Security in Ad-hoc Network Using Encrypted Data Transmission and Steganography
Keywords:Least significant bit, Steganography, Cryptography, Cloud service provider, Elliptical curve cryptography
Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. The previously proposed protocols fail to provide strong security assurance to the users. In this paper, we propose an efficient and secure protocol to address these issues. Our method allows third party auditor to periodically verify the data integrity stored at CSP without retrieving original data. To compare with existing schemes, our scheme is more secure and efficient.
How to Cite
Copyright (c) 2021 Ankita Patil, Dhiraj Kuslekar, Ajay Jha
This work is licensed under a Creative Commons Attribution 4.0 International License.