Abstract | ||
---|---|---|
In recent years, cloud computing services have become a must in our daily lives. Although well-known security technologies are used for system protection and data protection, the security of existing service systems is far from enough. The main problem is that existing systems and/or programs usually have some unknown issues or vulnerabilities, and can be attacked by some unauthorized persons in some unexpected ways. To solve the problem, at least partially, we have proposed a new steganography protocol for improving information security in cloud storage services. The key point in this protocol is to synthesize an image that can be used as the encryption/decryption key, the stego-key, as well as the cover data. Initial analysis shows that the new protocol is very secure. This paper formulates the protocol in a more formal way, so that based on the formulation, we can find possible weak points more easily, and make the protocol more practically useful. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/INDCOMP.2014.7011748 | Independent Computing |
Keywords | DocType | Citations |
cloud computing,cryptographic protocols,steganography,storage management,cloud computing services,cloud storage services,cover data,encryption-decryption key,information security,steganography protocol,stego-key | Conference | 0 |
PageRank | References | Authors |
0.34 | 5 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kazuki Murakami | 1 | 0 | 0.34 |
Qiangfu Zhao | 2 | 214 | 62.36 |
Ryota Hanyu | 3 | 0 | 0.34 |