DocumentCode
3575265
Title
Combining encryption and stego - Object processing: A new direction in cloud security
Author
Kaul, Aishwarya ; Tuli, Sheoli ; Jain, Rachna
Author_Institution
Dept. of Comput. Sci. & Eng., GGSIP Univ., New Delhi, India
fYear
2014
Firstpage
1
Lastpage
4
Abstract
Cloud computing is a recently developed technology for complex systems which provide mass-scale services, shared and used by numerous users. Therefore authentication of both the user and service provider is necessary for security in cloud computing. After reviewing the ancient methods of secure messaging and current methods of secure transmission of messages in a cloud network we have tried to develop a new model that combines encryption, image and audio processing so as to make a more secure model of transmission of messages and keys from one person to another in a cloud system/network. We suggest a new scheme of combining the Shamir´s algorithm for encryption of keys and Twofish algorithm for encryption of messages, using images as cover objects for messages and audio processing for sending private/public keys and how this can prove to be more secure as compared to the existing methods.
Keywords
audio signal processing; cloud computing; image processing; private key cryptography; public key cryptography; steganography; Shamir algorithm; Twofish algorithm; audio processing; cloud computing; cloud security; encryption; image processing; mass-scale services; private-public keys; secure messages transmission; secure messaging; stego-object processing; Abstracts; Cryptography; Heating; Image processing; Tutorials; Cloud Computing; Shamir´s algorithm; Stego-Object; Twofish algorithm;
fLanguage
English
Publisher
ieee
Conference_Titel
IT in Business, Industry and Government (CSIBIG), 2014 Conference on
Print_ISBN
978-1-4799-3063-0
Type
conf
DOI
10.1109/CSIBIG.2014.7056954
Filename
7056954
Link To Document