Adee, Rose and Mouratidis, Haralambos (2022) A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors, 22 (3). p. 1109. DOI https://doi.org/10.3390/s22031109
Adee, Rose and Mouratidis, Haralambos (2022) A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors, 22 (3). p. 1109. DOI https://doi.org/10.3390/s22031109
Adee, Rose and Mouratidis, Haralambos (2022) A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors, 22 (3). p. 1109. DOI https://doi.org/10.3390/s22031109
Abstract
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. This paper aims to create a data security model based on cryptography and steganography for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data loss, data manipulation, and data theft. To identify the problem and determine its core cause, we studied various literature on existing cloud computing security models. This study utilizes design science research methodology. The design science research approach includes problem identification, requirements elicitation, artifact design and development, demonstration, and assessment. Design thinking and the Python programming language are used to build the artifact, and discussion about its working is represented using histograms, tables, and algorithms. This paper’s output is a four-step data security model based on Rivest–Shamir–Adleman, Advanced Encryption Standard, and identity-based encryption algorithms alongside Least Significant Bit steganography. The four steps are data protection and security through encryption algorithms, steganography, data backup and recovery, and data sharing. This proposed approach ensures more cloud data redundancy, flexibility, efficiency, and security by protecting data confidentiality, privacy, and integrity from attackers.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | cybersecurity; cloud computing; cryptography; steganography; security model; data; privacy |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 11 Feb 2022 22:15 |
Last Modified: | 30 Oct 2024 16:57 |
URI: | http://repository.essex.ac.uk/id/eprint/32262 |
Available files
Filename: sensors-22-01109-v3.pdf
Licence: Creative Commons: Attribution 3.0