{"title":"Towards Empowering Cyber Attack Resiliency Using Steganography","authors":"Jȩdrzej Bieniasz, K. Szczypiorski","doi":"10.1109/ICFSP.2018.8552068","DOIUrl":null,"url":null,"abstract":"The fog computing has emerged as the extension of cloud computing to the network edge. The idea could be considered as a promising mechanism for cybersecurity by assuming that higher uncertainty of information from perspective of adversaries would improve the security of networks and data. This approach is recognized as cyberfog security in which data, split into fragments, is dispersed across multiple end-user devices. Even if some of them would be compromised, the adversary could not decode information and the availability of data would not be affected. This paper considers applying two steganographic proposals (StegHash and SocialStegDisc) for a new distributed communication system by fulfilling assumptions of cyberfog security approach. The initial design of such system is proposed. Features and limitations were analyzed to prepare recommendations for further development and research.","PeriodicalId":355222,"journal":{"name":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFSP.2018.8552068","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The fog computing has emerged as the extension of cloud computing to the network edge. The idea could be considered as a promising mechanism for cybersecurity by assuming that higher uncertainty of information from perspective of adversaries would improve the security of networks and data. This approach is recognized as cyberfog security in which data, split into fragments, is dispersed across multiple end-user devices. Even if some of them would be compromised, the adversary could not decode information and the availability of data would not be affected. This paper considers applying two steganographic proposals (StegHash and SocialStegDisc) for a new distributed communication system by fulfilling assumptions of cyberfog security approach. The initial design of such system is proposed. Features and limitations were analyzed to prepare recommendations for further development and research.