Classical steganography is designed to hide data by cover media. Recent approaches fragmented the data and hide them in a distributed manner by embedding each fragmented data into a distinct cover media. This approach makes a secret message extremely difficult for an attacker to detect. However, cover media modification leaves fingerprints that could expose a secret channel to an attacker. To overcome the problem, a novel steganography concept designed by two technical contributions. I). cover media does not undergo any modification, i.e., the cover media act as a pointer to fragmented data. II). A secret message is stored in the multi-cloud storage environment. The approach claimed that it is computationally infeasible for an attacker to detect and extract the hidden message despite of having fully access to the accounts of the different clouds. In this paper, we analysed the security strength of the novel steganography concept and concluded that, attacker can get the secret value stored in multi-cloud storage environment using the brute force attacks more diminutive than exponential computations.
The tremendous development in mobile technology attracts users’ attention. Thus, the users are shifting from traditional computational devices to smartphones and tablets, and because of that, mobile devices have anticipated most of the global IP traffic. However, mobile device’s resource-constrained behaviour cannot handle the heavy computational load. Mobile cloud computing (MCC) mitigates resource-constrained issues by enabling computing resources with minimal effort. However, providing security in MCC is an obstacle due to users’ uncertain and dynamic behaviour and the explosion of online computerized data. Providing security, confidentiality, and authentication is not enough in MCC; therefore, the users need authorization. Thus, the paper designs an access control mechanism by computing the trust based on the user’s uncertain behaviour. This mechanism mitigates the malicious actions caused by authenticated users. Performance results indicate that the access control mechanism accurately detects and mitigates malicious users from the MCC environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.