A new steganography protocol for improving security of cloud storage services.
Kazuki MurakamiQiangfu ZhaoRyota HanyuPublished in: ISIC (2014)
Keyphrases
- cloud storage
- cloud computing
- cloud services
- mobile payment
- service providers
- computing resources
- web services
- virtual private network
- information security
- authentication protocol
- security protocols
- mobile services
- data center
- context aware
- file system
- distributed computing
- information services
- lightweight
- security analysis
- information hiding
- ciphertext
- database
- service oriented architecture
- data hiding
- data privacy
- mobile applications
- computing environments
- data management
- end users