Is Cloud Computing Steganography-proof?

  title={Is Cloud Computing Steganography-proof?},
  author={Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={2011 Third International Conference on Multimedia Information Networking and Security},
  • W. Mazurczyk, K. Szczypiorski
  • Published 20 July 2011
  • Computer Science
  • 2011 Third International Conference on Multimedia Information Networking and Security
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver. These scenarios as well as the threats that steganographic methods can cause must be taken into account when designing secure cloud… 

Figures from this paper

A Review on Recent Steganography Techniques in Cloud Computing
Some of the recent steganography techniques that have been proposed to improve the security of data in the cloud and to make it more immune to cyber-attacks and eavesdropping are reviewed.
Secure Data Storage in Cloud Using Encryption and Steganography
This project proposes an effective and flexible scheme combining cryptography and steganography that encrypts the files before they are uploaded and decryption module decrypts them when they are downloaded.
Analysis of Data Hiding Methods in Image Steganography
  • K. Akshay, Balachandra Muniyal
  • Computer Science
    2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
  • 2018
This paper attempts to answer the challenge of securing the data through image steganography by using a password to hide data in an image using a modified LSB image Steganographic technique.
Detection of Steganographic Intrusion in Cloud
A framework for Intrusion Detection (ID) which identifies steganographic intrusion in cloud is proposed which identifies malicious hacker attack or data leakage in cloud.
Application and Implementation of Secure Hybrid Steganography Algorithm in Private Cloud Platform
Cloud Computing takes enterprises search to a new level through improved utilization, infrastructure cost, and faster deployment cycles, and it also allows them to reduce costs through improved utilizing, infrastructurecost, and more rapid deployment.
Improving Hard Disk Contention-Based Covert Channel in Cloud Computing
Experimental results conducted using open-source cloud environment Open Stack show that CloudSteg is able to achieve a bandwidth of about 0.1 bps, which is 1000 times higher than is known from the state-of-the-art version.
Cloud-Aware Web Service Security: Information Hiding in Cloud Computing
The benefits of using a cloud computing platform and the issue of information security are identified and the concept of information hiding and its relevance to the cloud is reviewed.
Thwarting audio steganography attacks in cloud storage systems
  • Bo Liu, Erci Xu, Jinshu Su
  • Computer Science
    2011 International Conference on Cloud and Service Computing
  • 2011
Experimental results show that, the proposed StegAD scheme is very efficient in thwarting the Audio steganography Attacks in Cloud Storage Systems.
Security Issues in Cloud Computing
The most current security threats to cloud computing and how malicious users find a way to abuse cloud computing resources are discussed.
A Note on the Problem of Semantic Interpretation Agreement in Steganographic Communications
  • B. Aziz
  • Computer Science
    J. Internet Serv. Inf. Secur.
  • 2021
It is argued here that there is a third fundamental dimension that characterises steganography, namely the ability of the three parties to interpret hidden content, and one solution based on the Diffie-Hellman key-agreement calculation that leads to interpretation agreement is offered.


Security and Privacy Challenges in Cloud Computing Environments
This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment and suggests a number of approaches that could be considered.
Vice over IP
What kind of potential contemporary communication networks have for enabling steganography, and in effect, create new techniques so that researchers can figure out how to thwart them.
Side Channels in Cloud Services: Deduplication in Cloud Storage
As the volume of data increases, so does the demand for online storage services, from simple backup services to cloud storage infrastructures. Although deduplication is most effective when applied
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
It is shown that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target, and how such placement can then be used to mount cross-VM side-channel attacks to extract information from a target VM on the same machine.
What's New About Cloud Computing Security?
This work strives to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions, and argues that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual auditability.
The NIST Definition of Cloud Computing
This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Szczypiorski - Vice over IP
  • IEEE Spectrum,
  • 2010
NIST definition of cloud computing. National Institute of Standards and Technology
  • NIST definition of cloud computing. National Institute of Standards and Technology
  • 2009
Top Threats to Cloud Computing V1 URL: https://cloudsecurityalliance
  • Top Threats to Cloud Computing V1 URL: https://cloudsecurityalliance
  • 2010