2022
DOI: 10.3390/s22031109
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

Abstract: Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data manipulation, and data theft. To identify the problem and determine its core cause, we studied various literature on exist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(34 citation statements)
references
References 33 publications
0
24
0
Order By: Relevance
“…In [33], the authors designed a data security model driven by steganography and cryptography for cloud computing data to address issues which include but not limited to data theft and data manipulation. A four-phase model driven by AES-256 and RSA cryptosystems, LSB steganography technique and identity-based encryption (IBE) was proffered.…”
Section: Related Workmentioning
confidence: 99%
“…In [33], the authors designed a data security model driven by steganography and cryptography for cloud computing data to address issues which include but not limited to data theft and data manipulation. A four-phase model driven by AES-256 and RSA cryptosystems, LSB steganography technique and identity-based encryption (IBE) was proffered.…”
Section: Related Workmentioning
confidence: 99%
“…Cryptography is widely used in cloud computing to achieve more security and trusting. In [13], they suggest four-steps data security model in cloud computing. They combine three cryptographic algorithms, which are RSA, AES, and identity-based encryption alongside with steganography by using least significant bit LSB techniques.…”
Section: Related Workmentioning
confidence: 99%
“…(E i , E j , d, t) are entities (i.e., nodes and sums) of public library's massive resources in the directed graph under the condition of network environment and culture construction, S i,j (t) is the subspace clustering distribution of public library's massive resources under the condition of network environment and culture construction, and T i,j (t) is the information exchange time of file sharing scheduling. In order to reduce the time of public library's massive resource sharing and scheduling under the condition of network environment and culture construction [13,14], it is necessary to model the main characteristics of public library's massive resource distribution under the condition of network environment and culture construction and define the graph model attribute set of public library's massive resource sharing and scheduling nodes under the condition of network environment and culture construction, where d represents the ontology object of public library's massive resource distribution under the condition of network environment and culture construction, and p represents the ontology distribution concept related set of public library's massive resource sharing under the condition of network environment and culture construction.…”
Section: Distribution Of Scheduling Nodes For Mass Resource Sharing I...mentioning
confidence: 99%