Call for Paper - July 2019 Edition
IJCA solicits original research papers for the July 2019 Edition. Last date of manuscript submission is June 20, 2019. Read More

Detection of Steganographic Intrusion in Cloud

IJCA Proceedings on International Conference on Communication, Computing and Information Technology
© 2015 by IJCA Journal
ICCCMIT 2014 - Number 1
Year of Publication: 2015
J. Anitha Ruth
A . Meenakshi
H Srimathi

J.anitha Ruth, A .meenakshi and H Srimathi. Article: Detection of Steganographic Intrusion in Cloud. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014(1):25-27, March 2015. Full text available. BibTeX

	author = {J.anitha Ruth and A .meenakshi and H Srimathi},
	title = {Article: Detection of Steganographic Intrusion in Cloud},
	journal = {IJCA Proceedings on International Conference on Communication, Computing and Information Technology},
	year = {2015},
	volume = {ICCCMIT 2014},
	number = {1},
	pages = {25-27},
	month = {March},
	note = {Full text available}


The customer's try to migrate the data from desktop to cloud. . The data stored in cloud is targeted by potential threat. A potential threat is caused due to malicious hacker attack or data leakage in cloud. These threats in cloud environment arises the need for providing secure and safe information security system that can protect the data that is outsourced. In this paper we propose a framework for Intrusion Detection (ID) which identifies steganographic intrusion in cloud.


  • CSA Cloud Security Alliance,"Security Guidance for criticalareas of focus in Cloud Computing"V3. 0.
  • Dawn Song,Elaine shi and Ian Fisher,Umesh Shankar, "Cloud data protection for the masses",University of California Berkely ,Google, January 2012.
  • CSA Cloud Security Alliance,"Top threats to CloudComputing"V1. 0,prepared by cloud security alliance, March 2010.
  • D. Harnik, B. Pinkas, A. Shulman-Peleg," Side Channels in Cloud Services: Deduplication in Cloud Storage", IEEE Security and Privacy, Volume 8,Issue 6 ,November 2010.
  • Johnson N. andJajodiaS. ,"ExploringSteganography,Seeing the Unseen,"IEEE Computer Society, vol. 31, no. 2 pp. 26–34, 1998.
  • Chirag Modia,n, DhirenPatel a, BhaveshBorisaniya a, HirenPatel b, Avi Patel c, MuttukrishnanRajarajan""Asurvey of intrusion detection techniques in Cloud"in Journal of Network and Computer Applications 36 (2013) 42–57.
  • Mehmood, Y. ; Habiba, U. ; Shibli, M. A. ; Masood, R. "Intrusion Detection System in Cloud computing:Challengesand Opportunities",2nd national Conference on InformationAssurance ,2013.
  • AnimeshPatcha,Jung-Min Park "An Overview of Anomaly detection techniques : Existing solutions and Latest Technological trends",in journal of Computer Networks,51 (2007) 3448–3470.
  • WojciechMazurczyk and Krzysztof Szczypiorske "Is cloud computing Steganography –proof"Institute of Telecommunication ,Warsaw University of Technology
  • Bo Liu, Eric Xu, Jinwang. and more authors "Thwarting Audio Steganography attacks in cloud storage systems",published in International conference on Cloud and service computing(csc),pg259- 265, Dec2012.
  • Dai Zhonghua,Xiong Qi and Peng Yong " Research on the Large Scale Image Steganalysis Based on CloudComputing and BP Neural Networks",EigthInternational Conference on Intelligent information Hiding and Multimedia Signal processing, July 2012.
  • BartoszLipi?ski, WojciechMazurczyk, KrzysztofSzczypiorski"Improving Hard Disk Contention-basedCovert Channel in Cloud Computing Environment"Warsaw University of Technology, Institute of Telecommunications Warsaw, Poland