taiwan, 2017, pp. 321-322, doi: 10.1109/ICCE-China.2017.7991125.

N. Manohar and P. V. Kumar, "Data Encryption & Decryption Using Steganography," 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2020, pp. 697-702, doi: 10.1109/ICICCS48265.2020.9120935.

D. K. Chaudhary, S. Srivastava and T. Choudhury, "Steganography for Confidential Communication and Secret Data storage," 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), Bangalore, India, 2018, pp. 461-465, doi: 10.1109/ICGCIoT.2018.8753034.

Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, "Simple and secure image steganography using LSB and triple XOR operation on MSB," 2018 International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, Indonesia, 2018, pp. 191-195, doi: 10.1109/ICOIACT.2018.8350661.

R. Dumre and A. Dave, "Exploring LSB Steganography Possibilities in RGB Images," 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2021, pp. 1-7, doi: 10.1109/ICCCNT51525.2021.9579588.

David Clinton; Ben Piper, "AWS Storage," in AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam , Wiley, 2021, pp.59-81.

R. A. P. Rajan, "Serverless Architecture - A Revolution in Cloud Computing," 2018 Tenth International Conference on Advanced Computing (ICoAC), Chennai, India, 2018, pp. 88-93, doi: 10.1109/ICoAC44903.2018.8939081.

Downloads

Published

02.02.2024

How to Cite

Gogula, L. R. ., Kurapati, H. ., Bhimireddy, B. R. ., Nimmagadda, A. ., Rani Chintala, R. ., & Jadala, V. C. . (2024). Cryptostega Mesh: A Triadic Approach for Secure Information Transfer using Cloud Environments. International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 283–293. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4665

Issue

Section

Research Article