Affiliation:
1. National College of Business Administration & Economics sub-campus Multan
2. Parker Hannifin Corp
3. University of Texas
4. Suez University
Abstract
Abstract
Cloud computing is a cutting-edge technology that is rapidly gaining traction in the information technology (IT) sector. Although it has many benefits, there are also disadvantages, most notably the difficulties and vulnerability in security. This study describes multiple architectures for secure communication over a private cloud. We developed a unique custom approach that incorporates steganography to provide an additional degree of security to cloud data transport. Our suggested technique is an important road map for putting together a complete cloud security architecture. Furthermore, good basic management approaches may be used to distribute keys to cloud users, ensuring that only those with permission to cloud compute the data have cloud computing to the data.
Publisher
Research Square Platform LLC
Reference36 articles.
1. Adee R, Mouratidis H (2022) Sensors 2:1–23. https://doi.org/10.3390/s22031109. A dynamic four-step data security model for data in cloud computing based on cryptography and steganography
2. Al-Ruithe M, Benkhelifa E, Hameed K (2018) Personal Uniquit Comput 23:1–21. https://doi.org/10.1007/s00779-017-1104-3. A systematic literature review of data governance and cloud data governance
3. Data confidentiality in healthcare monitoring systems based on image steganography to improve the exchange of patient information using the internet of things;AlEisa HN;J Healthc Eng,2022
4. A crypto-steganography approach for hiding ransomware within HEVC streams in Android IoT devices;Almomani I;Sensors,2022
5. Distributed intelligence in the internet of things: challenges and opportunities;Alsboui T;SN Comput Sci,2021