Title :
Combining encryption and stego - Object processing: A new direction in cloud security
Author :
Kaul, Aishwarya ; Tuli, Sheoli ; Jain, Rachna
Author_Institution :
Dept. of Comput. Sci. & Eng., GGSIP Univ., New Delhi, India
Abstract :
Cloud computing is a recently developed technology for complex systems which provide mass-scale services, shared and used by numerous users. Therefore authentication of both the user and service provider is necessary for security in cloud computing. After reviewing the ancient methods of secure messaging and current methods of secure transmission of messages in a cloud network we have tried to develop a new model that combines encryption, image and audio processing so as to make a more secure model of transmission of messages and keys from one person to another in a cloud system/network. We suggest a new scheme of combining the Shamir´s algorithm for encryption of keys and Twofish algorithm for encryption of messages, using images as cover objects for messages and audio processing for sending private/public keys and how this can prove to be more secure as compared to the existing methods.
Keywords :
audio signal processing; cloud computing; image processing; private key cryptography; public key cryptography; steganography; Shamir algorithm; Twofish algorithm; audio processing; cloud computing; cloud security; encryption; image processing; mass-scale services; private-public keys; secure messages transmission; secure messaging; stego-object processing; Abstracts; Cryptography; Heating; Image processing; Tutorials; Cloud Computing; Shamir´s algorithm; Stego-Object; Twofish algorithm;
Conference_Titel :
IT in Business, Industry and Government (CSIBIG), 2014 Conference on
Print_ISBN :
978-1-4799-3063-0
DOI :
10.1109/CSIBIG.2014.7056954