Đang chuẩn bị liên kết để tải về tài liệu:
Survey on cloud computing steganography using genetic algorithm
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Providers of cloud give opportunity to customers to avoid start-up costs and reduce operating cost and access data properly. So to increase security in cloud computing steganography technique is used using genetic algorithm. This will protect stored data in cloud from unauthorized access. | ISSN:2249-5789 Asha P.N et al, International Journal of Computer Science & Communication Networks,Vol 6(3),109-113 SURVEY ON CLOUD COMPUTING STEGANOGRAPHY USING GENETIC ALGORITHM Abhishek Rai, abhishekraigannipur@gmail.com, Alisa Basak, alisabasak2013@gmail.com, Moumita Naskar , moumitanaskar95@gmail.com, Project Guidline Project Mentor: Rajib Biswas, rajib.biswas@heritageit.edu, Anindya Jyoti Pal, aj.pal@heritageit.edu, Abstract Security of data that is stored in cloud is needed to be increased. Nowadays, Cloud computing is becoming one of the most important process to store data securely. Providers of cloud give opportunity to customers to avoid start-up costs and reduce operating cost and access data properly. So to increase security in cloud computing steganography technique is used using genetic algorithm. This will protect stored data in cloud from unauthorized access. 1. Introduction 1.1. Cloud Computing. In [10] a description is given about cloud and how it works as a data storage. In Cloud Computing users can store as well as retrieve data by public or private networks. It helps the users of the cloud to reduce start-up costs and operating costs. So it helps users to access the stored data of the cloud properly and efficiently. To prevent unauthorized access to the cloud, certain methodologies have been accepted to cut down the possibilities of different attacks associated to clouds. 1.2. Steganography. In [11] various concepts about Steganography have been discussed. Steganography hides messages so that only the sender and receiver know the presence of the message so it does not attract unwanted attention. Steganography takes help of GA. There are various types of steganography. They use different covers to IJCSCN | June-July 2016 Available online@www.ijcscn.com hide and transmit information. Some covers are Images , Text, Audio, Video. The most well-known form of Steganography is hiding secret message within images. This form of Steganography has .