[PDF][PDF] A review on recent steganography techniques in cloud computing

OM Ahmed, WM Abduallah - Academic Journal of Nawroz …, 2017 - researchgate.net
As with the growth of information on the cloud, cloud security is seen as more essential than
before. Presently, millions of users are utilizing the cloud. The security of cloud computing is …

Hybrid design for cloud data security using combination of AES, ECC and LSB steganography

O Hosam, MH Ahmad - International Journal of …, 2019 - inderscienceonline.com
The ever-growing popularity of cloud systems is prompting a revolutionary change in
information technology field. Parallel and flexible services offered by cloud technology are …

[PDF][PDF] A survey on cloud data security using image steganography

A Albalawi, N Hamza - International Journal of Advanced …, 2020 - pdfs.semanticscholar.org
Now-a-days, cloud computing proved its importance where it is being used by small and big
organizations. The importance of cloud computing is due to the various services provided by …

A novel data classification-based scheme for cloud data security using various cryptographic algorithms

MN Ul Haq, N Kumar - International Review of Applied Sciences …, 2021 - akjournals.com
Digital technologies had an effect on people's lives. The majority of these digital devices rely
on cloud storage to meet their memory needs. Hundreds of thousands of images, videos …

[PDF][PDF] Audio steganography via cloud services: Integrity analysis of hidden file

A Neyaz, C Varol - International Journal of Cyber-Security and …, 2018 - embeddedsw.net
Steganography is implemented by manipulating data within a carrier file, such as on audio
files. Audio Steganography is one of the techniques used for transmitting hidden information …

[HTML][HTML] Design and implementation of an OTP based data security model incoperating AES and sha2 in cloud environment

J Kaur, N Kaler - International Journal Of Computers & …, 2018 - researchgate.net
Cloud computing has revolutionized the way computing and software services are delivered
to the clients on demand. It offers users the ability to connect to computing resources and …

Accurate Information Analysis Scheme for High Level Security Provisioning in Cloud Environment

T Usha, S Nanduri, SA Tiwaskar… - 2024 Global …, 2024 - ieeexplore.ieee.org
Many experts agree that cloud computing represents a major technological advance for the
Internet and related computer systems. This shift has led many companies to outsource both …

[PDF][PDF] A Review on Security of Data in Cloud Computing Using Steganography Techniques

A Panghal - 2022 - academia.edu
With the growth of information on the cloud, cloud security is seen as more essential than
before. Currently, millions of users are utilizing the cloud. The security of cloud computing is …

[PDF][PDF] DEPLOYING VIRTUAL DATA CENTER ON CLOUD PLATFORM

NT Patel, G Khilari - researchgate.net
A data center is a facility that centralizes an organization's IT operations and equipment, and
where it stores, manages, and disseminates its data. Data centers house a network's most …

[PDF][PDF] Survey on Data Security in Cloud Environment

G Suganya, S Arumugam - ijrad.com
Cloud computing is a revolutionary technique that migrates current technology and
computing concepts into utility-like solutions. Even though the advantages of cloud are …