We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Detection of Steganographic Intrusion in Cloud

Published on March 2015 by J.anitha Ruth, A .meenakshi, H Srimathi
International Conference on Communication, Computing and Information Technology
Foundation of Computer Science USA
ICCCMIT2014 - Number 1
March 2015
Authors: J.anitha Ruth, A .meenakshi, H Srimathi
35c9c5e0-5b52-428e-aaa4-b7cb6e8547c4

J.anitha Ruth, A .meenakshi, H Srimathi . Detection of Steganographic Intrusion in Cloud. International Conference on Communication, Computing and Information Technology. ICCCMIT2014, 1 (March 2015), 25-27.

@article{
author = { J.anitha Ruth, A .meenakshi, H Srimathi },
title = { Detection of Steganographic Intrusion in Cloud },
journal = { International Conference on Communication, Computing and Information Technology },
issue_date = { March 2015 },
volume = { ICCCMIT2014 },
number = { 1 },
month = { March },
year = { 2015 },
issn = 0975-8887,
pages = { 25-27 },
numpages = 3,
url = { /proceedings/icccmit2014/number1/19766-7006/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication, Computing and Information Technology
%A J.anitha Ruth
%A A .meenakshi
%A H Srimathi
%T Detection of Steganographic Intrusion in Cloud
%J International Conference on Communication, Computing and Information Technology
%@ 0975-8887
%V ICCCMIT2014
%N 1
%P 25-27
%D 2015
%I International Journal of Computer Applications
Abstract

The customer's try to migrate the data from desktop to cloud. . The data stored in cloud is targeted by potential threat. A potential threat is caused due to malicious hacker attack or data leakage in cloud. These threats in cloud environment arises the need for providing secure and safe information security system that can protect the data that is outsourced. In this paper we propose a framework for Intrusion Detection (ID) which identifies steganographic intrusion in cloud.

References
  1. CSA Cloud Security Alliance,"Security Guidance for criticalareas of focus in Cloud Computing"V3. 0.
  2. Dawn Song,Elaine shi and Ian Fisher,Umesh Shankar, "Cloud data protection for the masses",University of California Berkely ,Google, January 2012.
  3. CSA Cloud Security Alliance,"Top threats to CloudComputing"V1. 0,prepared by cloud security alliance, March 2010.
  4. D. Harnik, B. Pinkas, A. Shulman-Peleg," Side Channels in Cloud Services: Deduplication in Cloud Storage", IEEE Security and Privacy, Volume 8,Issue 6 ,November 2010.
  5. Johnson N. andJajodiaS. ,"ExploringSteganography,Seeing the Unseen,"IEEE Computer Society, vol. 31, no. 2 pp. 26–34, 1998.
  6. Chirag Modia,n, DhirenPatel a, BhaveshBorisaniya a, HirenPatel b, Avi Patel c, MuttukrishnanRajarajan""Asurvey of intrusion detection techniques in Cloud"in Journal of Network and Computer Applications 36 (2013) 42–57.
  7. Mehmood, Y. ; Habiba, U. ; Shibli, M. A. ; Masood, R. "Intrusion Detection System in Cloud computing:Challengesand Opportunities",2nd national Conference on InformationAssurance ,2013.
  8. AnimeshPatcha,Jung-Min Park "An Overview of Anomaly detection techniques : Existing solutions and Latest Technological trends",in journal of Computer Networks,51 (2007) 3448–3470.
  9. WojciechMazurczyk and Krzysztof Szczypiorske "Is cloud computing Steganography –proof"Institute of Telecommunication ,Warsaw University of Technology
  10. Bo Liu, Eric Xu, Jinwang. and more authors "Thwarting Audio Steganography attacks in cloud storage systems",published in International conference on Cloud and service computing(csc),pg259- 265, Dec2012.
  11. Dai Zhonghua,Xiong Qi and Peng Yong " Research on the Large Scale Image Steganalysis Based on CloudComputing and BP Neural Networks",EigthInternational Conference on Intelligent information Hiding and Multimedia Signal processing, July 2012.
  12. BartoszLipi?ski, WojciechMazurczyk, KrzysztofSzczypiorski"Improving Hard Disk Contention-basedCovert Channel in Cloud Computing Environment"Warsaw University of Technology, Institute of Telecommunications Warsaw, Poland
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Steganographic Intrusion Ids.