Author:
Mawgoud Ahmed A.,Taha Mohamed Hamed N.,Abu-Talleb Amr,Kotb Amira
Abstract
AbstractIn the early days of digital transformation, the automation, scalability, and availability of cloud computing made a big difference for business. Nonetheless, significant concerns have been raised regarding the security and privacy levels that cloud systems can provide, as enterprises have accelerated their cloud migration journeys in an effort to provide a remote working environment for their employees, primarily in light of the COVID-19 outbreak. The goal of this study is to come up with a way to improve steganography in ad hoc cloud systems by using deep learning. This research implementation is separated into two sections. In Phase 1, the “Ad-hoc Cloud System” idea and deployment plan were set up with the help of V-BOINC. In Phase 2, a modified form of steganography and deep learning were used to study the security of data transmission in ad-hoc cloud networks. In the majority of prior studies, attempts to employ deep learning models to augment or replace data-hiding systems did not achieve a high success rate. The implemented model inserts data images through colored images in the developed ad hoc cloud system. A systematic steganography model conceals from statistics lower message detection rates. Additionally, it may be necessary to incorporate small images beneath huge cover images. The implemented ad-hoc system outperformed Amazon AC2 in terms of performance, while the execution of the proposed deep steganography approach gave a high rate of evaluation for concealing both data and images when evaluated against several attacks in an ad-hoc cloud system environment.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference110 articles.
1. Iivari N, Sharma S, Ventä-Olkkonen L (2020) Digital transformation of everyday life–how COVID-19 pandemic transformed the basic education of the young generation and why information management research should care? Int J Inf Manag 55:102183
2. Mollah MB, Azad MAK, Vasilakos A (2017) Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl 84:38–54
3. Grnarov A, Cilku B, Miskovski I, Filiposka S, Trajanov D (2008) Grid computing implementation in ad hoc networks. In: Advances in computer and information sciences and engineering. Springer, Dordrecht, pp 196–201
4. McGilvary GA, Barker A, Atkinson M (2015) Ad hoc cloud computing. In: 2015 IEEE 8th international conference on cloud computing. IEEE, pp 1063–1068
5. Buyya, R., Beloglazov, A., and Abawajy, J. (2010). Energy-efficient management of data center resources for cloud computing: A vision, architectural elements, and open challenges. arXiv preprint arXiv:1006.0308
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献