A Secure Information Hiding Approach in Cloud Using LSB
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 124 , Downloads: 114 | CTR: 92 % | Weekly Popularity: ⮙2

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

A Secure Information Hiding Approach in Cloud Using LSB

Mudasir Ahmed Muttoo, Pooja Ahlawat

The continuous development of cloud computing is giving way to more cloud services, due to which security of cloud services, especially data privacy protection, becomes more critical. This research work explores the basic features of data mining techniques in cloud computing and securing the data. The status of the development of cloud computing security, the data privacy analysis, security auditing, data monitoring and other challenges that the cloud computing security faces have been explored. The recent researches on data protection regarding security and privacy issues in cloud computing have partially addressed some issues. The implementation of data mining techniques through cloud computing encourages the users to extract meaningful hidden predictive information from virtually integrated data warehouse that reduces the costs of storage and infrastructure.

Keywords: Cloud Computing, data security, Knowledge Discovery

Edition: Volume 4 Issue 7, July 2015

Pages: 1771 - 1776

Share this Article

How to Cite this Article?

Mudasir Ahmed Muttoo, Pooja Ahlawat, "A Secure Information Hiding Approach in Cloud Using LSB", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156857, Volume 4 Issue 7, July 2015, 1771 - 1776

124 PDF Views | 114 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Similar Articles with Keyword 'data security'

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 134 , Downloads: 98 | CTR: 73 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Views: 141 , Downloads: 102 | CTR: 72 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Views: 125 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this Article

Similar Articles with Keyword 'Knowledge Discovery'

Views: 147 , Downloads: 101 | CTR: 69 %

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2681 - 2688

A Proposed Framework Using Neural Network in Web Mining for Improving the Performance of E-Learning System

Dar Masroof Amin, Atul Garg

Share this Article

Views: 132 , Downloads: 102 | CTR: 77 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2734 - 2838

Efficient Techniques for Mining High Utility Itemsets from Transactional Databases: A Survey

Ganesh Sawant, Bhawana Kanawde

Share this Article

Views: 151 , Downloads: 103 | CTR: 68 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1102 - 1105

Subgroup Discovery a Data Mining Technique: Immense Survey

Deepali Nidhan Gunjate, B. R. Kanawade

Share this Article

Views: 133 , Downloads: 103 | CTR: 77 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1267 - 1275

A Survey on Feature Selection Techniques and Classification Algorithms for Efficient Text Classification

Pradnya Kumbhar, Manisha Mali

Share this Article

Views: 143 , Downloads: 104 | CTR: 73 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 572 - 576

A Research Article on Data Mining in Addition to Process Mining: Similarities and Dissimilarities

S. Sowjanya Chintalapati, Ch.G.V.N.Prasad, J. Sowjanya, R.Vineela

Share this Article
Top