Cryptostega Mesh: A Triadic Approach for Secure Information Transfer using Cloud Environments
Keywords:
Cryptography, Steganography, Cloud Computing, Storage, HashingAbstract
As technology evolves every day, the risks related to the internet are increasing rapidly. Some of the most common threats over the Internet include insecure data transmission and MITM attacks. Data integrity, privacy, and confidentiality are the main pillars to avoid these types of attacks. With the intention of tackling the risks mentioned, this paper presents an innovative approach where the information can be shared from one user to another in a secure way where the transfer was user specific i.e., no person other than the sender and the intended receiver can even know that the data was getting shared. The methods used in this paper include Cryptography, Steganography and Cloud Computing. This research implements a methodology combining cryptography and steganography along with cloud computing to provide more security that helps us avoid data security issues. The implementation includes RSA and DES encryption from Cryptography, data hiding in images using LSB Steganography, configuring cloud sources for storage, data transmission using cloud user management, and instant data deletion in the cloud with the help of various services offered by the cloud environment. The analysis of this approach is done by comparing the image obtained after completion of steganography which hides the data attained after encrypting it using hybrid cryptography with the image that is used for steganography to examine whether the changes made in the image can be identified easily or not. It is done using various types of graphs such as histograms, bar graphs, and difference images which are further explained in the results and analysis section.
Downloads
References
S. A. Grishaeva and V. I. Borzov, "Information Security Risk Management," 2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), Yaroslavl, Russia, 2020, pp. 96-98, doi: 10.1109/ITQMIS51053.2020.9322901.
B. Reddy Bhimireddy, A. Nimmagadda, H. Kurapati, L. Reddy Gogula, R. Rani Chintala and V. Chandra Jadala, "Web Security and Web Application Security: Attacks and Prevention," 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2023, pp. 2095-2096, doi: 10.1109/ICACCS57279.2023.10112741.
P. L. Sri, C. Nanda Krishna, A. D. Sai and S. Roshini, "Concealing the Data using Cryptography," 2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2023, pp. 368-372, doi: 10.1109/ICAIS56108.2023.10073878.
V. Sathya, K. Balasubramaniyam, N. Murali, M. Rajakumaran and Vigneswari, "Data hiding in audio signal, video signal text and JPEG images," IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012), Nagapattinam, India, 2012, pp. 741-746.
S. Mishra, M. Kumar, N. Singh and S. Dwivedi, "A Survey on AWS Cloud Computing Security Challenges & Solutions," 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2022, pp. 614-617, doi: 10.1109/ICICCS53718.2022.9788254.
G. Maji, S. Mandal, S. Sen and N. C. Debnath, "Dual image based LSB steganography," 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), Ho Chi Minh City, Vietnam, 2018, pp. 61-66, doi: 10.1109/SIGTELCOM.2018.8325806.
A. G. Benedict, "Improved File Security System Using Multiple Image Steganography," 2019 International Conference on Data Science and Communication (IconDSC), Bangalore, India, 2019, pp. 1-5, doi: 10.1109/IconDSC.2019.8816946.
R. Ahluwalia, A. Gupta and P. Chaudhary, "Steganography: Double Encrypted Image Deployed In Cloud," 2020 International Conference on Intelligent Engineering and Management (ICIEM), London, UK, 2020, pp. 519-525, doi: 10.1109/ICIEM48762.2020.9160279.
M. Alajmi, I. Elashry, H. S. El-Sayed and O. S. Farag Allah, "Steganography of Encrypted Messages Inside Valid QR Codes," in IEEE Access, vol. 8, pp. 27861-27873, 2020, doi: 10.1109/ACCESS.2020.2971984.
T. Kalaichelvi and P. Apuroop, "Image Steganography Method to Achieve Confidentiality Using CAPTCHA for Authentication," 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2020, pp. 495-499, doi: 10.1109/ICCES48766.2020.9138073.
M. S. Abbas, S. S. Mahdi and S. A. Hussien, "Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography," 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, 2020, pp. 123-127, doi: 10.1109/CSASE48920.2020.9142072.
S. Pramanik, S. K. Bandyopadhyay and R. Ghosh, "Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts," 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India, 2020, pp. 665-669, doi: 10.1109/ICIMIA48430.2020.9074957.
J. A. Ajala, S. Singh, S. Mukherjee and S. Chakraborty, "Application of Steganography Technique in Cloud Computing," 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emirates, 2019, pp. 532-537, doi: 10.1109/ICCIKE47802.2019.9004347.
L. Kothari, R. Thakkar and S. Khara, "Data hiding on web using combination of Steganography and Cryptography," 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur, India, 2017, pp. 448-452, doi: 10.1109/COMPTELIX.2017.8004011.
W. -C. Wu and S. -C. Yang, "Enhancing image security and privacy in cloud system using steganography," 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), Taipei, Taiwan, 2017, pp. 321-322, doi: 10.1109/ICCE-China.2017.7991125.
N. Manohar and P. V. Kumar, "Data Encryption & Decryption Using Steganography," 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2020, pp. 697-702, doi: 10.1109/ICICCS48265.2020.9120935.
D. K. Chaudhary, S. Srivastava and T. Choudhury, "Steganography for Confidential Communication and Secret Data storage," 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), Bangalore, India, 2018, pp. 461-465, doi: 10.1109/ICGCIoT.2018.8753034.
Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, "Simple and secure image steganography using LSB and triple XOR operation on MSB," 2018 International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, Indonesia, 2018, pp. 191-195, doi: 10.1109/ICOIACT.2018.8350661.
R. Dumre and A. Dave, "Exploring LSB Steganography Possibilities in RGB Images," 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2021, pp. 1-7, doi: 10.1109/ICCCNT51525.2021.9579588.
David Clinton; Ben Piper, "AWS Storage," in AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam , Wiley, 2021, pp.59-81.
R. A. P. Rajan, "Serverless Architecture - A Revolution in Cloud Computing," 2018 Tenth International Conference on Advanced Computing (ICoAC), Chennai, India, 2018, pp. 88-93, doi: 10.1109/ICoAC44903.2018.8939081.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.