2013
DOI: 10.1007/s10559-013-9544-x
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing in cryptography and steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…The modules of steganography security are different for cloud system and general systems, especially in distributed computing. The main feature of the steganography model is that it is possible to make the model work under various sites of the distributed system [8]. For cloud computing, the attacks on steganography operation relate to side channel attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The modules of steganography security are different for cloud system and general systems, especially in distributed computing. The main feature of the steganography model is that it is possible to make the model work under various sites of the distributed system [8]. For cloud computing, the attacks on steganography operation relate to side channel attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Due to advancement of communication technologies, exponential number of users are connecting to the cloud servers through light weight resource constrained devices like mobile phone, tab etc. As discussed in [1], the presence of powerful and resourceful machines as cloud servers and a set of resource constrained devices like mobiles, tab etc as terminal devices makes the cloud computing system as asymmetric computing and demands for light-weight cryptography which provides strong security features and minimized processing needs at the terminal side operations.…”
Section: Introductionmentioning
confidence: 99%
“…Many researchers [13][14][15][16]19] have analyzed that cryptographic and steganographic operations requires huge computational resources and best suitable for resource full server side. In Nimmy et al [9] scheme the resource constrained client side devices are overloaded with huge cryptographic and steganographic operations which makes the scheme impossible to adopt to cloud scenario [1]. As a part of our contribution, we will propose an improved mutual authentication scheme which is light weight on both client and server sides, and resistant to all major cryptographic attacks.…”
Section: Introductionmentioning
confidence: 99%