• Login
    • University Home
    • Library Home
    • Lib Catalogue
    • Advance Search
    View Item 
    •   KDU-Repository Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2022 IRC Articles
    • Computing
    • View Item
    •   KDU-Repository Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2022 IRC Articles
    • Computing
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Comparison Analysis and Systematic Study on Secure Transmission of Data in the Cloud Using Steganographic Techniques and Cryptographic Algorithms

    Thumbnail
    View/Open
    IRC 2022 Proceedings _Com_draft FOC-59-67.pdf (299.9Kb)
    Date
    2022
    Author
    Anudini, AKSA
    Gayamini, G.
    Weerawardane, TL
    Metadata
    Show full item record
    Abstract
    Data and information can be considered the most precious assets in electronic communication systems, but security has become a struggle in this competitive world. Cloud computing has emerged as the most exciting technology for on-demand computing. It is now used by the military, healthcare, education, finance, and various other organizations to handle their large volume of information. Cloud computing has many benefits, including efficiency, high performance, scalability, accessibility, backup, and recovery. Security is a primary concern in cloud computing because everyone in the organization shares the same cloud platform. The most significant issue for the user is securely saving, retrieving, and transmitting data through the cloud network and storage. Cryptography and steganography can be defined as the most popular techniques that can be used to enhance data security. Cryptography scrambles the messages into an unintelligible format, while steganography hides the message as it is not observable to the attacker. High-level security is given for both the sender and the receiver inside the cloud platform when cryptography is used along with steganography. This paper analyzes the performance of cryptographic and steganographic techniques and suggests the best hybrid cryptographic algorithms and multilayer steganographic techniques that can be combined for efficient and secure data transmission in the cloud. This proposed system will provide availability, integrity, authenticity, confidentiality, and non-repudiation to the data and information.
    URI
    http://ir.kdu.ac.lk/handle/345/6406
    Collections
    • Computing [72]

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback
     

     

    Browse

    All of KDU RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsFacultyDocument TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsFacultyDocument Type

    My Account

    LoginRegister

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback