Multi-level Security: Data Sharing Using Cryptography and Steganography in Cloud Computing

Abstract

In cloud computing, sharing of data is considered as a challenging security problem. The sharing of the user’s critical data on a third party cloud server does not guarantee the promised level of security and there is a threat to compromise user data. In order to safeguard the data and improve the security measures in the consumer side, cryptographic encryption technique is used where aggregate key and steganography concepts are implemented.. This project aspires to provide secured data sharing in cloud storage with the help of steganography concepts in addition with the sharing of aggregate keys between data owners and data users.

Authors and Affiliations

Deepika. J, Bharathi Dasan. V. S, Vidhya. K

Keywords

Related Articles

Modernizing ATM Security with Biometrics by Using LabVIEW

In today’s world the usage of currencies is moving towards virtual money. One of the at most important things that helped in making the transition towards virtual cash has been Automated Teller Machine (ATM). In order t...

Study of Accident Control System in Automobile in India

In this paper we studied that in every year number of accident in India due to not using safety precautions like don’t drink and drive, not wearing seatbelt, not using vehicles in proper maintenance, etc. In India one d...

Experimental Investigation on Copper Cooled Specialized Direct Contact Heat Exchanger (Cooling Tower)

Our cooling tower operate on the principle of removing heat from water by evaporating a small portion of water passed through the copper U-tubes in the unit. The heat that is removed is called the latent heat of vaporiz...

slugA Novel Approach of Association Mining with Apriori Algorithm to Extract the Frequent Itemsetset in OOD

Most Of the organization have major requirement of Distributed Centralized database system. Each user presents at specification location access the dataset according to his requirement. It means only the partial informa...

Propagation of Exploding Uniform Strong Cylindrical Shock Wave in Condensed Medium (Water)

The very well-known theory of the shock dynamics, Chester - Chisnell- Whitham method is applied to study the exploding i.e., diverging wave in condensed medium, the water is assumed to be the simplesed form of condensed...

Download PDF file
  • EP ID EP19154
  • DOI -
  • Views 283
  • Downloads 7

How To Cite

Deepika. J, Bharathi Dasan. V. S, Vidhya. K (2014). Multi-level Security: Data Sharing Using Cryptography and Steganography in Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://www.europub.co.uk/articles/-A-19154