Title :
A new steganography protocol for improving security of cloud storage services
Author :
Murakami, Kazuki ; Qiangfu Zhao ; Hanyu, Ryota
Author_Institution :
Univ. of Aizu, Aizu-Wakamatsu, Japan
Abstract :
In recent years, cloud computing services have become a must in our daily lives. Although well-known security technologies are used for system protection and data protection, the security of existing service systems is far from enough. The main problem is that existing systems and/or programs usually have some unknown issues or vulnerabilities, and can be attacked by some unauthorized persons in some unexpected ways. To solve the problem, at least partially, we have proposed a new steganography protocol for improving information security in cloud storage services. The key point in this protocol is to synthesize an image that can be used as the encryption/decryption key, the stego-key, as well as the cover data. Initial analysis shows that the new protocol is very secure. This paper formulates the protocol in a more formal way, so that based on the formulation, we can find possible weak points more easily, and make the protocol more practically useful.
Keywords :
cloud computing; cryptographic protocols; steganography; storage management; cloud computing services; cloud storage services; cover data; encryption-decryption key; information security; steganography protocol; stego-key; Cascading style sheets; Cloud computing; Encryption; Protocols; Servers;
Conference_Titel :
Independent Computing (ISIC), 2014 IEEE International Symposium on
Conference_Location :
Orlando, FL
DOI :
10.1109/INDCOMP.2014.7011748