NORMA eResearch @NCI Library

Cloud Data Security Improvement Using Steganography by Pseudo Random Number Generation (PRNG)

Revanna Kumar, Pooja (2021) Cloud Data Security Improvement Using Steganography by Pseudo Random Number Generation (PRNG). Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
Preview
PDF (Master of Science)
Download (534kB) | Preview
[thumbnail of Configuration manual]
Preview
PDF (Configuration manual)
Download (627kB) | Preview

Abstract

The cloud is the most modern and convenient way to manage and access enormous amounts of data. The concept of cloud computing is the storage of data that is accessed and sorted over the internet rather than being kept locally on a computer. As cloud computing runs programs over the internet, it can handle a great deal of data on-demand. In the information age, cloud computing provides convenient access to online storage, which contributes to the growth of technology and communication. As cloud computing gives access to all information and allows everything to be run online, it requires strong data security. It is important to remember that several types of security problems can arise, including data security, data privacy, data integrity, and data authentication. To solve all the problems, cloud security needs to continuously improve and update. Data security is implemented and developed using Cryptography and Steganography. Steganography can be used to hide the information of communication from unauthorized users using encryption, and Cryptography can be used to encrypt data in communication. Steganography is the most effective method for securing cloud communication data. Steganography is most secure method for hiding data, including image, audio, and video. However, the best and most secure method is using image data hiding. The steganography method of cloud data securing is most secure because it handles redundant data and conceals data. When the Pseudo-Random Number Generation (PRNG) is used, the steganography method is more reliable. PRNG technology can be used to implement the steganography method.

Item Type: Thesis (Masters)
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Cloud computing
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Tamara Malone
Date Deposited: 29 Dec 2022 14:56
Last Modified: 29 Dec 2022 14:56
URI: https://norma.ncirl.ie/id/eprint/6050

Actions (login required)

View Item View Item