{"title":"Verification of an image morphing based technology for improving the security in cloud storage services","authors":"Ryota Hanyu, Kazuki Murakami, Qiangfu Zhao","doi":"10.1109/INDCOMP.2014.7011746","DOIUrl":null,"url":null,"abstract":"Recently, many kinds of cloud computing based services are provided and they are becoming more and more popular. But we think it is an urgent problem to improve the security of cloud services especially for storage services because the number of cyber-attacks is increasing. Currently, our research group proposed an image morphing based technology for improving the security of cloud services. This technology provides a novel way both for encrypting and for hiding secret information. In this paper, we verify and discuss about the vulnerability of the proposed technology, and suggest possible methods for further improvement.","PeriodicalId":246465,"journal":{"name":"2014 IEEE International Symposium on Independent Computing (ISIC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Symposium on Independent Computing (ISIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDCOMP.2014.7011746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recently, many kinds of cloud computing based services are provided and they are becoming more and more popular. But we think it is an urgent problem to improve the security of cloud services especially for storage services because the number of cyber-attacks is increasing. Currently, our research group proposed an image morphing based technology for improving the security of cloud services. This technology provides a novel way both for encrypting and for hiding secret information. In this paper, we verify and discuss about the vulnerability of the proposed technology, and suggest possible methods for further improvement.