Abstract
An efficient approach for providing very high secure storage data to the cloud system is proposed in this study. In order to effectively access data from the cloud server, a secure authentication is highly essential. After the authentication the user data is examined to ascertain whether the specified data is normal or intrusive in accordance with the intrusive recognition system, such as the Artificial Neural Network (ANN). It is accompanied by the encryption of the file by means of the signcryption technique. For the purpose of enhancing the storage safety of the novel approach, the steganography methods are carried out immediately after the encryption technique. In the innovative technique, the linguistic steganography approach is employed to conceal the data from the TPA. Subsequently, the data is subdivided arbitrarily and is amassed into cloud. The epoch-making steganography based secure storage and intrusion recognition technique is performed with the mighty assistance of the Cloud simulator in the working platform of Java software.
Highlights
Cloud computing is one of the significant and improving topic for both the developers and the users
This section gives the detailed view of the result that is obtained by our proposed method of steganography based secure data storage and intrusion detection is performed in the working platform of JAVA with CloudSim
To develop a secure storage signcryption algorithm is used in our method
Summary
Cloud computing is one of the significant and improving topic for both the developers and the users. Cloud computing is a suitable platform for persons who are interconnected with the networking surrounding (Nafi et al, 2012). Cloud computing is depend on internet and it is one of the basic of the generation of computing. Computing applications such as data, storage, software, computing and application are distributed to local devices with the help of internet (Gonzalez et al, 2012). Cloud storage service gives a comparably low cost, scalable, positionindependent platform for clients so it becomes a rapid profit growth service. By the review of IDC, security is one of the important open problems in adopting the cloud computing model
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have