Security in Ad-hoc Network Using Encrypted Data Transmission and Steganography

Authors

  • Ankita Patil Department of Computer Engineering, Bharati Vidyapeeth College of Engineering, New Mumbai, India
  • Dhiraj Kuslekar Department of Computer Engineering, Bharati Vidyapeeth College of Engineering, New Mumbai, India
  • Ajay Jha Department of Computer Engineering, Bharati Vidyapeeth College of Engineering, New Mumbai, India

Keywords:

Least significant bit, Steganography, Cryptography, Cloud service provider, Elliptical curve cryptography

Abstract

Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. The previously proposed protocols fail to provide strong security assurance to the users. In this paper, we propose an efficient and secure protocol to address these issues. Our method allows third party auditor to periodically verify the data integrity stored at CSP without retrieving original data. To compare with existing schemes, our scheme is more secure and efficient.

Downloads

Download data is not yet available.

Downloads

Published

16-03-2021

Issue

Section

Articles

How to Cite

[1]
A. Patil, D. Kuslekar, and A. Jha, “Security in Ad-hoc Network Using Encrypted Data Transmission and Steganography”, IJRESM, vol. 4, no. 3, pp. 38–42, Mar. 2021, Accessed: Nov. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/553