International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Cloud computing is one among the most recent growing area in the field of IT industry also called on-demand computing. The growth in field of cloud computing can increase threat security aspects. So security has remained a relentless concern for day today usage of internet, networking and cloud computing is affected. However the general public communication channels are liable to security attacks that may cause unauthorized access to some info. Encryption has been accustomed persist and forestall these attacks. However once the data is decrypted it'll be exposed to the attackers once more and it'll not have any security protection. Steganography is that the science of embedding the secret information among different medium files (text, audio, image, and video) during a method that hides the existence of the secret message at all. This paper provides the details of Cloud computing and steganography presents with a quick review of cloud services, trust, privacy, security and also projected numerous steganography techniques recently introduced by various researchers around the globe. The main motive of concerning this paper is to make more secured your cloud data and also introduce the technique to make it better approach. So that user has full trust on cloud data. Hence, it provides responsibleness, measurability, high performance and relatively low value feasible solution as compared to devoted infrastructures.

Keywords: Cloud Computing, Cloud Services, Data-centers, Encryption, Hybrid Cloud, Steganography, Third Party Auditor TPA

Edition: Volume 4 Issue 11, November 2015

Pages: 1944 - 1949


How to Cite this Article?

Alok Ranjan, Mansi Bhonsle, "A Review of Privacy Protection of Cloud Storage and Steganography Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151653, Volume 4 Issue 11, November 2015, 1944 - 1949

28 PDF Views | 21 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1861 - 1865

Security Rudiments for SaaS Application Development and Deployment

Anand Singh

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2037 - 2038

A Survey on Service Management Mechanisms in Service Oriented Computing

Anish Bhagwat

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1722 - 1729

Security on Cloud Computing: A Review

Rameshwari Malik

Share this article



Similar Articles with Keyword 'Cloud Services'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2098 - 2102

Public Auditing System with Auto-Data Recovery System on Cloud Scheme

Dhane Sachin V., Joshi P.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1534 - 1537

A Synopsis on Point to Point Sharing Using Cloud Based Mobile Community-Based System (Cloud MoV System)

N. Shaleen Saroj, K. Lakshmi, Dr. S. Prem Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1821 - 1853

Cloud Computing and Its Advantages

Shaikh Ashapakh Sattar

Share this article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2228 - 2233

A Trusted Secured Architecture for Storage-as-a-Service (STaaS) Cloud

Sanneboina Nagaraju, K. B. V. Rama Narasimham

Share this article



Similar Articles with Keyword 'Data-centers'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 939 - 942

An Extended User Centric Cloud Computing Architecture

Susheela Hooda, Dr. A. K. Sharma

Share this article



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Secure E-Exam Scheme

Sattar J. Aboud

Share this article



Similar Articles with Keyword 'Hybrid Cloud'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 2217 - 2219

A Hybrid Cloud Approach for Secure Authorized Deduplication

Sunita S. Velapure, S. S. Barde

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1728 - 1730

A Trusted Framework for Data Security in Cloud Environment

Mannem Sindhuja, Punugoti Pavan Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this article



Similar Articles with Keyword 'Steganography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2420 - 2425

Data hiding Using Texture Synthesis with Watermarking

Aruna M P, Maya Mathew

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1547 - 1549

Various Approaches of Video and Image Stenography: A Review

Mandeep Singh, Garima Mahajan

Share this article



Similar Articles with Keyword 'Third Party Auditor TPA'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 336 - 341

Deduplication and Decentralized Access Control in Cloud with Efficient Public Auditing Mechanism

Sohail A. Khan, Dr. Shafi K. Pathan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 153 - 155

Improved Cloud Storage Security Framework Based on TTP Crypto Network

T. Tejaswi, Gunna Kishore

Share this article
Top