Full Paper View Go Back

Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms

Sirisha Aguru1 , Batteri MadhavaRao2

Section:Research Paper, Product Type: Isroset-Journal
Vol.7 , Issue.1 , pp.6-9, Feb-2019


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v7i1.69


Online published on Feb 28, 2019


Copyright © Sirisha Aguru, Batteri MadhavaRao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sirisha Aguru, Batteri MadhavaRao, “Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms,” International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.6-9, 2019.

MLA Style Citation: Sirisha Aguru, Batteri MadhavaRao "Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms." International Journal of Scientific Research in Computer Science and Engineering 7.1 (2019): 6-9.

APA Style Citation: Sirisha Aguru, Batteri MadhavaRao, (2019). Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms. International Journal of Scientific Research in Computer Science and Engineering, 7(1), 6-9.

BibTex Style Citation:
@article{Aguru_2019,
author = {Sirisha Aguru, Batteri MadhavaRao},
title = {Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {1},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {6-9},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1174},
doi = {https://doi.org/10.26438/ijcse/v7i1.69}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.69}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1174
TI - Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Sirisha Aguru, Batteri MadhavaRao
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 6-9
IS - 1
VL - 7
SN - 2347-2693
ER -

386 Views    429 Downloads    104 Downloads
  
  

Abstract :
Cloud computing is one of the emerging technologies. The cloud environment is a large open distributed system. Cloud Computing provides various services to the customers with price as pay for use such services are Infrastructure as a service (IaaS), Platform as a service (PaaS), software as a service (SaaS) and Data base as service (DaaS) like so many services. And all these services provide various benefits to its customers, but there are still some challengs. One among them is to protect the data, as well as, privacy of users. The data saved at remote servers is under the control and oservation of unknown people who can do anything with our data, thus there are some Security risks. So, these data security risks are causing a hindrance in the development of the field of cloud computing. This paper has designed a scheme that can help, solve this Security issue. This paper proposes an improved way in guaranting information security by utilizing RC6 algorithm and Steganography algorithms.

Key-Words / Index Term :
Cloud Computing, Data Security, Encryption, RC6 Encryption , Steganography

References :
[1] P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
[2] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599 – 616, 2009.
[3] C. Cachin, I. Keidar, and A. Shraer, “Trusting the cloud,” SIGACT News, vol. 40, no. 2, pp. 81–86, 2009.
[4] Diogo A. B. Fernandes, Liliana F. B. Soares, Joo V.Gomes, Mrio M. Freire, Pedro R. M. Incio, Security issues in cloud environments: a survey, International Journal of Information Security, doi:10.1007/s10207-013-208-7 (2013) 1 - 58.
[5] V. J. Winkler, “Securing the Cloud,” Cloud Comput.Secur. Tech. tactics. Elsevier., 2011.
[6] F. Zhang and H. Chen, “Security-Preserving Live Migration of Virtual Machines in the Cloud,” J. Netw.Syst. Manag., pp. 562–587, 2012.
[7] Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, no. February, pp. 1–14, 2013.
[8] L. Rodero-Merino, L. M. Vaquero, E. Caron, A. Muresan, and F. Desprez, “Building safe PaaS clouds: A survey on security in multitenant software platforms,” Comput. Secur., vol. 31, pp. 96–108, 2012.
[9] A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, “Security risks and their management in cloud computing,” 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012.
[10] T. Mather, S. Kumaraswamy, and S. Latif, “Cloud Security and Privacy,” p. 299, 2009.
[11] “A Steganography algorithm for hiding secret message inside image using random key” International Journal of Engineering Research & Technology (IJERT) ,ISSN: 2278-0181,Vol. 3 Issue 12, December-2014

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation