Department of Computer Science and Engineering Bengaluru-560064
A Novel Cryptography and Steganographic Approach for Secure Cloud Data Migration Presented By SACHIN KUMAR S 1BY15CS075
Under the guidance of Mr. Anand R Assistant Professor Department of CSE
Contents 1) Abstract 2) Introduction 3) Literature Survey 4) Methodology 5) Results & Discussions 6) Conclusion 7) Future Scope 8) References
Dept. of CSE, BMS Institute of Technology.
1
Abstract A Novel Cryptography and Steganographic Approach for secure Cloud Data Migration design for cloud architecture which ensures secure data transmission from the client’s organization to the servers of the Cloud Service provider. Secure Cloud Data Migration is combined approach of cryptography and steganography because it will provide a two way security to the data being transmitted on the network.
First, the data gets converted into a coded format through the use of encryption algorithm and then this coded format data is again converted into a rough image through the use of steganography. Moreover, steganography also hides the existence of the message, thereby ensuring that the chances of data being tampered are minimal.
Dept. of CSE, BMS Institute of Technology.
2
Introduction • Cloud Data migration is the process of moving data, applications or other business elements to a Cloud Migration environment. • In the Cloud Data Migration the user’s privacy and ensuring secure data migration of their most valuable data is one of the major challenges among the list of challenges being posed by the cloud platforms. To ensure such high level data security, the Cloud Service Providers generally use the process of cryptography. • Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. • In complex systems like Cloud, where data needs to reside at different geographic locations, securing data with only cryptography approach might not serve the purpose of data security as cryptography cannot hide the existence of data from being transmitted on the network. • Another technique that can help in this situation is Steganography, Steganography is data hidden within data( video, audio, image). Steganography is an encryption technique that can be used along with cryptography as an extra-secure method to protect data. Dept. of CSE, BMS Institute of Technology.
3
Literature Survey SL. No [1]
[2]
Paper Title
Authors
Ideas
This paper is aimed as an attempt to enable secure Chetan Gudisagar Secure Data Migration data migration among cloud storage systems. The between Cloud Storage Bibhu Ranjan Sahoo concept of mutual authentication between two Systems Sushma M parties using nonce messages is extended to three parties, by combining with key splitting and sharing techniques to achieve secure data migration.
Survey of data and storage security in cloud computing
S. Rajeswari, R. Kalaiselvi
Dept. of CSE, BMS Institute of Technology.
1) Cloud security handles the weakness and susceptibility of cloud computing 2) Data security ensures the privacy and confidentiality of shared data while the storage security ensures the correctness of the uploaded data stored in untrustworthy cloud servers. But cloud computing has many challenges regarding both data and storage security 4
Literature Survey SL. No [3]
[4]
Paper Title
Digital Image Steganography with Encryption Based on Rubik’s Cube Principle
Hybrid Model for Cloud Data Security using Steganography
Authors
Sevierda Raniprima , Bambang Hidayat , Nur Andini
Moshira A. Ebrahim, Islam A. M. ElMaddah, hoda K. Mohamed
Dept. of CSE, BMS Institute of Technology.
Ideas steganography is combined with encryption in order to improve Security. When transmitting secret information, information is encrypted using DES first and then information is inserted in image through LSB steganography. Encryption changes the statistical characteristics of Information, enhancing antidetection of image steganography. 1) Storing sensitive data in the cloud makes data security an important issue. Maintaining data availability and providing the highest level of security at the same time is a challenging task. 2) Cryptography is the science by which data is transmitted and retrieved securely in insecure channels. 5
Literature Survey SL. No [5]
Paper Title
Cryptographic and Steganographic Approach for Secure Cloud Data Migration
Dept. of CSE, BMS Institute of Technology.
Authors
Ankit Dhamija
Ideas 1)Traditional cryptographic techniques to achieve data encryption and visuals steganography algorithms have been used to hide the encrypted data. 2) Multiple cryptography proposed where the data was encrypted into a cypher and the cypher will be hidden into a multimedia image file in the encrypted format.
6
Methodology Secure Cloud Migration Architecture using Cryptography and Steganography(SCMACS) STEPS: CSP • Client or Sender choose a Cloud Service Provider, subscribes to a plan offered by Data +Stego it and creates his account on their Stego Encryption Object Image website. Cloud receiver • Client selects data to be uploaded on the sender CSP’s website. CSP • Before feeding the secret information into steganography encoder the sender Data Stego Stego performs data encryption, that is he Decryption Object Image converts the original data files of clients into a secret coded format using a strict encryption algorithm. cloud Figure 1:depicts the basic block diagram of SCMACS
Dept. of CSE, BMS Institute of Technology.
7
Methodology
Stego image
Cloud Stego Image
Figure 2: Steganographycloud model with Encryption
Dept. of CSE, BMS Institute of Technology.
• Along with Cypher text, Stego key is fed into the steganography encoder for extra security and cover file which is the file we will use to hide the information. • Embedding process is happen in Steganographic Encoder which generates a Stego Image. This Stego Image is looks exactly like a cover object. • Now the Stego Image will Store in the cloud. • On the other end receiver will request particular message from the cloud. • Stego image along with stego key is then fed to the steganographic decoder and we get cypher text. • In order to get the secret message, he uses decryption algorithm on cypher text 8
Results & Discussions H
e
o
5
l
l
‘
‘
o
!
Figure 3: Demonstration of Encryption Approach Consider Hello is the message we need to store in cloud, 1st process is to Encrypt that Message like Shown Above. Dept. of CSE, BMS Institute of Technology
9
Results & Discussion • Hello will be Encrypted as o5’ ‘ !, similarly every text in the file is converted into cypher text and we will apply LSB steganography on it.
LSB Steganography Digital Image- it’s a finite set of digital value called pixel, and thousands of pixel together cloud makeup an image. Each pixel has 3 color component RGB, and RGB can be represented as 3 set of 8bits. 1
1
1
1
1
1
1
1
pixel
R G B Dept. of CSE, BMS Institute of Technology.
MSB
LSB
Most Significant Bit
Less Significant Bit
10
Results & Discussion • Now Consider first letter of Cypher text and the decimal value of ‘o’ is 111 and Binary equivalent of 111 is ‘01101111’
• we will take this letter and put it in image that is, we consider the following grid as 3 pixels of a 24-bit color image: (R1)
(G1)
(B1)
(R2)
(G2)
(B2)
(R3)
(G3)
(B3)
cloud (00100111 11101000 11001000) ,(00100111 11001000 11101000), (11001000 00100110 11101001)
0110 1111 The text can be hidden in a small part of the image according to the length of that text. So, there must be something to indicate that here we reached the end of the text. The indicator is simply 8 consecutive zeros.
0- 00100110 (R1) 1- 11101001 (G1) 1- 11001001 (B1) 0- 00100110 (R2)
Dept. of CSE, BMS Institute of Technology.
1- 11001001 (G2) 1- 11101001 (B2) 1- 11001001 (R3) 1- 00100111 (G3)
11
Results & Discussion Extracting the text from the image Just pass through the pixels of the image until you find 8 consecutive zeros. As we are passing, pick the LSB from each pixel element(R, G, B) and attach it into an empty value. When the 8 bits of this value are done, receiver is going to get the cypher text.
cloud
To decrypt Cypher text and bring back in the plaintext form, we need to follow the following approach as shown in the table 4.
Table 4: The Decryption Process
Dept. of CSE, BMS Institute of Technology.
12
Conclusion • In cryptography process, we make use of very simple yet effective technique for data encryption using one’s complement method which we called as Secure Cloud Migration Architecture using Cryptography and Steganography. • It used symmetric key method where both sender and receiver share the same key for encryption and decryption. • The strength of the approach lies in the fact thatcloud the symmetric key method generates a dynamic value for the private Key which makes it very safe because no one can have the private key and even some one gain access to it, it gets changed for each data that needs to be transferred. • In Steganography part, we used the LSB method that is used and mostly preferred.
Table 4: The Decryption Process
Dept. of CSE, BMS Institute of Technology.
13
Future Scope 1) Steganography on the World Wide Web: The world wide web(www) makes extensive use of inline Images. There are literally millions of images on various web pages worldwide. It may be possible to develop an application to serve as a web browser to retrieve data embedded in web page images. This “ stego-web” could operate on top of the existing WWW and be a means of covertly disseminating information. cloud 2)By combining more technique we can increase the capacity, and the system will become more secure.
3)More data can be hidden with the help of video Steganography here the movie still plays, The size of the movie does increase slightly based on the hidden container, but nothing that would be noticed through casual inspection. It is quite difficult to detect the presence of the embedded TrueCrypt container without specialized detection technology This helps to send the confidential data’s about the state or country. 4) several information sources like our private banking information, some military secrets, can be stored in a cover source. When we are required to unhide the secret information in our cover source, we can easily reveal our banking data and it will be impossible to prove the existence of the military secrets inside. Dept. of CSE, BMS Institute of Technology.
14
References [1]. Chetan Gudisagar, Bibhu Ranjan Sahoo, Sushma M and Jaidhar CD “Secure Data Migration between Cloud
StorageSystems” 2017 IEEE. [2]. S. Rajeswari, R. Kalaiselvi “Survey of data and storage security in cloud computing” Proceedings of 2017 IEEE International Conference on Circuits and Systems (ICCS 2017). cloud [3]. Sevierda Raniprima, Bambang Hidayat, Nur Andini “Digital Image Steganography with Encryption Based on Rubik’s Cube Principle” The 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) 2016 IEEE. [4]. Moshira A. Ebrahim, Islam A. M. El-Maddah, hoda K. Mohamed “Hybrid Model for Cloud Data Security using Steganography” Proceedings of 2017 IEEE International Conference on Circuits and Systems. [5]. Ankit Dhamija, Research Scholar “A Novel Cryptographic and Steganographic Approach for Secure Cloud Data Migration” @2018 IEEE.
Dept. of CSE, BMS Institute of Technology.
15