JIS  Vol.7 No.4 , July 2016
Enhancing Mobile Cloud Computing Security Using Steganography
Abstract: Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized user by the cloud administration, but there is no security provision to prevent unauthorized access by the cloud administrators to the client data on the cloud computing. In this paper, we demonstrate how steganography, which is a secrecy method to hide information, can be used to enhance the security and privacy of data (images) maintained on the cloud by mobile applications. Our proposed model works with a key, which is embedded in the image along with the data, to provide an additional layer of security, namely, confidentiality of data. The practicality of the proposed method is represented via a simple case study.
Cite this paper: Reza, H. and Sonawane, M. (2016) Enhancing Mobile Cloud Computing Security Using Steganography. Journal of Information Security, 7, 245-259. doi: 10.4236/jis.2016.74020.

[1]   Gupta, P. and Gupta, S. (2012) Mobile Cloud Computing: The Future of Cloud. International Journal of Advanced Research in Electrical Electronics and Instrumentation Engineering, 1, 134-145.

[2]   Bheda, H. and Lakhani, J. (2013) Application Processing Approach for Smart Mobile Devices in Mobile Cloud Computing. International Journal of Software Engineering and Knowledge Engineering, 3, 1046-1055.

[3]   Buyya, R., Yeo, C. and Venugopal, S. (2008) Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering it Services as Computing Utilities in High Performance Computing and Communications. The10th IEEE International Conference on IEEE, 5-13.

[4]   Donald, C. and Arockiam, O.L. (2013) Mobile Cloud Security Issues and Challenges: A Perspective. St. Joseph’s College Tiruchirappalli, Department of Computer Science, Tamil Nadu.

[5]   Saravankumar, C. and Arun, C. (2014) An Efficient ASCII-BCD Based Steganography for Cloud Security Using Common Development Model. Journal of Theoretical and Applied Information Technology, 65, 1992-8645.

[6]   Prasad, R., Gyani, J. and Murti, P. (2012) Mobile Cloud Computing: Implications and Challenge. Journal of Information Engineering and Applications, 2, 7-15.

[7]   Juneja, M. and Singh, P. (2014) Improved LSB Based Steganography Techniques for Color Images in Spatial Domain. International Journal of Network Security, 16, 366-376.

[8]   Kumar, A. and Pooja, K. (2010) Steganography: A Data Hiding Technique. International Journal of Computer Applications, 9, 975-8887.

[9]   Ross, A. and Fabien, P. (1998) On the Limits of Steganography. IEEE Journal of Selected Areas in Communications, 16, 474-481.

[10]   Foster, I., Zhao, Y., Raicu, I. and Lu, S. (2008) Cloud Computing and Grid Computing 360-Degree Compared. Grid Computing Environments Workshop, 2008, 1-10.

[11]   Buyya, R., Yeo, C., Venugopal, S., Broberg, J. and Brandic, I. (2009) Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing. The 5th Utility Future Generation Computer Systems, 25, 599-616.

[12]   Bahar, A., Habib, M. and Islam, M. (2013) Security Architecture for Mobile Cloud Computing. International Journal of Scientific Knowledge, 3, 11-17.

[13]   Nasab, M. and Shafiei, B. (2011) Steganography in Programming. Australian Journal of Basic and Applied Sciences, 5, 1496-1499.

[14]   Shamim, S., Sarker, A. and Bahar, A. (2015) A Review on Mobile Cloud Computing. International Journal of Computer Applications, 113, 4-9.

[15]   Kekre, H.B., Athawale, A. and Halarnkar, P.N. (2008) Increased Capacity of Information Hiding in LSB’s Method for Text and Image. International Journal of Electrical, Computer, and Systems Engineering, 2, 246-249.

[16]   Sahu, D., Sharma, S., Dubey, V. and Tripathi, A. (2012) Cloud Computing in Mobile Applications. International Journal of Scientific and Research Publications, 2, 1-9.

[17]   Huang, D., Zhou, Z., Xu, L., Xing, T. and Zhong, Y. (2011) Secure Data Processing Framework for Mobile Cloud Computing. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, 10-15 April 2011, 620-624.

[18]   Satyanarayanan, M. (1996) Fundamental Challenges in Mobile Computing. 15th Annual ACM Symposium on Principles of Distributed Computing, Philadelphia, 23-26 May 1996, 1-7.

[19]   Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J. and Jahanian, F. (2008) Virtualized In-Cloud Security Services for Mobile Devices. 1st Workshop on Virtualization in Mobile Computing, Breckenridge, 17-20 June 2008, 31-35.

[20]   Portokalidis, G., Homburg, P., Anagnostakis, K. and Bos, H. (2010) Paranoid Android: Versatile Protection for Smartphones. 26th Annual Computer Security Application Conference (ACSAC), Los Angeles, 5-9 December 2016, 347-356.

[21]   Bilogrevic, I., Jadliwala, M., Kumar, P., Walia, S., Hubaux, J., Aad, I. and Niemi, V. (2011) Meetings through the Cloud: Privacy-Preserving Scheduling on Mobile Devices. Journal of Systems and Software, 11, 1910-1927.

[22]   Ren, W., Yu, L., Gao, R. and Xiong, F. (2011) Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing. Tsinghua Science and Technology, 16, 520-528.

[23]   Yang, J., Wang, H., Wang, J., Tan, C. and Yu, D. (2011) Provable Data Possession of Resource Constrained Mobile Devices in Cloud Computing. Journal of Networks, 6, 1033-1040.

[24]   Tysowski, P. and Hasan, M. (2011) Re-Encryption-Based Key Management towards Secure and Scalable Mobile Applications in Clouds. IACR Cryptology Eprint Archival, 668-678.

[25]   Al-Khanjari, Z. and Alani, A. (2014) Developing Secured Interoperable Cloud Computing Services. The European Interdisciplinary Forum 2014 (EIF 2014), Vilnius, 18-19 June 2014, 341-350.

[26]   Brohi, S., Bamiah, M., Chuprat, S. and Manan, J. (2014) Design and Implementation of a Privacy Preserved Off-Premises Cloud Storage. Journal of Computer Science, 10, 210-223.

[27]   Bassil, Y. (2012) A Text Steganography Method Using Pangram and Image Mediums. International Journal of Scientific & Engineering Research, 3, 2229-5518.

[28]   Bender, W., Gruhl, D., Morimoto, N. and Lu, A. (1996) Techniques for Data Hiding. IBM Systems Journal, 35, 313-336.

[29]   Wang, H. and Wang, S. (2004) Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM, 47, 76-82.

[30]   Mahajan, S. and Singh, A. (2012) A Review of Methods and Approach for Secure Steganography. International Journal of Advanced Research in Computer Science and Software Engineering, 2, 484-488.

[31]   Johnson, N. and Jajodia, S. (1998) Exploring Steganography: Seeing the Unseen. Computer, 31, 26-34.

[32]   Shaw, M. and Garlan, D. (1996) Software Architecture: Perspective on an Emerging Discipline. Prentice Hall, Upper Saddle River.