Efficient Data Hiding System using Cryptography and Steganography

  • OluwakemiC. A
  • Kayode S. A
  • Ayotunde J. O
N/ACitations
Citations of this article
45Readers
Mendeley users who have this article in their library.

Abstract

This paper deals with various access control mechanisms that are present in cloud computing. Cloud computing is the emerging technology where resources are available pay as you go basis. Cloud storage technology provides the large pool of storage capacity to the cloud users. Providing security to the data stored in cloud is the major concern. So Security can be enhanced by providing access control to the authorized users. Access control gives the authorization to the users which gives the access privileges on data and other resources. Access control can be enabled in most of the computing environment such as Peer to Peer, Grid and Cloud. Cloud storage services are accessed through a cloud storage gateway. We present various types of access control mechanisms that are used in cloud computing environment.

Cite

CITATION STYLE

APA

OluwakemiC., A., Kayode S., A., & Ayotunde J., O. (2012). Efficient Data Hiding System using Cryptography and Steganography. International Journal of Applied Information Systems, 4(11), 6–11. https://doi.org/10.5120/ijais12-450763

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free