DocumentCode :
2659289
Title :
Is Cloud Computing Steganography-proof?
Author :
Mazurczyk, Wojciech ; Szczypiorski, Krzysztof
Author_Institution :
Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland
fYear :
2011
fDate :
4-6 Nov. 2011
Firstpage :
441
Lastpage :
442
Abstract :
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver. These scenarios as well as the threats that steganographic methods can cause must be taken into account when designing secure cloud computing services.
Keywords :
cloud computing; data encapsulation; steganography; cloud computing service security; information hiding; steganograms receiver location; steganographic communication scenarios; Cloud computing; Computational modeling; NIST; Privacy; Protocols; Security; Strontium; cloud computing; network security; steganography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2011 Third International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4577-1795-6
Type :
conf
DOI :
10.1109/MINES.2011.95
Filename :
6103808
Link To Document :
بازگشت