{"title":"Exploring Innovative Methods for Enhancing Data Security in Computing","authors":"Aishwarya Prakash, S. Chauhan","doi":"10.1109/ICSMDI57622.2023.00019","DOIUrl":null,"url":null,"abstract":"Thousands of gigabytes of data are produced each minute by everyone in today's society. This data is being stored in clouds worldwide. The study addressed these security issues in a variety of ways. This research suggests a cloud computing security architecture based on cryptography and steganography. In addition to using symmetric and steganographic techniques, the model is said to meet all security standards, such as security resilience, secrecy, authentication, integrity, and non-repudiation. This method employs the Advanced Encryption Standard (AES) 256 and steganography to provide multilayer encryption and decryption at both the transmitter and receiver sides, boosting cloud storage security. This security paradigm delivers transparency to cloud users and service providers to alleviate security worries. The suggested model is written in Python and operates on the Amazon Web Services cloud. While compared to the old method, this approach enhances data security and saves time when uploading and downloading text files.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Thousands of gigabytes of data are produced each minute by everyone in today's society. This data is being stored in clouds worldwide. The study addressed these security issues in a variety of ways. This research suggests a cloud computing security architecture based on cryptography and steganography. In addition to using symmetric and steganographic techniques, the model is said to meet all security standards, such as security resilience, secrecy, authentication, integrity, and non-repudiation. This method employs the Advanced Encryption Standard (AES) 256 and steganography to provide multilayer encryption and decryption at both the transmitter and receiver sides, boosting cloud storage security. This security paradigm delivers transparency to cloud users and service providers to alleviate security worries. The suggested model is written in Python and operates on the Amazon Web Services cloud. While compared to the old method, this approach enhances data security and saves time when uploading and downloading text files.