2016
DOI: 10.4236/jis.2016.74020
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Mobile Cloud Computing Security Using Steganography

Abstract: Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Both the private cloud for software as a service model (SaaS) [6] and the three-step data security model based on cryptography and steganography [7] do not facilitate data backups before the data is transmitted. Therefore, there is a need to introduce and develop a data security model with an added security layer to back up the data and employ steganography alongside the encryption algorithms used in cloud computing to improve the data's security and privacy [21].…”
Section: Research Problemmentioning
confidence: 99%
See 3 more Smart Citations
“…Both the private cloud for software as a service model (SaaS) [6] and the three-step data security model based on cryptography and steganography [7] do not facilitate data backups before the data is transmitted. Therefore, there is a need to introduce and develop a data security model with an added security layer to back up the data and employ steganography alongside the encryption algorithms used in cloud computing to improve the data's security and privacy [21].…”
Section: Research Problemmentioning
confidence: 99%
“…The requirement for the security model to offer the capability for backing up data is adapted from the security model to enhance mobile cloud computing security using steganography [21]. The authors of the model that works with a key embedded in the image and the data to provide an additional security layer for data confidentiality argue that the users are responsible for downloading and/or uploading information from or to the cloud and creating backup files [21]. We conducted more research on disaster recovery techniques in cloud computing [30] and cloud-based disaster recovery and planning models [31].…”
mentioning
confidence: 99%
See 2 more Smart Citations