Evaluating the Efficacy and Security of Steganography Techniques in Cloud Computing

Authors

  • Apeksha Dave, Dr. Sandeep Singh Rajpoot

Keywords:

steganography, cloud computing, data security, Serpent encryption, performance evaluation, vulnerabilities, countermeasures

Abstract

The way data is handled, accessed, and stored has been completely transformed by cloud computing. But maintaining the security and privacy of data in cloud settings is still a major challenge. This work gives a thorough investigation that tackles the goals of creating a reliable steganographic method, measuring its efficacy, gauging its influence on cloud computing performance, and looking into potential flaws and remedies. Assessing how steganography affects cloud computing system performance is the goal here. To examine the impact of steganography on overall system performance, performance assessments and benchmarks are carried out. In order to imitate real-world situations, several file formats and sizes are employed. It looks at potential weaknesses in the suggested steganographic technique and looks into mitigation strategies for these weaknesses. The analysis of security flaws, including attacks and detection methods, results in the development of suitable countermeasures. The results of this study help steganography-based data security in cloud computing settings develop. The study sheds light on the advantages, disadvantages, and possible areas for development of the suggested steganographic approach. The performance assessment and vulnerability analysis provide insight into how steganography affects cloud computing systems and aid in the creation of efficient defences.

Published

2023-09-20

How to Cite

Apeksha Dave, Dr. Sandeep Singh Rajpoot. (2023). Evaluating the Efficacy and Security of Steganography Techniques in Cloud Computing. SJIS-P, 35(3), 383–389. Retrieved from http://sjisscandinavian-iris.com/index.php/sjis/article/view/684

Issue

Section

Articles