Cargando…

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. This paper aims to create a data security model based on cryptography and steganography for data in cloud co...

Descripción completa

Detalles Bibliográficos
Autores principales: Adee, Rose, Mouratidis, Haralambos
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8839104/
https://www.ncbi.nlm.nih.gov/pubmed/35161853
http://dx.doi.org/10.3390/s22031109
_version_ 1784650288753278976
author Adee, Rose
Mouratidis, Haralambos
author_facet Adee, Rose
Mouratidis, Haralambos
author_sort Adee, Rose
collection PubMed
description Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data manipulation, and data theft. To identify the problem and determine its core cause, we studied various literature on existing cloud computing security models. This study utilizes design science research methodology. The design science research approach includes problem identification, requirements elicitation, artifact design and development, demonstration, and assessment. Design thinking and the Python programming language are used to build the artifact, and discussion about its working is represented using histograms, tables, and algorithms. This paper’s output is a four-step data security model based on Rivest–Shamir–Adleman, Advanced Encryption Standard, and identity-based encryption algorithms alongside Least Significant Bit steganography. The four steps are data protection and security through encryption algorithms, steganography, data backup and recovery, and data sharing. This proposed approach ensures more cloud data redundancy, flexibility, efficiency, and security by protecting data confidentiality, privacy, and integrity from attackers.
format Online
Article
Text
id pubmed-8839104
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-88391042022-02-13 A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography Adee, Rose Mouratidis, Haralambos Sensors (Basel) Article Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data manipulation, and data theft. To identify the problem and determine its core cause, we studied various literature on existing cloud computing security models. This study utilizes design science research methodology. The design science research approach includes problem identification, requirements elicitation, artifact design and development, demonstration, and assessment. Design thinking and the Python programming language are used to build the artifact, and discussion about its working is represented using histograms, tables, and algorithms. This paper’s output is a four-step data security model based on Rivest–Shamir–Adleman, Advanced Encryption Standard, and identity-based encryption algorithms alongside Least Significant Bit steganography. The four steps are data protection and security through encryption algorithms, steganography, data backup and recovery, and data sharing. This proposed approach ensures more cloud data redundancy, flexibility, efficiency, and security by protecting data confidentiality, privacy, and integrity from attackers. MDPI 2022-02-01 /pmc/articles/PMC8839104/ /pubmed/35161853 http://dx.doi.org/10.3390/s22031109 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Adee, Rose
Mouratidis, Haralambos
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
title A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
title_full A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
title_fullStr A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
title_full_unstemmed A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
title_short A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
title_sort dynamic four-step data security model for data in cloud computing based on cryptography and steganography
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8839104/
https://www.ncbi.nlm.nih.gov/pubmed/35161853
http://dx.doi.org/10.3390/s22031109
work_keys_str_mv AT adeerose adynamicfourstepdatasecuritymodelfordataincloudcomputingbasedoncryptographyandsteganography
AT mouratidisharalambos adynamicfourstepdatasecuritymodelfordataincloudcomputingbasedoncryptographyandsteganography
AT adeerose dynamicfourstepdatasecuritymodelfordataincloudcomputingbasedoncryptographyandsteganography
AT mouratidisharalambos dynamicfourstepdatasecuritymodelfordataincloudcomputingbasedoncryptographyandsteganography