Improving Data Security in Public Cloud Storage with the Implementation of Data Obfuscation and Steganography Techniques
Main Article Content
Abstract
Cloud computing is a widely used distribution paradigm for delivering secure information services over the internet. The advantages of cloud computing include the capacity to remotely access one's data from any location, eliminating concerns over data backups, as well as the establishment of disaster recovery and business continuity facilities. Nevertheless, cloud computing gives rise to apprehensions over the appropriate management of information and interactions by cloud service providers, user organisations, and governments. Cloud computing has become an increasingly popular choice for both big organisations and individuals seeking cost-effective access to a wide range of network services. Typically, individuals' information is kept on a public Cloud, which is accessible to everybody. This basic gives rise to several concerns that are contrary to the adaptable services offered by cloud providers, such as Confidentiality, Integrity, Availability, Authorization, and others. Currently, there are several choices available for safeguarding data, with encryption being the most favoured one. Encryption alone is insufficient for adequately safeguarding the sensitive information of many users. Additionally, the encryption and decryption procedure for each every query requires a greater amount of time. Furthermore, it is not advisable to just prioritise user-centric thinking, since users relinquish direct control over their data once it is uploaded to Cloud premises. Given this reality, it is important to contemplate the security of users' vital information on the Cloud server. This may be achieved by the use of the crucial method known as obfuscation. In order to alleviate the load on the Cloud server and provide sufficient security for user data, we suggest an approach that combines both strategies, namely... The thesis explores the concepts of obfuscation and encryption. If the files or documents need security, the user data may be encrypted. The Cloud's DaaS service is protected utilising obfuscation methods. By using a dual-pronged strategy, the suggested technique provides enough protection for anonymous access and ensures the preservation of privacy, even while dealing with information stored on Cloud servers. The objective is to provide a robust integrity checking method, an enhanced access control mechanism, and a group sharing mechanism. These improvements seek to reduce the workload and foster a higher degree of confidence between clients and service providers.