Title :
Is Cloud Computing Steganography-proof?
Author :
Mazurczyk, Wojciech ; Szczypiorski, Krzysztof
Author_Institution :
Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland
Abstract :
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver. These scenarios as well as the threats that steganographic methods can cause must be taken into account when designing secure cloud computing services.
Keywords :
cloud computing; data encapsulation; steganography; cloud computing service security; information hiding; steganograms receiver location; steganographic communication scenarios; Cloud computing; Computational modeling; NIST; Privacy; Protocols; Security; Strontium; cloud computing; network security; steganography;
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2011 Third International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4577-1795-6
DOI :
10.1109/MINES.2011.95