Journal of Machine and Computing


Enhancing Data Protection and Covert Communication in Cloud Environments with Isogeny-based Cryptography and Spread Spectrum Steganography



Journal of Machine and Computing

Received On : 26 May 2024

Revised On : 02 September 2024

Accepted On : 16 November 2024

Volume 05, Issue 01


Article Views

Abstract


The rise of cloud computing has changed how individuals and organizations store and communicate data, but it additionally caused significant concerns about information security and confidentiality. In order to improve data protection and allow covert communication in cloud environments, this research suggests a unique approach that combines spread spectrum steganography with isogeny-based cryptography as a solution to these problems. The main goal is to make it less difficult for two users, User 1 and User 2, to communicate private data that is kept in a cloud infrastructure through safe and covert data transfer. This technology depends on isogeny-based cryptography, which creates safe channels of communication between users by taking use of the mathematical features of isogenies of elliptic curves. Additionally, this technique provides protection from quantum assaults, consequently boosting data security. Spread Spectrum Steganography (SSIS), the second element, is used to secretly include shared secrets inside digital images. To protect secrets, SSIS encrypts, duplicates, interleaves, and employs pseudorandom noise sequences as carriers. The noise in the stegoimage is then removed with a filter to approximate the original image. By performing this, the stegoimage is made integrate in with the original, thereby hiding the secrets. Users 1 and 2 can safely share information by combining spread spectrum steganography and isogeny-based cryptography, reducing potential risks associated with parties that are unreliable. Spread spectrum steganography provides the covert hiding of transmitted secrets inside digital images, while isogeny-based cryptography provides secure communication channels. These methods are combined to build an effective structure for private and secure data sharing in cloud settings. This novel method solves important concerns about data security, secrecy, and covert communication, and thus makes a significant addition to the developing field of cloud computing security.


Keywords


Cloud Computing, Covert Communication, Spread Spectrum Steganography, Isogeny-based Cryptography, Data Security.


  1. Gift Chisoni and Dr. Glorindal Selvam, “The Design and Implementation of a Secure File Storage on the Cloud using Hybrid Cryptography,” International Journal of Advanced Research in Science, Communication and Technology, pp. 461–470, Apr. 2023, doi: 10.48175/ijarsct-9067.
  2. Muhammad Sony Maulana, Septian Rheno Widianto, and Agung Sasongko, “Steganography based on the B217AN Algorithm for secret messages on flip horizontal and resize image,” World Journal of Advanced Engineering Technology and Sciences, vol. 9, no. 1, pp. 017–028, May 2023, doi: 10.30574/wjaets.2023.9.1.0133.
  3. A. Dave and S. S. Rajpoot, “Evaluating the Efficacy and Security of Steganography Techniques in Cloud Computing,” Scand. J. Inf. Syst., vol. 35, no. 3, pp. 383–389, 2023.
  4. A. Prakash and S. Chauhan, “Exploring Innovative Methods for Enhancing Data Security in Computing,” 2023 3rd International Conference on Smart Data Intelligence (ICSMDI), pp. 63–68, Mar. 2023, doi: 10.1109/icsmdi57622.2023.00019.
  5. S. K. P, S. P, L. R, and M. N, “A Data Security-based Efficient Compression and Encryption for Cloud Computing,” 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), pp. 647–653, Apr. 2023, doi: 10.1109/icoei56765.2023.10125686.
  6. V. Krishnamaneni and S. Premkumar, “Enhancing security in public cloud using novel cryptography and enhanced steganography with E-Lsb encoding comparing with traditional steganography,” ADVANCES IN SUSTAINABLE CONSTRUCTION MATERIALS, vol. 2759, p. 020125, 2023, doi: 10.1063/5.0116710.
  7. Mohammad K. Abdul-Hussein and H. TH. S. ALRikabi, “Secured Transfer and Storage Image Data for Cloud Communications,” International Journal of Online and Biomedical Engineering (iJOE), vol. 19, no. 06, pp. 4–17, May 2023, doi: 10.3991/ijoe.v19i06.37587.
  8. A. D. Prathyusha, D. Lavanya, V. S. Sreeram, S. Venkata Narayana, and V. N. Singh, “Image Data Security in Cloud by using Steganography,” 2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN), pp. 344–347, Apr. 2023, doi: 10.1109/cictn57981.2023.10140413.
  9. P. Chatterjee, R. Bose, S. Banerjee, and S. Roy, “Enhancing Data Security of Cloud Based LMS,” Wireless Personal Communications, vol. 130, no. 2, pp. 1123–1139, Mar. 2023, doi: 10.1007/s11277-023-10323-5.
  10. M. F. Roshan, J. Jenish, and P. MercyAssociate, “SECURE FILE STORAGE ON CLOUD USING HYBRID CRYPTOGRAPHY”.
  11. M. C. Ghanem, M. D. Uribarri, I. I. Araujo, and R. Djemai, “The Automation of the Extraction of Evidence masked by Steganographic Techniques in WAV and MP3 Audio Files,” ArXiv Prepr. ArXiv230707293, 2023.
  12. A. Salim, K. Abdulbasit Mohammed, F. Maath Jasem, and A. Makki Sagheer, “Image Steganography Technique based on Lorenz Chaotic System and Bloom Filter,” International Journal of Computing and Digital Systems, vol. 15, no. 1, pp. 851–859, Aug. 2024, doi: 10.12785/ijcds/160161.
  13. P. Arockia Mary, A. Albert Raja, S. Anbarasan, and R. Arivazhagan, “MULTI SECRET SHARING: AN EFFICIENT DATA HIDING WITH ENCRYPTED SECRET SHARING FOR SECURE COMMUNICATION”.
  14. A. Gera and Dr. Vaibhav Vyas, “Securing Data using Audio Steganography for the Internet of Things,” EAI Endorsed Transactions on Smart Cities, vol. 6, no. 4, p. e5, Jan. 2023, doi: 10.4108/eetsc.v6i4.1775.
  15. Vani A., M. Naved, A. H. Fakih, A. N. Venkatesh, P. Vijayakumar, and P. R. Kshirsagar, “Supervise the data security and performance in cloud using artificial intelligence,” RECENT TRENDS IN SCIENCE AND ENGINEERING, vol. 2393, p. 020094, 2022, doi: 10.1063/5.0074225.
  16. Z. Chen, A. Wu, Y. Li, Q. Xing, and S. Geng, “Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing,” Security and Communication Networks, vol. 2021, pp. 1–11, Jan. 2021, doi: 10.1155/2021/6619689.
  17. I. Haverkamp and D. K. Sarmah, “Evaluating the Merits and Constraints of Cryptography-Steganography Fusion: A Systematic Analysis,” Jul. 2023, doi: 10.21203/rs.3.rs-3167378/v1.
  18. A. M. Soomro, A. B. Naeem, S. K. Debnath, S. Bagchi, S. Gupta, and K. Saluja, “Private Cloud Hybrid Architecture for Protected Data Communication,” 2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT), pp. 450–455, May 2023, doi: 10.1109/incacct57535.2023.10141705.
  19. R. Adee and H. Mouratidis, “A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography,” Sensors, vol. 22, no. 3, p. 1109, Feb. 2022, doi: 10.3390/s22031109.
  20. P. Chinnasamy, S. Padmavathi, R. Swathy, and S. Rakesh, “Efficient Data Security Using Hybrid Cryptography on Cloud Computing,” Inventive Communication and Computational Technologies, pp. 537–547, Sep. 2020, doi: 10.1007/978-981-15-7345-3_46.
  21. P. R. Kumar, “Cloud Data Security Improvement Using Steganography by Pseudo Random Number Generation (PRNG)”.
  22. F. Thabit, A. P. S. Alhomdy, A. H. A. Al-Ahdal, and P. D. S. Jagtap, “A new lightweight cryptographic algorithm for enhancing data security in cloud computing,” Global Transitions Proceedings, vol. 2, no. 1, pp. 91–99, Jun. 2021, doi: 10.1016/j.gltp.2021.01.013.
  23. D. Bi, S. Kadry, and P. M. Kumar, “Internet of things assisted public security management platform for urban transportation using hybridised cryptographic‐integrated steganography,” IET Intelligent Transport Systems, vol. 14, no. 11, pp. 1497–1506, Nov. 2020, doi: 10.1049/iet-its.2019.0833.
  24. S. Mandal and S. Bhattacharyya, “Secret data sharing in cloud environment using steganography and encryption using GA,” 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1469–1474, Oct. 2015, doi: 10.1109/icgciot.2015.7380699.

Acknowledgements


Author(s) thanks to Dr. Nagaratna M for this research completion and support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Shivaramakrishna D and Nagaratna M, “Enhancing Data Protection and Covert Communication in Cloud Environments with Isogeny-based Cryptography and Spread Spectrum Steganography”, Journal of Machine and Computing. doi: 10.53759/7669/jmc202505023.


Copyright


© 2025 Shivaramakrishna D and Nagaratna M. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.