Cargando…

A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system

In the early days of digital transformation, the automation, scalability, and availability of cloud computing made a big difference for business. Nonetheless, significant concerns have been raised regarding the security and privacy levels that cloud systems can provide, as enterprises have accelerat...

Descripción completa

Detalles Bibliográficos
Autores principales: Mawgoud, Ahmed A., Taha, Mohamed Hamed N., Abu-Talleb, Amr, Kotb, Amira
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9768783/
https://www.ncbi.nlm.nih.gov/pubmed/36569183
http://dx.doi.org/10.1186/s13677-022-00339-w
_version_ 1784854247907524608
author Mawgoud, Ahmed A.
Taha, Mohamed Hamed N.
Abu-Talleb, Amr
Kotb, Amira
author_facet Mawgoud, Ahmed A.
Taha, Mohamed Hamed N.
Abu-Talleb, Amr
Kotb, Amira
author_sort Mawgoud, Ahmed A.
collection PubMed
description In the early days of digital transformation, the automation, scalability, and availability of cloud computing made a big difference for business. Nonetheless, significant concerns have been raised regarding the security and privacy levels that cloud systems can provide, as enterprises have accelerated their cloud migration journeys in an effort to provide a remote working environment for their employees, primarily in light of the COVID-19 outbreak. The goal of this study is to come up with a way to improve steganography in ad hoc cloud systems by using deep learning. This research implementation is separated into two sections. In Phase 1, the “Ad-hoc Cloud System” idea and deployment plan were set up with the help of V-BOINC. In Phase 2, a modified form of steganography and deep learning were used to study the security of data transmission in ad-hoc cloud networks. In the majority of prior studies, attempts to employ deep learning models to augment or replace data-hiding systems did not achieve a high success rate. The implemented model inserts data images through colored images in the developed ad hoc cloud system. A systematic steganography model conceals from statistics lower message detection rates. Additionally, it may be necessary to incorporate small images beneath huge cover images. The implemented ad-hoc system outperformed Amazon AC2 in terms of performance, while the execution of the proposed deep steganography approach gave a high rate of evaluation for concealing both data and images when evaluated against several attacks in an ad-hoc cloud system environment.
format Online
Article
Text
id pubmed-9768783
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-97687832022-12-21 A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system Mawgoud, Ahmed A. Taha, Mohamed Hamed N. Abu-Talleb, Amr Kotb, Amira J Cloud Comput (Heidelb) Research In the early days of digital transformation, the automation, scalability, and availability of cloud computing made a big difference for business. Nonetheless, significant concerns have been raised regarding the security and privacy levels that cloud systems can provide, as enterprises have accelerated their cloud migration journeys in an effort to provide a remote working environment for their employees, primarily in light of the COVID-19 outbreak. The goal of this study is to come up with a way to improve steganography in ad hoc cloud systems by using deep learning. This research implementation is separated into two sections. In Phase 1, the “Ad-hoc Cloud System” idea and deployment plan were set up with the help of V-BOINC. In Phase 2, a modified form of steganography and deep learning were used to study the security of data transmission in ad-hoc cloud networks. In the majority of prior studies, attempts to employ deep learning models to augment or replace data-hiding systems did not achieve a high success rate. The implemented model inserts data images through colored images in the developed ad hoc cloud system. A systematic steganography model conceals from statistics lower message detection rates. Additionally, it may be necessary to incorporate small images beneath huge cover images. The implemented ad-hoc system outperformed Amazon AC2 in terms of performance, while the execution of the proposed deep steganography approach gave a high rate of evaluation for concealing both data and images when evaluated against several attacks in an ad-hoc cloud system environment. Springer Berlin Heidelberg 2022-12-21 2022 /pmc/articles/PMC9768783/ /pubmed/36569183 http://dx.doi.org/10.1186/s13677-022-00339-w Text en © The Author(s) 2022, corrected publication 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Research
Mawgoud, Ahmed A.
Taha, Mohamed Hamed N.
Abu-Talleb, Amr
Kotb, Amira
A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
title A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
title_full A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
title_fullStr A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
title_full_unstemmed A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
title_short A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system
title_sort deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the v-boinc system
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9768783/
https://www.ncbi.nlm.nih.gov/pubmed/36569183
http://dx.doi.org/10.1186/s13677-022-00339-w
work_keys_str_mv AT mawgoudahmeda adeeplearningbasedsteganographyintegrationframeworkforadhoccloudcomputingdatasecurityaugmentationusingthevboincsystem
AT tahamohamedhamedn adeeplearningbasedsteganographyintegrationframeworkforadhoccloudcomputingdatasecurityaugmentationusingthevboincsystem
AT abutallebamr adeeplearningbasedsteganographyintegrationframeworkforadhoccloudcomputingdatasecurityaugmentationusingthevboincsystem
AT kotbamira adeeplearningbasedsteganographyintegrationframeworkforadhoccloudcomputingdatasecurityaugmentationusingthevboincsystem
AT mawgoudahmeda deeplearningbasedsteganographyintegrationframeworkforadhoccloudcomputingdatasecurityaugmentationusingthevboincsystem
AT tahamohamedhamedn deeplearningbasedsteganographyintegrationframeworkforadhoccloudcomputingdatasecurityaugmentationusingthevboincsystem
AT abutallebamr deeplearningbasedsteganographyintegrationframeworkforadhoccloudcomputingdatasecurityaugmentationusingthevboincsystem
AT kotbamira deeplearningbasedsteganographyintegrationframeworkforadhoccloudcomputingdatasecurityaugmentationusingthevboincsystem