SlideShare a Scribd company logo
STEGANOGRAPHIC APPROACH TO ENSURE DATA STORAGE
SECURITY IN CLOUD COMPUTING USING HUFFMAN CODING
1
CREATED BY:
HASIMSHAH . R . S
CONTENTS
1.INTRODUCTION
2.RELATED WORK
3.DESIGN OF THE SYSTEM
4.ALGORITHMS USED IN THE SYSTEM
5.SECURITY ANALYSIS AND PERFOMANCE EVALUATION
6.CONCLUSION
7.REFERENCES
2
INTRODUCTION
 Cloud computing
3
 The cloud computing model allows access to information
and computer resources from anywhere that a network
connection is available. Cloud computing provides a shared
pool of resources, including data storage space, networks,
computer processing power, and specialized corporate and
user applications.
Cloud computing is a practical approach to experience
direct cost benefits and it has the potential to transform a
data center from a capital-intensive set up to a variable
priced environment. The idea of cloud computing is based on
a very fundamental principal of „reusability of IT capabilities'.
4
INTRODUCTION(CNTD)
5
Data security
Can’t implement Traditional cryptographic technology .
Cloud - not a third-party warehouse.
Data stored in multiple physical locations in random
manner
Steganographic Approach Using Huffman Coding
 ensures explicit dynamic data support
security of data when these data are in the cloud storage.
INTRODUCTION(CONT)
The Huffman Tree constructs an optimal prefix code called
a Huffman code.
Let’s say, there are six characters A,B,C,D,E and F as shown
in Fig a .
6
INTRODUCTION(CONT) 7
Now for a given code 0 100 100 1101 we can decode them
to get back the original code by traversing the Huffman tree.
CLOUD COMPUTING ARCHITECTURE AND
SECURITY ISSUES
DEPLOYMENT MODELS
Private cloud
Community cloud
Public cloud
Hybrid cloud
SERVICE DELIVERY MODELS
Software as a Service(SaaS)
Platform as a Service(PaaS)
Infrastructure as a Srevice(IaaS)
8
INTRODUCTION(CONT)
SECURITY ISSUES
9
Phishing
data loss
 botnet (Collection of machines are running remotely).
botnet - offers more reliable infrastructure at a relatively low price
for attack.
INTRODUCTION(CONT)
Problem statement :
Main problem - loss of control of data stored in the
cloud.
10
Schematic System Architecture for Cloud
INTRODUCTION(CONT)
RELATED WORK
cong wang et al.use homomorphic token with distributed
verification of erasure-coded data.
but it is failed to achieve public verifiability and storage correctness.
shantanu pal et al. ensures to find location of adversary or the
attacking party from its target.
it may try to attack them, if adversary knows the location of the other vms.
this may harm the other vms in between.
ateniese et al.proposed the “provable data possession” (pdp)
model to ensure possession of file in untrusted storages.
This scheme used public key based homomorphic tags to audit the data file
and it is providing public verifiability.
11
DESIGN OF THE SYSTEM
Storing data into some images. - steganography .
12
Processes to store or retrieve their data :
13
Computational model to Store
Data
Computational model to
Retrieve Data
Human Visual System(HVS) has very low sensitivity.
Variable length encoding doesn’t help attacker to recognize
characters.
He/she has no idea about frequency of characters.
Can’t generate Huffman code.
Ultimately we are having a secured system
14
Image database
•Images stored in CSP-1
•Set of images sent to CSP-3 - user wants to store data in cloud
File database
•File holds the address of images
Embedded data into Images
•Counts total no. of characters
•Finds frequency of each characters by Huffman code
•Applies Steganography to both frequency of characters & codified
data.
15
ALGORITHMS USED IN THE SYSTEM
ALGORITHM 1 : HF-codification()
1. procedure
2. Read file FText which is to be saved in Cloud
3. Compute CN from FText
4. Find the frequency of occurrences of each characters in
Ftext and store them in some chronological order
5. Store frequency in a new file FFreq .
6. FN = Freq-Codification( )
16
17
7. Call Huffman-Tree()
8. Create a file FCode
9. Open FN. Reach EOF of FN where the original
characters of FText will be replaced by the Huffman
codes present in FCode .
10. Calculate the total Bit BCount in FN.
11. Delete FText, F Freq and F Code.
12. Call Steganography() to perform steganography on FN
13. end procedure
FILE CODIFICATION
frequency file is read digit by digit & each digit is codified into 4-
bit binary pattern
Algorithm 2: Freq-Codification ()
1. procedure
2. Open FFreq and a new File FN.
3. while ( Read characters from F Freq until EOF )
4. do if (character is a new line character)
5. Append 1111 at the end of FN.
6. else
18
19
7. Convert the digit to its 4-bit binary form.
8. Append those 4-bits at the end of FN.
9. end if
10. end while
11. Append 11111111 at the end of FN.
12. Return FN
13. end procedure
Algorithm 2: Freq-Codification () (CNTD…)
Hiding Data within Images Steganography
Deals the pre-requisite requirements like :
load image, store file name, image index
finally call the MdfImg operation which will map data from file to images.
ALGORITHM 3: STEGANOGRAPHY()
1. procedure
2. Load Image_Index = ImageSearch (Image_Database)
3. Store (FName, BCount, Image_Index)
4. MdfImg (Image_Database [Image_Index]);
5. end procedure.
20
SEARCHING OF VALID IMAGE
The algorithm searches an image which we can be used to store the
data. It returns the address of a valid image if it is available in image
database.
ALGORITHM 4: IMAGESEARCH(IMAGE_DATABASE)
1. procedure
2. Open Image_Database;
3. for Image_Database(i), i<-1, n do
4. if (Image_Database(i).valid==1)
5. return i
6. end if
7. end for
8. end procedure
21
22
MAPPING DATA FROM A FILE TO IMAGE
It does the actual steganographic operation by storing data into
images.
Algorithm 5: MdfImg (Image_Database [Image_Index])
1. procedure
2. Read Image_Database [Image_Index];
3. Compute Pixel Count for Image_Database[Image_Index];
4. Open FN
5. while (Read Characters until EOF)
6. do if (Pixel Count < B Count) …
7. Last bit of each consecutive pixels of the
Image_Database[Image_Index] is replaced by Store each character.
8. else
9. Load Image_Index1=ImageSearch(Image_Database)
10. Image_Database[Image_Index1].valid=Image_Index1
11. Image_Database [Image_Index1].valid=0
12. end if
13. end while
14. end procedure
23Algorithm 5: MdfImg (Image_Database [Image_Index]) (CNTD)
RETRIEVING DATA FROM IMAGE
The following algorithm retrieves the data from the images
which is kept in cloud storage.
Algorithm 6: RetrieveData ()
1. procedure
2. Read File_Database;
3. for F_Database (i), i=1 to m
4. do if (F exits)
5. I=Holds the address of image.
6. end if
7. end for
8. Open Image_Database;
9. Read Image_Database [I];
10. Open a F Temp and a F Freq
24
11. while (Until we get 11111111 in Image_Database [I])
12. do Read 4 bits at a time from 4 consecutive pixels
13. Convert them into decimal form.
14. sum =sum + 4
15. if ( decimal number is within 0 to 9 )
16. Write that digit in F Freq
17. else
18. Write new line character in F Freq
19. end if
20. end while
21. sum= sum - BCount
22. Call Huffman-Tree( ) based on the frequency counts
present in FFreq and create the HuffmanTree.
25
23. while ( sum <= BCount ) do
24. read bits from Image_Database [I]
25. Start traversing the Huffman-Tree from root.
26. When we reach leaf node, we will get character.
27. Append that character in FTemp .
28. Increment sum number of times we collect bits
from Image_Database [I]
29. end while
30. Show F Temp to the user, after user closes the file
FTemp, delete the file FTemp from system.
31. end procedure
26
CONSTRUCTION OF HUFFMAN TREE
 A priority queue, Q, is used to generate Huffman Tree with levels
(frequency) as key.
Algorithm 7a: Huffman-Tree (X)
1. procedure
2. FN=|X|
3. Q=X
4. for i=1 to N-1
5. do
6. Z=Allocate_node( )
7. Z.left=Extract_min(Q)
8. Z.right=Extract_min(Q)
9. Frequency(Z)=Frequency(Z.left)+Frequency(Z.right)
10. Insert(Q,Z)
11. end for
12. end procedure
27
Algorithm 7b: Allocate_node()
1. Procedure
2. Create a node for storing characters and their
frequency from available free memory space.
3. Return the allocated node.
4. End procedure
Algorithm 7c: Extract_min(Q)
1. procedure
2. Remove and return the character with minimum
frequency from the priority queue Q.
3. end procedure
28
29
Algorithm 7d: Insert(Q,Z)
1. procedure
2. Insert the node Z in the priority queue Q
3. end procedure
Security Analysis and Performance
Evaluation
Huffman coding is a variable length coding scheme.
The frequency of each character is stored in some chronological order.
Variable length encoding does not help the attacker to recognize the
characters.
Decoding of bits can only be done by the Huffman tree only.
The frequency file contains only frequency.
Change in chronological order results difficulty of tracking characters.
Ultimately we are having a secured system.
30
•SECURITY STRENGTH AGAINST CSP-1
CSP-1 only stores some files.
CSP-1 does not contain the retrieving algorithm, thus
the images containing data are purely safe.
31
•SECURITY STRENGTH AGAINST CSP-2
Retrieving and hiding mechanism are stored in CSP-2.
Knowing only the algorithm will not help the attacker.
•SECURITY STRENGTH AGAINST CSP-3
CSP-3 is responsible for computation.
All files will be deleted after the above operations.
CONCLUSION
We applied steganographic approach to ensure data storage
security in cloud computing using Huffman Coding (SAHC).
Through detailed security and performance analysis this
approach gives high security of data when it is on rest in the data
center of any Cloud Service Provider (CSP).
This proposed architecture will be able to provide customer
satisfaction to a great level and it will attract more clients in the
field of cloud computing for industrial as well as future research
firms.
32
REFERENCES
[1] Peter Mell, Timothy Grance, “The NIST Definatin of Cloud Computing”, Jan,
2011.http://docs. ismgcorp.com/files/external/Draft-SP-800-145_clouddefinition.pdf.
[2] Amazon.com, “Amazon Web Services (AWS)”, Online at hppt://aws.amazon.com,
2008.
[3] Con Wang, Qian Wang, Kui Ren, and Wenjng Lou,“Ensuring Data Storage Security
in CloudComputing”,17th International workshop on Quality of service, USA, pp1-9,
2009, IBSN:978-42443875-4.
[4] Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, and Clifford Stein.
Introduction to Algorithms,Third Edition, Prentice Hall of India, 2010.
[5] B.P Rimal, Choi Eunmi,I.Lumb, “A Taxonomy and Survey of Cloud Computing
Sytem”, Intl. Joint Conference on INC, IMS and IDC, 2009,pp.44-51, Seoul,Aug, 2009.
DOI : 10.1109/NCM.2009.218.
33
34

More Related Content

What's hot

Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan Holt
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMustaq Syed
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
Manasa Chowdary
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kayalvizhi Selvaraj
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
Nagamalleswararao Tadikonda
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computingRauf Wani
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Nexgen Technology
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 

What's hot (20)

Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Paper1
Paper1Paper1
Paper1
 

Viewers also liked

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
Martin Bioh
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Tech and Law Center
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Yogi Dadhich
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forces
commandersaini
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
Uday Wankar
 
Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail
Mithi SkyConnect
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
Anchises Moraes
 
Telenor
TelenorTelenor
Telenor
Waseem Ahmed
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
Mithi SkyConnect
 
Migrating To Cloud &amp; Security @ FOBE 2011
Migrating To Cloud &amp; Security @ FOBE 2011Migrating To Cloud &amp; Security @ FOBE 2011
Migrating To Cloud &amp; Security @ FOBE 2011
commandersaini
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Amex Ka
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Rohith Shankar
 
4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets
Mithi SkyConnect
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
Mithi SkyConnect
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
Sonali Jain
 
Cloud computing
Cloud computingCloud computing
Cloud computing
gk28
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
priyas211420
 
Assignment of trademarks
Assignment of trademarksAssignment of trademarks
Assignment of trademarksAltacit Global
 

Viewers also liked (20)

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
CS III.1 T. Jorgensen
CS III.1   T. JorgensenCS III.1   T. Jorgensen
CS III.1 T. Jorgensen
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forces
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
 
Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
Telenor
TelenorTelenor
Telenor
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
 
Migrating To Cloud &amp; Security @ FOBE 2011
Migrating To Cloud &amp; Security @ FOBE 2011Migrating To Cloud &amp; Security @ FOBE 2011
Migrating To Cloud &amp; Security @ FOBE 2011
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
 
Assignment of trademarks
Assignment of trademarksAssignment of trademarks
Assignment of trademarks
 

Similar to data storage security technique for cloud computing

Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
Hemanth
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
IOSR Journals
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET Journal
 
1st review android malware.pptx
1st review  android malware.pptx1st review  android malware.pptx
1st review android malware.pptx
Nambiraju
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
H43064650
H43064650H43064650
H43064650
IJERA Editor
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
IJAEMSJORNAL
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
IJRAT
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
Securing Image Transmission Using in- Compression Encryption Technique
Securing Image Transmission Using in- Compression Encryption TechniqueSecuring Image Transmission Using in- Compression Encryption Technique
Securing Image Transmission Using in- Compression Encryption Technique
CSCJournals
 
Performance Evaluation of Message Security Using Fractal Sieve with MMD
Performance Evaluation of Message Security Using Fractal Sieve with MMDPerformance Evaluation of Message Security Using Fractal Sieve with MMD
Performance Evaluation of Message Security Using Fractal Sieve with MMD
ijsptm
 
Y4301127131
Y4301127131Y4301127131
Y4301127131
IJERA Editor
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
IOSR Journals
 
Thilaganga mphil cs viva presentation ppt
Thilaganga mphil cs viva presentation pptThilaganga mphil cs viva presentation ppt
Thilaganga mphil cs viva presentation ppt
thilaganga
 

Similar to data storage security technique for cloud computing (20)

Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
 
1st review android malware.pptx
1st review  android malware.pptx1st review  android malware.pptx
1st review android malware.pptx
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
H43064650
H43064650H43064650
H43064650
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Securing Image Transmission Using in- Compression Encryption Technique
Securing Image Transmission Using in- Compression Encryption TechniqueSecuring Image Transmission Using in- Compression Encryption Technique
Securing Image Transmission Using in- Compression Encryption Technique
 
Performance Evaluation of Message Security Using Fractal Sieve with MMD
Performance Evaluation of Message Security Using Fractal Sieve with MMDPerformance Evaluation of Message Security Using Fractal Sieve with MMD
Performance Evaluation of Message Security Using Fractal Sieve with MMD
 
Y4301127131
Y4301127131Y4301127131
Y4301127131
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Thilaganga mphil cs viva presentation ppt
Thilaganga mphil cs viva presentation pptThilaganga mphil cs viva presentation ppt
Thilaganga mphil cs viva presentation ppt
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

data storage security technique for cloud computing

  • 1. STEGANOGRAPHIC APPROACH TO ENSURE DATA STORAGE SECURITY IN CLOUD COMPUTING USING HUFFMAN CODING 1 CREATED BY: HASIMSHAH . R . S
  • 2. CONTENTS 1.INTRODUCTION 2.RELATED WORK 3.DESIGN OF THE SYSTEM 4.ALGORITHMS USED IN THE SYSTEM 5.SECURITY ANALYSIS AND PERFOMANCE EVALUATION 6.CONCLUSION 7.REFERENCES 2
  • 4.  The cloud computing model allows access to information and computer resources from anywhere that a network connection is available. Cloud computing provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications. Cloud computing is a practical approach to experience direct cost benefits and it has the potential to transform a data center from a capital-intensive set up to a variable priced environment. The idea of cloud computing is based on a very fundamental principal of „reusability of IT capabilities'. 4
  • 5. INTRODUCTION(CNTD) 5 Data security Can’t implement Traditional cryptographic technology . Cloud - not a third-party warehouse. Data stored in multiple physical locations in random manner Steganographic Approach Using Huffman Coding  ensures explicit dynamic data support security of data when these data are in the cloud storage.
  • 6. INTRODUCTION(CONT) The Huffman Tree constructs an optimal prefix code called a Huffman code. Let’s say, there are six characters A,B,C,D,E and F as shown in Fig a . 6
  • 7. INTRODUCTION(CONT) 7 Now for a given code 0 100 100 1101 we can decode them to get back the original code by traversing the Huffman tree.
  • 8. CLOUD COMPUTING ARCHITECTURE AND SECURITY ISSUES DEPLOYMENT MODELS Private cloud Community cloud Public cloud Hybrid cloud SERVICE DELIVERY MODELS Software as a Service(SaaS) Platform as a Service(PaaS) Infrastructure as a Srevice(IaaS) 8 INTRODUCTION(CONT)
  • 9. SECURITY ISSUES 9 Phishing data loss  botnet (Collection of machines are running remotely). botnet - offers more reliable infrastructure at a relatively low price for attack. INTRODUCTION(CONT)
  • 10. Problem statement : Main problem - loss of control of data stored in the cloud. 10 Schematic System Architecture for Cloud INTRODUCTION(CONT)
  • 11. RELATED WORK cong wang et al.use homomorphic token with distributed verification of erasure-coded data. but it is failed to achieve public verifiability and storage correctness. shantanu pal et al. ensures to find location of adversary or the attacking party from its target. it may try to attack them, if adversary knows the location of the other vms. this may harm the other vms in between. ateniese et al.proposed the “provable data possession” (pdp) model to ensure possession of file in untrusted storages. This scheme used public key based homomorphic tags to audit the data file and it is providing public verifiability. 11
  • 12. DESIGN OF THE SYSTEM Storing data into some images. - steganography . 12 Processes to store or retrieve their data :
  • 13. 13 Computational model to Store Data Computational model to Retrieve Data
  • 14. Human Visual System(HVS) has very low sensitivity. Variable length encoding doesn’t help attacker to recognize characters. He/she has no idea about frequency of characters. Can’t generate Huffman code. Ultimately we are having a secured system 14
  • 15. Image database •Images stored in CSP-1 •Set of images sent to CSP-3 - user wants to store data in cloud File database •File holds the address of images Embedded data into Images •Counts total no. of characters •Finds frequency of each characters by Huffman code •Applies Steganography to both frequency of characters & codified data. 15
  • 16. ALGORITHMS USED IN THE SYSTEM ALGORITHM 1 : HF-codification() 1. procedure 2. Read file FText which is to be saved in Cloud 3. Compute CN from FText 4. Find the frequency of occurrences of each characters in Ftext and store them in some chronological order 5. Store frequency in a new file FFreq . 6. FN = Freq-Codification( ) 16
  • 17. 17 7. Call Huffman-Tree() 8. Create a file FCode 9. Open FN. Reach EOF of FN where the original characters of FText will be replaced by the Huffman codes present in FCode . 10. Calculate the total Bit BCount in FN. 11. Delete FText, F Freq and F Code. 12. Call Steganography() to perform steganography on FN 13. end procedure
  • 18. FILE CODIFICATION frequency file is read digit by digit & each digit is codified into 4- bit binary pattern Algorithm 2: Freq-Codification () 1. procedure 2. Open FFreq and a new File FN. 3. while ( Read characters from F Freq until EOF ) 4. do if (character is a new line character) 5. Append 1111 at the end of FN. 6. else 18
  • 19. 19 7. Convert the digit to its 4-bit binary form. 8. Append those 4-bits at the end of FN. 9. end if 10. end while 11. Append 11111111 at the end of FN. 12. Return FN 13. end procedure Algorithm 2: Freq-Codification () (CNTD…)
  • 20. Hiding Data within Images Steganography Deals the pre-requisite requirements like : load image, store file name, image index finally call the MdfImg operation which will map data from file to images. ALGORITHM 3: STEGANOGRAPHY() 1. procedure 2. Load Image_Index = ImageSearch (Image_Database) 3. Store (FName, BCount, Image_Index) 4. MdfImg (Image_Database [Image_Index]); 5. end procedure. 20
  • 21. SEARCHING OF VALID IMAGE The algorithm searches an image which we can be used to store the data. It returns the address of a valid image if it is available in image database. ALGORITHM 4: IMAGESEARCH(IMAGE_DATABASE) 1. procedure 2. Open Image_Database; 3. for Image_Database(i), i<-1, n do 4. if (Image_Database(i).valid==1) 5. return i 6. end if 7. end for 8. end procedure 21
  • 22. 22 MAPPING DATA FROM A FILE TO IMAGE It does the actual steganographic operation by storing data into images. Algorithm 5: MdfImg (Image_Database [Image_Index]) 1. procedure 2. Read Image_Database [Image_Index]; 3. Compute Pixel Count for Image_Database[Image_Index]; 4. Open FN 5. while (Read Characters until EOF) 6. do if (Pixel Count < B Count) …
  • 23. 7. Last bit of each consecutive pixels of the Image_Database[Image_Index] is replaced by Store each character. 8. else 9. Load Image_Index1=ImageSearch(Image_Database) 10. Image_Database[Image_Index1].valid=Image_Index1 11. Image_Database [Image_Index1].valid=0 12. end if 13. end while 14. end procedure 23Algorithm 5: MdfImg (Image_Database [Image_Index]) (CNTD)
  • 24. RETRIEVING DATA FROM IMAGE The following algorithm retrieves the data from the images which is kept in cloud storage. Algorithm 6: RetrieveData () 1. procedure 2. Read File_Database; 3. for F_Database (i), i=1 to m 4. do if (F exits) 5. I=Holds the address of image. 6. end if 7. end for 8. Open Image_Database; 9. Read Image_Database [I]; 10. Open a F Temp and a F Freq 24
  • 25. 11. while (Until we get 11111111 in Image_Database [I]) 12. do Read 4 bits at a time from 4 consecutive pixels 13. Convert them into decimal form. 14. sum =sum + 4 15. if ( decimal number is within 0 to 9 ) 16. Write that digit in F Freq 17. else 18. Write new line character in F Freq 19. end if 20. end while 21. sum= sum - BCount 22. Call Huffman-Tree( ) based on the frequency counts present in FFreq and create the HuffmanTree. 25
  • 26. 23. while ( sum <= BCount ) do 24. read bits from Image_Database [I] 25. Start traversing the Huffman-Tree from root. 26. When we reach leaf node, we will get character. 27. Append that character in FTemp . 28. Increment sum number of times we collect bits from Image_Database [I] 29. end while 30. Show F Temp to the user, after user closes the file FTemp, delete the file FTemp from system. 31. end procedure 26
  • 27. CONSTRUCTION OF HUFFMAN TREE  A priority queue, Q, is used to generate Huffman Tree with levels (frequency) as key. Algorithm 7a: Huffman-Tree (X) 1. procedure 2. FN=|X| 3. Q=X 4. for i=1 to N-1 5. do 6. Z=Allocate_node( ) 7. Z.left=Extract_min(Q) 8. Z.right=Extract_min(Q) 9. Frequency(Z)=Frequency(Z.left)+Frequency(Z.right) 10. Insert(Q,Z) 11. end for 12. end procedure 27
  • 28. Algorithm 7b: Allocate_node() 1. Procedure 2. Create a node for storing characters and their frequency from available free memory space. 3. Return the allocated node. 4. End procedure Algorithm 7c: Extract_min(Q) 1. procedure 2. Remove and return the character with minimum frequency from the priority queue Q. 3. end procedure 28
  • 29. 29 Algorithm 7d: Insert(Q,Z) 1. procedure 2. Insert the node Z in the priority queue Q 3. end procedure
  • 30. Security Analysis and Performance Evaluation Huffman coding is a variable length coding scheme. The frequency of each character is stored in some chronological order. Variable length encoding does not help the attacker to recognize the characters. Decoding of bits can only be done by the Huffman tree only. The frequency file contains only frequency. Change in chronological order results difficulty of tracking characters. Ultimately we are having a secured system. 30
  • 31. •SECURITY STRENGTH AGAINST CSP-1 CSP-1 only stores some files. CSP-1 does not contain the retrieving algorithm, thus the images containing data are purely safe. 31 •SECURITY STRENGTH AGAINST CSP-2 Retrieving and hiding mechanism are stored in CSP-2. Knowing only the algorithm will not help the attacker. •SECURITY STRENGTH AGAINST CSP-3 CSP-3 is responsible for computation. All files will be deleted after the above operations.
  • 32. CONCLUSION We applied steganographic approach to ensure data storage security in cloud computing using Huffman Coding (SAHC). Through detailed security and performance analysis this approach gives high security of data when it is on rest in the data center of any Cloud Service Provider (CSP). This proposed architecture will be able to provide customer satisfaction to a great level and it will attract more clients in the field of cloud computing for industrial as well as future research firms. 32
  • 33. REFERENCES [1] Peter Mell, Timothy Grance, “The NIST Definatin of Cloud Computing”, Jan, 2011.http://docs. ismgcorp.com/files/external/Draft-SP-800-145_clouddefinition.pdf. [2] Amazon.com, “Amazon Web Services (AWS)”, Online at hppt://aws.amazon.com, 2008. [3] Con Wang, Qian Wang, Kui Ren, and Wenjng Lou,“Ensuring Data Storage Security in CloudComputing”,17th International workshop on Quality of service, USA, pp1-9, 2009, IBSN:978-42443875-4. [4] Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, and Clifford Stein. Introduction to Algorithms,Third Edition, Prentice Hall of India, 2010. [5] B.P Rimal, Choi Eunmi,I.Lumb, “A Taxonomy and Survey of Cloud Computing Sytem”, Intl. Joint Conference on INC, IMS and IDC, 2009,pp.44-51, Seoul,Aug, 2009. DOI : 10.1109/NCM.2009.218. 33
  • 34. 34