Stenographic approach to ensure data storage security in cloud computing using Huffman coding. The system embeds data into images using steganography after encoding the data and frequency of characters using Huffman coding. This is done to provide security when storing data in the cloud. The encoding and embedding processes ensure the data is not readable without the decoding algorithm and Huffman tree, providing protection from unauthorized access.
This is my presentation which gives security for the data to be stored in cloud storage. The security is obtained through Cryptography (encryption and decryption) and the tools used in this paper is DOT NET and Gladinet.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
This is my presentation which gives security for the data to be stored in cloud storage. The security is obtained through Cryptography (encryption and decryption) and the tools used in this paper is DOT NET and Gladinet.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
Introducing TPA(Third Party Auditor) to the cloud.It sends the information about the data stored in the cloud.It informs the user when any unauthorized user tries to steal his data from the cloud.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. Mail to: kitechsolutions.in@gmail.com
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
Privacy preserving public auditing for regenerating-code-based cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMNexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
Introducing TPA(Third Party Auditor) to the cloud.It sends the information about the data stored in the cloud.It informs the user when any unauthorized user tries to steal his data from the cloud.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. Mail to: kitechsolutions.in@gmail.com
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
Privacy preserving public auditing for regenerating-code-based cloud storage
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMNexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Ensuring data storage security in cloud computingUday Wankar
Cloud computing has been envisioned as the next-generation architecture of IT enterprise.
In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy.
Moving data into the cloud offers great convenience to users since they don’t have to care about the complexities of direct hardware management.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
Securing Image Transmission Using in- Compression Encryption TechniqueCSCJournals
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, an Optimized Multiple Huffman Tables (OMHT) technique is proposed to face some compression and security problems found in Multiple Huffman Tables (MHT) technique. OMHT depends on using statistical-model-based compression method to generate different tables from the same data type of images or videos to be encrypted leading to increase compression efficiency and security of the used tables. A systematic study on how to strategically integrate different atomic operations to build a multimedia encryption system is presented. The resulting system can provide superior performance over both generic encryption and its simple adaptation to multimedia in terms of a joint consideration of security, bitrate overhead. The effectiveness of this scheme is verified through a series of experiments, and the robustness of our approach is demonstrated by comparing it against a standard compression technique, JPEG.
Performance Evaluation of Message Security Using Fractal Sieve with MMDijsptm
In this paper we measure the performance of proposed approach, message security using Fractal Sieve with Modified Message Digest with respect to response time and time complexity. In this method the authentication of the message is protected by the hash function MMD. The response time of the algorithm is implemented in java is calculated with user load and the different sizes of the data files. The results are compared with the performance measurements of Priya Dhawan and Aamer Nadeem and found to be efficient.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
4. The cloud computing model allows access to information
and computer resources from anywhere that a network
connection is available. Cloud computing provides a shared
pool of resources, including data storage space, networks,
computer processing power, and specialized corporate and
user applications.
Cloud computing is a practical approach to experience
direct cost benefits and it has the potential to transform a
data center from a capital-intensive set up to a variable
priced environment. The idea of cloud computing is based on
a very fundamental principal of „reusability of IT capabilities'.
4
5. INTRODUCTION(CNTD)
5
Data security
Can’t implement Traditional cryptographic technology .
Cloud - not a third-party warehouse.
Data stored in multiple physical locations in random
manner
Steganographic Approach Using Huffman Coding
ensures explicit dynamic data support
security of data when these data are in the cloud storage.
6. INTRODUCTION(CONT)
The Huffman Tree constructs an optimal prefix code called
a Huffman code.
Let’s say, there are six characters A,B,C,D,E and F as shown
in Fig a .
6
7. INTRODUCTION(CONT) 7
Now for a given code 0 100 100 1101 we can decode them
to get back the original code by traversing the Huffman tree.
8. CLOUD COMPUTING ARCHITECTURE AND
SECURITY ISSUES
DEPLOYMENT MODELS
Private cloud
Community cloud
Public cloud
Hybrid cloud
SERVICE DELIVERY MODELS
Software as a Service(SaaS)
Platform as a Service(PaaS)
Infrastructure as a Srevice(IaaS)
8
INTRODUCTION(CONT)
9. SECURITY ISSUES
9
Phishing
data loss
botnet (Collection of machines are running remotely).
botnet - offers more reliable infrastructure at a relatively low price
for attack.
INTRODUCTION(CONT)
10. Problem statement :
Main problem - loss of control of data stored in the
cloud.
10
Schematic System Architecture for Cloud
INTRODUCTION(CONT)
11. RELATED WORK
cong wang et al.use homomorphic token with distributed
verification of erasure-coded data.
but it is failed to achieve public verifiability and storage correctness.
shantanu pal et al. ensures to find location of adversary or the
attacking party from its target.
it may try to attack them, if adversary knows the location of the other vms.
this may harm the other vms in between.
ateniese et al.proposed the “provable data possession” (pdp)
model to ensure possession of file in untrusted storages.
This scheme used public key based homomorphic tags to audit the data file
and it is providing public verifiability.
11
12. DESIGN OF THE SYSTEM
Storing data into some images. - steganography .
12
Processes to store or retrieve their data :
14. Human Visual System(HVS) has very low sensitivity.
Variable length encoding doesn’t help attacker to recognize
characters.
He/she has no idea about frequency of characters.
Can’t generate Huffman code.
Ultimately we are having a secured system
14
15. Image database
•Images stored in CSP-1
•Set of images sent to CSP-3 - user wants to store data in cloud
File database
•File holds the address of images
Embedded data into Images
•Counts total no. of characters
•Finds frequency of each characters by Huffman code
•Applies Steganography to both frequency of characters & codified
data.
15
16. ALGORITHMS USED IN THE SYSTEM
ALGORITHM 1 : HF-codification()
1. procedure
2. Read file FText which is to be saved in Cloud
3. Compute CN from FText
4. Find the frequency of occurrences of each characters in
Ftext and store them in some chronological order
5. Store frequency in a new file FFreq .
6. FN = Freq-Codification( )
16
17. 17
7. Call Huffman-Tree()
8. Create a file FCode
9. Open FN. Reach EOF of FN where the original
characters of FText will be replaced by the Huffman
codes present in FCode .
10. Calculate the total Bit BCount in FN.
11. Delete FText, F Freq and F Code.
12. Call Steganography() to perform steganography on FN
13. end procedure
18. FILE CODIFICATION
frequency file is read digit by digit & each digit is codified into 4-
bit binary pattern
Algorithm 2: Freq-Codification ()
1. procedure
2. Open FFreq and a new File FN.
3. while ( Read characters from F Freq until EOF )
4. do if (character is a new line character)
5. Append 1111 at the end of FN.
6. else
18
19. 19
7. Convert the digit to its 4-bit binary form.
8. Append those 4-bits at the end of FN.
9. end if
10. end while
11. Append 11111111 at the end of FN.
12. Return FN
13. end procedure
Algorithm 2: Freq-Codification () (CNTD…)
20. Hiding Data within Images Steganography
Deals the pre-requisite requirements like :
load image, store file name, image index
finally call the MdfImg operation which will map data from file to images.
ALGORITHM 3: STEGANOGRAPHY()
1. procedure
2. Load Image_Index = ImageSearch (Image_Database)
3. Store (FName, BCount, Image_Index)
4. MdfImg (Image_Database [Image_Index]);
5. end procedure.
20
21. SEARCHING OF VALID IMAGE
The algorithm searches an image which we can be used to store the
data. It returns the address of a valid image if it is available in image
database.
ALGORITHM 4: IMAGESEARCH(IMAGE_DATABASE)
1. procedure
2. Open Image_Database;
3. for Image_Database(i), i<-1, n do
4. if (Image_Database(i).valid==1)
5. return i
6. end if
7. end for
8. end procedure
21
22. 22
MAPPING DATA FROM A FILE TO IMAGE
It does the actual steganographic operation by storing data into
images.
Algorithm 5: MdfImg (Image_Database [Image_Index])
1. procedure
2. Read Image_Database [Image_Index];
3. Compute Pixel Count for Image_Database[Image_Index];
4. Open FN
5. while (Read Characters until EOF)
6. do if (Pixel Count < B Count) …
23. 7. Last bit of each consecutive pixels of the
Image_Database[Image_Index] is replaced by Store each character.
8. else
9. Load Image_Index1=ImageSearch(Image_Database)
10. Image_Database[Image_Index1].valid=Image_Index1
11. Image_Database [Image_Index1].valid=0
12. end if
13. end while
14. end procedure
23Algorithm 5: MdfImg (Image_Database [Image_Index]) (CNTD)
24. RETRIEVING DATA FROM IMAGE
The following algorithm retrieves the data from the images
which is kept in cloud storage.
Algorithm 6: RetrieveData ()
1. procedure
2. Read File_Database;
3. for F_Database (i), i=1 to m
4. do if (F exits)
5. I=Holds the address of image.
6. end if
7. end for
8. Open Image_Database;
9. Read Image_Database [I];
10. Open a F Temp and a F Freq
24
25. 11. while (Until we get 11111111 in Image_Database [I])
12. do Read 4 bits at a time from 4 consecutive pixels
13. Convert them into decimal form.
14. sum =sum + 4
15. if ( decimal number is within 0 to 9 )
16. Write that digit in F Freq
17. else
18. Write new line character in F Freq
19. end if
20. end while
21. sum= sum - BCount
22. Call Huffman-Tree( ) based on the frequency counts
present in FFreq and create the HuffmanTree.
25
26. 23. while ( sum <= BCount ) do
24. read bits from Image_Database [I]
25. Start traversing the Huffman-Tree from root.
26. When we reach leaf node, we will get character.
27. Append that character in FTemp .
28. Increment sum number of times we collect bits
from Image_Database [I]
29. end while
30. Show F Temp to the user, after user closes the file
FTemp, delete the file FTemp from system.
31. end procedure
26
27. CONSTRUCTION OF HUFFMAN TREE
A priority queue, Q, is used to generate Huffman Tree with levels
(frequency) as key.
Algorithm 7a: Huffman-Tree (X)
1. procedure
2. FN=|X|
3. Q=X
4. for i=1 to N-1
5. do
6. Z=Allocate_node( )
7. Z.left=Extract_min(Q)
8. Z.right=Extract_min(Q)
9. Frequency(Z)=Frequency(Z.left)+Frequency(Z.right)
10. Insert(Q,Z)
11. end for
12. end procedure
27
28. Algorithm 7b: Allocate_node()
1. Procedure
2. Create a node for storing characters and their
frequency from available free memory space.
3. Return the allocated node.
4. End procedure
Algorithm 7c: Extract_min(Q)
1. procedure
2. Remove and return the character with minimum
frequency from the priority queue Q.
3. end procedure
28
30. Security Analysis and Performance
Evaluation
Huffman coding is a variable length coding scheme.
The frequency of each character is stored in some chronological order.
Variable length encoding does not help the attacker to recognize the
characters.
Decoding of bits can only be done by the Huffman tree only.
The frequency file contains only frequency.
Change in chronological order results difficulty of tracking characters.
Ultimately we are having a secured system.
30
31. •SECURITY STRENGTH AGAINST CSP-1
CSP-1 only stores some files.
CSP-1 does not contain the retrieving algorithm, thus
the images containing data are purely safe.
31
•SECURITY STRENGTH AGAINST CSP-2
Retrieving and hiding mechanism are stored in CSP-2.
Knowing only the algorithm will not help the attacker.
•SECURITY STRENGTH AGAINST CSP-3
CSP-3 is responsible for computation.
All files will be deleted after the above operations.
32. CONCLUSION
We applied steganographic approach to ensure data storage
security in cloud computing using Huffman Coding (SAHC).
Through detailed security and performance analysis this
approach gives high security of data when it is on rest in the data
center of any Cloud Service Provider (CSP).
This proposed architecture will be able to provide customer
satisfaction to a great level and it will attract more clients in the
field of cloud computing for industrial as well as future research
firms.
32
33. REFERENCES
[1] Peter Mell, Timothy Grance, “The NIST Definatin of Cloud Computing”, Jan,
2011.http://docs. ismgcorp.com/files/external/Draft-SP-800-145_clouddefinition.pdf.
[2] Amazon.com, “Amazon Web Services (AWS)”, Online at hppt://aws.amazon.com,
2008.
[3] Con Wang, Qian Wang, Kui Ren, and Wenjng Lou,“Ensuring Data Storage Security
in CloudComputing”,17th International workshop on Quality of service, USA, pp1-9,
2009, IBSN:978-42443875-4.
[4] Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, and Clifford Stein.
Introduction to Algorithms,Third Edition, Prentice Hall of India, 2010.
[5] B.P Rimal, Choi Eunmi,I.Lumb, “A Taxonomy and Survey of Cloud Computing
Sytem”, Intl. Joint Conference on INC, IMS and IDC, 2009,pp.44-51, Seoul,Aug, 2009.
DOI : 10.1109/NCM.2009.218.
33