International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 104 | Views: 180

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan [2] | Mansi Bhonsle [5]


Abstract: Cloud computing is one among the most recent growing area in the field of IT industry also called on-demand computing. The growth in field of cloud computing can increase threat security aspects. So security has remained a relentless concern for day today usage of internet, networking and cloud computing is affected. However the general public communication channels are liable to security attacks that may cause unauthorized access to some info. Encryption has been accustomed persist and forestall these attacks. However once the data is decrypted it'll be exposed to the attackers once more and it'll not have any security protection. Steganography is that the science of embedding the secret information among different medium files (text, audio, image, and video) during a method that hides the existence of the secret message at all. This paper provides the details of Cloud computing and steganography presents with a quick review of cloud services, trust, privacy, security and also projected numerous steganography techniques recently introduced by various researchers around the globe. The main motive of concerning this paper is to make more secured your cloud data and also introduce the technique to make it better approach. So that user has full trust on cloud data. Hence, it provides responsibleness, measurability, high performance and relatively low value feasible solution as compared to devoted infrastructures.


Keywords: Cloud Computing, Cloud Services, Data-centers, Encryption, Hybrid Cloud, Steganography, Third Party Auditor TPA


Edition: Volume 4 Issue 11, November 2015,


Pages: 1944 - 1949


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top