Data Hiding in the Multi-Cloud Environment by Product Cipher-Based Distributed Steganography

Author:

Hashmi Syed Shakeel1,Mohammad Arshad Ahmad Khan2,Abdul Arif Mohammad2,Atheeq C2,Nizamuddin Mohammad Khaja2

Affiliation:

1. The ICFAI Foundation for Higher Education (Deemed to be University, Hyderabad Telangana

2. GITAM Deemed to be University

Abstract

Abstract The paper presents a highly effective steganography scheme designed to protect hidden data in the cloud. The proposed scheme addresses the challenges of concealing data in a decentralized manner while minimizing traces left behind by changing cover media. Two significant technical contributions are introduced: 1) The use of unchanged cover media as a reference for fragmented data, and 2) Leveraging multi-cloud storage to securely store the hidden message. Recent research highlights the vulnerability of retrieving secret data from multi-cloud storage, underscoring the need for a robust solution. To overcome this, a product cipher-based distributed steganography scheme is proposed, ensuring dynamic data hiding across multiple cloud platforms in a distributed manner. Unlike related steganographic work, the scheme does not rely on file modifications or the use of special characters for concealment, making it an undetectable secret distribution system. By avoiding suspicious file content, the scheme does not draw attention from potential adversaries during an inspection. The security analysis of the proposed mechanism confirms its resilience against attacks, as even with full access to all cloud accounts, an attacker cannot compute the hidden message. The scheme's security is guaranteed by the unknown key, the base encoding value, and the computational complexity required for the opponent to determine the appropriate sequence of secret distribution and file numbering. In contrast to the current approach, which is susceptible to brute-force attacks with computations substantially smaller than B!*K!*n!, the PCDS scheme provides significantly stronger security guarantees.

Publisher

Research Square Platform LLC

Reference39 articles.

1. Arif MA, Mohammad AA, Sastry MK, Bankapalli J (2022) "Brute Force Attack on Distributed data Hiding in the Multi-Cloud Storage Environment More Diminutive than the Exponential Computations," Ingenierie des System d’Information, Vol 27, no, 6, pp. 915–921, Dec

2. A novel image cryptosystem using Gray code, quantum walks, and Henon map for cloud applications;Abd-El-Atty B;Complex & Intelligent Systems

3. Gadde S, Amutharaj J, Usha S (2023) “A security model to protect the isolation of medical data in the cloud using hybrid cryptography,” Journal of Information Security and Applications, Vol 73, pp. 103412, Mar.

4. Makhdoom I, Abolhasan M, Lipman J (May 2022) A comprehensive survey of covert communication techniques, limitations and future challenges. Computers & Security, p 102784

5. Abdul A, Mohammad et al (Sep 2022) Enhancing Security of Mobile Cloud Computing by Trust-and Role-. Based Access Control." Scientific Programming

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3