A Dynamic Four-Step Data Security Model For Data in Cloud
A Dynamic Four-Step Data Security Model For Data in Cloud
Article
A Dynamic Four-Step Data Security Model for Data in Cloud
Computing Based on Cryptography and Steganography
Rose Adee 1 and Haralambos Mouratidis 1,2, *
1 Department of Computer and Systems Sciences, Stockholm University, Borgarfjordsgatan 12, Kista,
164 40 Stockholm, Sweden; road0872@student.su.se
2 Institute for Analytics and Data Science, University of Essex, Colchester CO4 3SQ, UK
* Correspondence: h.mouratidis@essex.ac.uk
Abstract: Cloud computing is a rapidly expanding field. It allows users to access computer system
resources as needed, particularly data storage and computational power, without managing them
directly. This paper aims to create a data security model based on cryptography and steganography
for data in cloud computing that seeks to reduce existing security and privacy concerns, such as data
loss, data manipulation, and data theft. To identify the problem and determine its core cause, we
studied various literature on existing cloud computing security models. This study utilizes design
science research methodology. The design science research approach includes problem identification,
requirements elicitation, artifact design and development, demonstration, and assessment. Design
thinking and the Python programming language are used to build the artifact, and discussion about
its working is represented using histograms, tables, and algorithms. This paper’s output is a four-
step data security model based on Rivest–Shamir–Adleman, Advanced Encryption Standard, and
identity-based encryption algorithms alongside Least Significant Bit steganography. The four steps
are data protection and security through encryption algorithms, steganography, data backup and
recovery, and data sharing. This proposed approach ensures more cloud data redundancy, flexibility,
efficiency, and security by protecting data confidentiality, privacy, and integrity from attackers.
Citation: Adee, R.; Mouratidis, H. A
Dynamic Four-Step Data Security
Keywords: cybersecurity; cloud computing; cryptography; steganography; security model; data; privacy
Model for Data in Cloud Computing
Based on Cryptography and
Steganography. Sensors 2022, 22, 1109.
https://doi.org/10.3390/s22031109
1. Introduction
Academic Editor: Naveen
Cloud computing technology has been growing exponentially [1]. More and more
Chilamkurti
companies choose cloud computing services since they are flexible, reliable, scalable, and
Received: 15 December 2021 in most cases, the most affordable solution [1]. Cloud computing is defined as an emerging
Accepted: 28 January 2022 and popular method of accessing shared and dynamically configurable resources via the
Published: 1 February 2022 computer network on demand [2]. An example of a cloud computing service today in-
Publisher’s Note: MDPI stays neutral cludes Amazon Elastic Compute Cloud (Amazon EC2), which supports virtual information
with regard to jurisdictional claims in technology (virtual IT) and allows users to rent virtual computers to run their computer
published maps and institutional affil- applications [3]. Amazon EC2 provides scalable computing capacity in the Amazon Web
iations. Services (AWS) Cloud [4]. Other examples of cloud computing services include the Google
App Engine used for application hosting. The Google Apps and Microsoft Office Online
are examples of software as a service, the Apple iCloud is used for network storage, and
DigitalOcean is used for servers, which serves as both an infrastructure and a platform as a
Copyright: © 2022 by the authors. service [3].
Licensee MDPI, Basel, Switzerland.
This article is an open access article 1.1. Service Models of Cloud Computing
distributed under the terms and
There are three main service models of cloud computing—Infrastructure as a Service
conditions of the Creative Commons
(IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Attribution (CC BY) license (https://
IaaS. Infrastructure as a Service (IaaS) is a computing service that is hugely scalable
creativecommons.org/licenses/by/
and automated [5]. Computers, networking, storage, and other resources can all be accessed
4.0/).
and monitored using IaaS. Instead of purchasing hardware outright, IaaS helps companies
purchase services online and as-needed [5].
PaaS. Platform as a Service (PaaS) provides the cloud components of specific apps and
is mainly used for applications [5]. PaaS provides developers with a platform to create
and configure applications. The enterprise or a third-party vendor can handle all servers,
storage, and networking, while the developers can manage the applications [5].
SaaS. Software as a Service is the most widely used solution for companies in the cloud
industry [5]. It is a cloud application service, also known as cloud application hosting. SaaS
uses the internet to distribute services to customers that a third-party provider runs. Most
SaaS applications run directly in the web browser, so no client-side downloads or installs
are needed [5].
1.2. Cryptography
Cryptography is a practice that involves the study of secure communication tech-
niques to prevent unauthorized third parties from accessing private data, information, or
messages [6]. The practice incorporates various aspects of the information security field,
such as data confidentiality, integrity, and authentication (CIA) and non-repudiation, the
focal areas in modern cryptography [7].
Encryption for the cloud computing world is an important issue requiring investi-
gation in several studies [8]. Jaber and Bin argue that an example of a significant focus
area of encryption in cloud computing is identification based on encryption [9]. Since
cloud computing manages crucial data and is accessible anywhere globally through the
internet, security is a critical factor and significant concern [10]. Cryptography can play a
crucial role in secure data transmission, e-commerce, digital media privacy, and web data
storage and transmission [11]. Several algorithms are fitted for encryption and decryption
to ensure data security in cloud computing; these include Data Encryption Standard (DES),
Advanced Encryption Standard (AES), Identity Based Encryption (IBE), and the Rivest,
Shamir, Adleman, Algorithm (RSA) [10].
to encrypt entire messages or data [10]. Thus, developers use other encryption schemes
combined with RSA to enhance security and efficiency [7]. Only an entity with access to
the RSA private key will decrypt the symmetric key using this method [7]. Without the
symmetric key, message decryption is almost impossible. Therefore, combining two or
more encryption and decryption algorithms is an elegant solution for enhancing security
and efficiency; moreover, it is a standard solution [7].
Unauthorized access to frequently sensitive client data may result in data breaches
where sensitive data leak out, causing problems for most organizations that have adopted
cloud computing [16]. Consequently, the effects of data leakage through cyberattacks and
eavesdropping may be detrimental to the organizations that employ cloud computing ser-
vices. The effects include loss of data and leakage of sensitive and confidential information,
which leads to loss of clients’ trust in the companies and can also contribute to substantial
financial setbacks [14].
This paper addresses the problem of insecurities and privacy breaches of some existing
cloud computing security models that employ encryption algorithms in data storage and
transmission. Encryption by itself has proved to be insufficient in providing data security
and maintaining privacy for data in storage and transmission in the cloud computing
environment [7]. A computer science security model refers to a scheme specifying and
imposing security policies [17]. A security model can be built on top of a structured
model of access privileges, a computation model, a model of distributed computing, or no
particular theoretical grounding at all [17].
The problem is of general interest and great significance because it affects many people
on an individual and business or organizational level, cutting across many industries,
especially in the IT industry and academia [18]. In this paper, the stakeholders affected by
the security and privacy breaches on cloud computing data include the organizations that
employ cloud computing services, customers or clients of those organizations, employees,
individuals, IT systems administrators, and third-party cloud service providers.
An example of the existing models includes the three-step data security model based
on cryptography and steganography [7]. Another example is the cryptographic role-based
access control model for electronic health record (EHR) systems. The EHR system uses
location-and biometrics-based user authentication and a steganography-based technique
to embed EHR data in electrocardiography (ECG) host signals [19]. Likewise, the PHR
(Personal Health Record) model, which medical staff use in exchanging patients’ health
information, is another example of existing models [20]. A final example is the private
cloud for software as a Service (SaaS) application model [6].
Both the private cloud for software as a service model (SaaS) [6] and the three-step data
security model based on cryptography and steganography [7] do not facilitate data backups
before the data is transmitted. Therefore, there is a need to introduce and develop a data
security model with an added security layer to back up the data and employ steganography
alongside the encryption algorithms used in cloud computing to improve the data’s security
and privacy [21].
The model proposed by this paper is perceived to be original in using cryptographic
algorithms such as RSA and AES together with IBE and LSB steganographic techniques in
a four-step model. Many existing data security models for cloud computing mainly employ
cryptographic algorithms. However, very few security models employ cryptography and
steganography [7]. In addition, none of the other security models reviewed provide a
concrete solution for secure data sharing. In contrast, the proposed security model employs
the IBE technique to facilitate secure data sharing.
The proposed artifact can classify as a data security model that uses four steps. Data
protection and security through encryption algorithms is employed in the first stage,
steganography is employed in the second stage, data backup and recovery are performed
in the third stage, and data sharing is performed in the fourth stage. Therefore, the
proposed model uses the four steps to provide an extra layer of security to preserve data
confidentiality, integrity, and cloud data availability. The model proposed by this paper is
perceived to be original in using cryptographic algorithms such as RSA and AES together
with IBE and LSB steganographic techniques in a four-step model.
make the number of characters in each unit equal, a bit-stuffing approach is utilized. A new
pseudo-random sequence generator function is used to build a pseudo-random sequence
to embed each of the units of the secret message into the logical square sections or blocks
of the cover picture in a pseudo-random method [1]. Extraction of the original message
may be done using the same pseudo-random sequence. As previously stated, the secret
password and a passkey known only to the two intended parties (sender and receiver)
determine the input value designated threshold of the pseudo-random sequence generator
function [1]. Since they are secret values, an additional level of security is applied.
The article’s authors utilize a hybrid encryption technique rather than a single en-
cryption algorithm to secure cloud storage [23]. The hybrid method of AES and FHE is
the authors’ main focus. In contrast to previous approaches, this hybrid technique allows
the user to maintain data, and is more redundant and safer. To produce hybrid encryp-
tion calculations based on AES and RSA in Bluetooth innovation, the authors took use
of the procedure speed of secret key encryption and the suitable key administration of
common key encryption [23]. They believe that if AES can use a 256-piece square figure
with 14 cycles for encryption, this innovation may also be used in cloud computing. The
encryption procedure in the second phase is based on a fully homomorphic encryption
method. This approach accomplishes two goals: additional substance and multiplicative
homomorphic [23]. The user will only use the substance calculations that have been added.
The user has ciphertext from the maiden scramble and is using the private key at this
point. Using added substance homomorphic encryption, the Cipher content and secret key
will now be encoded together [23]. The user can secure data confidentiality, privacy, and
integrity from hackers by employing this strategy. Users may learn more about how this
strategy works by looking at the flow chart and algorithm in the methodology section of
this article [23].
The authors of the study suggested that encryption aids in the transmission of sensitive
data via an unsecured channel without the risk of data loss or manipulation by an unau-
thorized party [24]. Asymmetric encryption, commonly known as public-key encryption
or holomorphic encryption, is the subject of this study. Asymmetric encryption, on the
other hand, is usually utilized for key exchange rather than data encryption due to the
enormous key size. According to the authors, data security is a major concern in today’s
massive data centers and cloud computing [24]. Elliptic Curve Cryptography is used in
this study to encrypt data in the cloud since the key used in Elliptic Curve Cryptography is
comparatively small. Elliptic Curve’s computing power is minimized due to its tiny key
size, resulting in the least amount of energy usage [24]. ECC is utilized for encryption,
key creation, and decryption in this work. Point P (x, y) selection is critical in building a
safe and dependable encryption method. This study proposes a two-layered solution to
data security in the cloud. The first step is to divide the data into small chunks, and the
second is to encrypt it with random safe curves. The two stages will secure data security to
the point where a quantum computer system may not be able to breach it [24]. For data
encryption, the dynamic Elliptic Curve technology has been used.
According to the authors of this article, combining cryptosystems with steganography
has been found as an upgraded security paradigm for data transmission [25]. To satisfy
cloud-specific communication efficiency, it will need to be improved at both phases. Using
Hybrid Cryptosystems and an Adaptive Genetic Algorithm aided by the Least Significant
Bit (LSB) embedding procedure as inspiration, an effective Visually Imperceptible Hybrid
Crypto Steganography (VIHCS) model is proposed in this article [25]. The authors created
a unique Hybrid Cryptosystem by carefully combining AES and Rivest–Shamir–Adleman
(RSA) algorithms to protect secret data that are then inserted in a cover picture. Further-
more, the usage of the AGA-OPAP (Adaptive Genetic Algorithm-based Optimal Pixel
Adjustment) enhanced the Least Significant Bit embedding while maintaining the highest
possible picture quality and ocular imperceptibility [25]. The authors used the 2D-Discrete
Wavelet Transform (2D-DWT-2L) approach with 8×8-dimensional block-wise embedding
Sensors 2022, 22, 1109 7 of 23
to accomplish LSB embedding. When used in conjunction with the AGA-OPAP model, it
aids in improving embedding efficiency [25].
According to the authors, advances in the sphere of information technology are
requiring us to safeguard the privacy of digital data [26]. Combining cryptography with
steganography is among the most effective techniques to attain such concealment. A unique
RGB shuffling algorithm is proposed in this study [26]. The idea behind RGB shuffling
encryption is to shuffle all of the RGB elements in order to distort the image. The RGB
shuffling technique shuffles the RGB values of each pixel in a picture based on the password
entered by the user [26]. Adding an RGB element with an ASCII password, inverting it,
and shuffling it is the first stage in RGB shuffling. The message is encrypted in this study
using the Message Digest 5 (MD5) Algorithm, and the authors employ RGB shuffling to
encrypt the picture. They then used Least Significant Bit (LSB) methods to embed the
encrypted information in an image, video, or audio [26]. The information or file is hidden
in the rightmost bit using the LSB technique.
Table 1. The table below summarizes the security models reviewed in the document review process.
1. The model shall improve data security through encryption and decryption. The
idea of the model is to perform cryptography; namely, encryption and decryption
of cloud data that are adapted from the cryptographic role-based access control
model for electronic health record (EHR) systems. The EHR, an electronic health
security model, uses a cryptographic role-based technique to distribute session keys to
establish communications and information retrieval using the Kerberos protocol [19].
Furthermore, the use of cryptography as a requirement is also adapted from the
three-step data security model that applies cryptography using an RSA algorithm
in its first step [7]. Also, cryptography is borrowed from other articles that explore
the use of cryptography in cloud computing. Two examples are this article on hybrid
Schnorr, RSA, and AES cryptosystem [27] and this article on the comparative analysis
of DES, AES, and RSA crypt algorithms for network security in cloud computing [28].
Rationale: This paper’s proposed model uses cryptography to generate a hidden key
that encrypts data using the AES and RSA encryption algorithms. The receiver receives
both the encoded letter and the secret key for decryption.
2. The model shall add an extra layer of security by applying steganography. The idea
of applying steganography as a functional requirement in the security model was
adapted from reviewing the three-step data security model [7]. The three-step data
security model enlists applying steganography to hide data within an image in its
second step [7]. Furthermore, the idea of using steganography was reinforced by
reviewing research on image encryption based on AES and RSA algorithms [29].
Likewise, a review of data security in cloud computing using steganography in which
the authors apply the LSB technique further supports this idea [1].
Rationale: The idea was that after the first phase of encrypting the data using cryp-
tography, an extra layer of security would be added using the Least Significant Bit (LSB)
steganography technique. LSB is the method of modifying the last bit of a block of bytes in
a file [14]. Furthermore, when the last bits are merged, they form bytes, which are combined
to form information.
3. The model shall provide data backups. The requirement for the security model
to offer the capability for backing up data is adapted from the security model to
enhance mobile cloud computing security using steganography [21]. The authors of
the model that works with a key embedded in the image and the data to provide an
additional security layer for data confidentiality argue that the users are responsible
for downloading and/or uploading information from or to the cloud and creating
backup files [21]. We conducted more research on disaster recovery techniques in
cloud computing [30] and cloud-based disaster recovery and planning models [31].
Rationale: This is a method of making duplicate backups of data and saving them
somewhere to retrieve the original in the event of a data failure. Full backups, incremental
backups, or other backup forms may be used based on the user’s preferences.
4. The model shall enable data recovery in the cloud. The idea of using data recovery
as a requirement in the proposed security model is also adapted from the security
Sensors 2022, 22, 1109 9 of 23
model to enhance mobile cloud computing security using steganography [21]. The
authors of the security model suggest that data backup and recovery processes should
be implemented as one technique in the security model [21]. Similarly, we researched
disaster recovery techniques in cloud computing [30] and cloud-based disaster recov-
ery and planning models [31]. The idea of using data recovery as a requirement of the
security model was thus strengthened.
Rationale: The idea was that the model would make it easier to recover data that
are unavailable, misplaced, corrupted, destroyed, or formatted from secondary storage;
portable media; or files that could not be accessed commonly.
5. The model shall facilitate secure data sharing. The idea of the security model to
facilitate secure data sharing is adapted from the PHR (Personal Health Record)
security model for exchanging patients’ health information [20]. The PHR service
enables the patient data to be securely stored in a third-party server so that authorized
persons can share and check the PHR data of the patient [20]. Further research
indicates that secure data sharing in cloud computing is essential [32,33].
Rationale: The security model will make cloud file sharing easier. The mechanism in
which a person is given storage space on a computer and reads and writes are done over
the internet is known as cloud-based file sharing or online file sharing. In most cases, the
administrator can delegate access rights to other users if they see fit.
management models cannot keep up with the changing market and technological climate.
For the model to be an elegant choice for security in cloud computing, it shall guarantee
its ability to secure data in the cloud even when the environment it in which it is applied
is expanding.
4. The model shall be effective. The idea for the security model to have effectiveness
as a non-functional requirement was adapted from the model that uses a three-level
defense system structure. Each floor performs its duty to ensure the data security of
cloud layers [2]. Moreover, the model’s authors argue that its effectiveness in cloud
computing and its efficiency are crucial to successful data protection [2]. Likewise,
the paper’s authors, who discuss cloud-based disaster recovery and planning models,
argue that cloud-based security models should provide practical solutions to replace
legacy disaster recovery strategies [31].
Rationale: The model shall guarantee security goals such as integrity and data avail-
ability in cloud computing. Moreover, since we are creating a security model, the primary
goals to be met are data integrity, availability, and confidentiality [7].
5. The model shall be ethical. This requirement derives from the three-step data security
model [7]. The authors argue that the model shall provide confidentiality, since it is
one of the most vital security aspects [7]. Furthermore, ethicality derives from the
model’s ability to provide data confidentiality and security. Data confidentiality is
also adapted from the paper discussing security concerns and countermeasures in
cloud computing [34].
Rationale: The model shall adhere to ethical norms by promoting security goals such
as confidentiality. Since we are in an era where correct data handling is one of the most
critical issues, our model shall handle data with respect and careful adherence to the data
handling procedure.
3. Results
3.1. Design and Develop the Artifact
During the design and construction process, we use a design thinking approach.
Empathizing, defining, ideating, prototyping, and evaluating the solution are design
thinking approaches we use. For the data collection process, we perform document reviews.
This paper’s artifact is classified as a model according to design science research.
The paper’s output is a four-step data security model for cloud computing based on
encryption algorithms and steganography. The four steps that the security model contains
are described as follows.
Lastly, this method is easily expandable if there is a need to distribute the same data to
multiple recipients, using multiple copies of the encrypted AES key and a separate public
key [7].
Figure 1. A description of how AES and RSA work in the first step.
Figure 1. A description of how AES and RSA work in the first step.
Figure 2. A description of how the LSB steganography works in the security model.
Compared to conventional approaches such as disks and tapes, where handling and
shipping media tend to be challenging activities, cloud storage for backing up data by
businesses is economical and cost-efficient [35]. On the other hand, the move to cloud
computing poses challenges to factors critical to a company’s growth, such as availability
and security [35].
Data backup and disaster recovery use a range of approaches, depending on the needs
of the business, such as:
• Full backup: data are backed up on a full scale and restored on a full scale [35].
• Incremental backup: only changed or newly added data are backed up subsequently
after the last full or incremental backup. The last full and incremental backups are
done every day from the last full backup used to restore the data [35].
• Differential backup: only modified or newly inserted data since the last complete or
differential backup are backed up for a differential backup. However, the previous
differential backup adjustments are updated in the differential backup [35], simplifying
the recovery process. Therefore, it only includes the most recent complete backup and
differential backup copies.
The needs of the enterprise determine data backup and disaster recovery strategies.
These arrangements differ depending on the size of the operation and the volume of data to
be backed up. Our model will not enforce a single technique since every organization has
different objectives, goals, scales, and priorities for data backup techniques. Any popular
and proven method can be adapted as a part of our four-step security model.
receiver through key management. The key pair distribution is followed by generating an
AES key. Then, the AES key is used to encrypt and later decrypt the plain text. The RSA
public key is then used to encrypt the ciphertext and the AES key to guarantee safety. The
LSB algorithm then hides the encrypted AES key and ciphertext in an image. The stego
cipher image is backed up using any backup technique and approach supported by the
security model. The stego cipher image is then sent to the receiver, where the receiver
proceeds to extract the ciphertext and key from the stego cipher image before decrypting it.
Therefore, the steps for backup and recovery in the security model are:
• The user generates an RSA main pair.
• The sender generates an AES256 key at random. The AES256 key is a one-time
usage key.
• The AES key is used to encrypt the files.
• The RSA public key is used to encrypt the AES key and the ciphertext.
• The encrypted AES key and ciphertext are hidden using the LSB algorithm in an image.
• The stego cipher image is backed up by the chosen technique or approach.
• The receiver receives the stego ciphertext image.
• The receiver extracts the ciphertext from the stego cipher image
• The receiver uses their RSA private key to decrypt the AES key.
• The data are decrypted by the receiver using the AES key.
Figure 3 below illustrates how the data backup step of the security model is performed.
• The receiver extracts the ciphertext from the stego cipher image
• The receiver uses their RSA private key to decrypt the AES key.
• The data are decrypted by the receiver using the AES key.
Figure 4 below illustrates how data share is performed using the security model and
contains a summary of all the steps of the model.
Our message was “Rose Adee encrypted files”. we had to hold the message in a global
variable message, from whence we could access and encrypt it using AES, RSA, and later
on, LSB steganography to embed and hide our encrypted message into the image.
We chose to first encrypt the message with AES encryption; the main Python libraries
used were AES and Cryptodome. We used the AES encryption process to create ciphertext,
which is an unreadable, effectively indecipherable conversion of our message. The output
of the encryption process, the AES ciphertext, could not be read until the secret AES key
generated using the AES library was used to decrypt it.
The AES uses a block size of 128 bit = 16 bytes, so to sustain optimal encryption
performance, we provide at least 10/16 × 10ˆ9 encryptions per second. In our model, the
AES-256, which has a key length of 256 bits, is used. The AES-256 supports the largest
bit size and is practically unbreakable by brute force based on current computing power,
making it a strong encryption standard [25].
After the initial round, the process is repeated 9, 11, or 13 times, depending on
whether the AES algorithm is using a key length of 128 bits, 192 bits, or 256 bits. 128-bit
AES encryption undergoes 10 transformation rounds; 192-bit AES encryption undergoes
12 transformation rounds; and 256-bit AES encryption undergoes 14 transformation rounds.
Since the AES algorithm only uses one secret key to cipher and decipher information, it
requires less computational power than RSA, making it faster and more efficient to run [26].
Since our message was only a few lines of text, the process took 0.121765 s to encrypt and
decrypt our message, which is quite fast.
Continuing with our encryption, we passed our bigger ciphered message through
RSA encryption as well. With RSA, we encrypted sensitive information (our message) with
a public key, and a matching private key is used to decrypt the encrypted message.
The RSA is considerably less efficient, more resource-heavy, and slow due to its
calculations with large numbers. In particular, the decryption where d is used in the
exponent is slow. There are ways to speed it up by remembering p and q, but it is still slow
in comparison to the AES algorithm [25]. The security of the RSA cryptosystem is based
on the problem of factoring large integer numbers. This is because the equation n = p*q
holds, where p and q are primes. n is the common part of the private and public keypair. If
you know the public keypair (n, e), it is possible to also calculate the private keypair (n, d),
because d is simply the multiplicative inverse of e modulo (p − 1) * (q − 1) [25]. This is the
RSA key generation formula:
(M e ) d (mod n) = M, n = pq
In our Python script, we used libraries like RSA, crypto, and PKCS1_OAEP, which is a
hybrid of the AES and RSA algorithms. However, when we tried to run our now large file
through RSA encryption, we ran into an error that claimed our message was too long. After
extensive research, we found that the solution was to use a hybrid algorithm that involved
the use of PKCSI_OAEP encryption. Then, our ciphered text was successfully ciphered
further. After timing the process, we found that RSA encryption took longer, perhaps due
to the fact that our message was now larger. It took a 1.186813 s to encrypt and decrypt
the message.
Since increasing protection levels requires some time spent on encryption and decryp-
tion, our security model therefore leverages the speed of the AES symmetric algorithm and
the security of the RSA asymmetric algorithm in a hybrid combination of AES and RSA.
The combination also helps to solve the problem of disseminating hidden keys to hundreds
of people without fear of compromise [23].
After further encrypting our message, we decided to hide its content within three
different images of varying sizes and color scales. Among the images was one of 1.2 MB,
another of 2.9 MB, and the largest of 7.2 MB. For this, we used LSB steganography, an image
steganography technique in which messages are hidden inside an image by replacing each
pixel’s least significant bit with the bits of the message to be hidden. Each pixel contains
three values, which are Red, Green, Blue. These values range from 0 to 255; in other words,
Sensors 2022, 22, 1109 18 of 23
they are 8-bit values. We go further to draw histograms of the encrypted and unencrypted
Sensors 2022,Sensors 2022,
22, x FOR 22, xREVIEW
FOR PEER REVIEW
images
Sensors 2022,Sensors to PEER
study
2022,
22, x FOR thePEER
22, xREVIEW
PEER FOR different
REVIEWdistortions
to RGB pixels plotted against the value of these
pixels. The libraries we used to achieve this include PIL and NumPy. Unlike cryptography,
which conceals the contents of a secret message, steganography conceals the very fact
servationsservations
that a message is communicated. in this in this
activity,
However, activity,tograyscale
grayscale
according images imagestoseemed
seemed
our observations be to
slightly
in this bedifferent
slightly fro
activity, dif
servationsservations in thisgrayscale
in this activity, activity, grayscale imagestoseemed
images seemed to bedifferent
be slightly slightly fro
di
grayscale images seemed to beunencrypted
unencrypted versions.
slightly
unencrypted
versions.
different from their unencrypted versions.
unencrypted versions. versions.
Table 2 below describes Table
Table 2 below
the 2 below the
describes
response describes
time in the
response response
time
seconds time in
in seconds
using seconds
using
the using theenc
the different
different dif
Table
Table 2 below 2 below the
describes describes
responsethe response
time time in
in seconds seconds
using using theenc
the different dif
encryption algorithms.algorithms.algorithms.
algorithms.algorithms.
Table 2. TheTable
table2.shows
The table shows the
the response response
time time in seconds.
in seconds.
Table 2. The table shows the 2.
Table response
Table
The time
table in table
2.shows
The seconds.
shows the
the response response
time time in seconds.
in seconds.
Response Response Time in Seconds
Time in Seconds
Response Response
Response Time in Seconds Time in
Time in Seconds Seconds
LSB En- LSB En-
Cover image
Cover image
SizeCover image
Cover
LSB image SizeLSB Size
LSB En- LSB
LSB En-
Totalcryption
LSB
LSB
decryption
timedecryption
decryption
Total LSB Total
time LSB time
Cover image
Encryption Sizedecryptioncryption
Size LSB LSB decryptionTotal LSB Total
time LSB time
cryption cryption
1 1.2 1
MB 1 6.618632 1.2MB 0.681449 1.2MB
6.618632 6.618632
0.681449 0.681449 7.300081 7.300081
7.300081
1 1 1.2MB 1.2MB
6.618632 6.618632
0.681449 0.681449 7.300081 7.300081
2 2.9 2
MB 2 12.194479 2.9MB1.134509 2.9MB
12.194479 12.194479
1.134509 1.134509 13.328988 13.328988
13.328988
2 2 2.9MB 2.9MB
12.194479 12.194479
1.134509 1.134509 13.328988 13.328988
3 7.2 3
MB 3 31.071637 7.2MB2.842029 7.2MB
31.071637 31.071637
2.842029 2.842029 33.913666 33.913666
33.913666
3 3 7.2MB 7.2MB
31.071637 31.071637
2.842029 2.842029 33.913666 33.913666
Message Encryption
Message Encryption Message Encryption
Message Encryption
Message Encryption
AES Encryption time AESAESdecryption AES Encryption
Encryption
time Total AES time RSA Encryption time RSA decryption time RSA
RSA Encryp- Encryp-
RSA
Total decryp-
RSA time RSA decryp-
Total
Total RSATotal RSA
time
AES AES
Encryption Encryption AES decryption
AES decryption time Total time
AESTotal
time AES RSA time Encryp-RSA Encryp-
RSA decryp- RSA decryp-
Total Total
RSATotal RSA ti
0.011895 time
0.002815 time AES decryption
AES decryption
0.121765 time Total
0.502411 time time AEStion
AESTotal 0.684402 timetime tion time tion time tiontime
1.186813 time
1.308578 time
Total ti
time time tion time tion time
tion time tion time
time time
0.011895 0.011895 0.002815 0.002815 0.121765 0.121765 0.502411 0.502411 0.684402 0.6844021.186813 1.186813
1.30857
0.011895 0.011895 0.002815 0.002815 0.121765 0.121765 0.502411 0.502411 0.684402 0.6844021.186813 1.186813
1.30857
The cover photos, stego images, and their histograms are shown in Table 3. When
observing the histogramsThe with
The bareThe
cover
cover The
cover
photos,
eyes,
photos, the
cover
photos,
stego
findings
photos,
stego
stego
images,
images,
images,
and
demonstrate
stego images,
and
and
thattheir
and theyhistograms
their histograms
their
their histograms are shownare
areidentical.
histograms
are shownare
in shown
Table 3
in shown
Table 3
observing observing
the histogramsthe histograms with bare
with bare eyes, eyes, thedemonstrate
the findings findings demonstrate thatid
that they are
As a result, the degree of distortion
observing observingin the
the histogramsthestego
with picture
histograms is minimal.
with
bare eyes, bare eyes, thedemonstrate
the findings findings demonstrate thatid
that they are
As a result, Asthe
a result,
degreethe degree of distortion
of distortion in the stego in picture
the stego picture is minimal.
is minimal.
As a result,Asthea result,
degreethe degree of distortion
of distortion in the stego inpicture
the stego picture is minimal.
is minimal.
Table 3. The table below shows the cover images, stego images, and the histograms.
Table
Table 3. The table3.below
The table
showsbelow showsimages,
the cover the cover images,
stego stego
images, andimages, and the histogr
the histograms.
Table
Table 3. The table3.below
The table
showsbelow showsimages,
the cover the cover images,
stego stego
images, andimages, and the histogr
the histograms.
Cover1
Cover1image
Cover1 image image Histogram ofofcover1
cover1image
HistogramHistogram of cover1 image
image
Cover1 image
Cover1 image HistogramHistogram of cover1 image
of cover1 image
Stego1image
Stego1 image
Stego1 image HistogramHistogram
Histogram ofof of Stego1 image
Stego1image
image
Stego1 image
Stego1 image ofStego1
HistogramHistogram of Stego1 image
Stego1 image
Cover2 image
Cover2 image HistogramHistogram of cover2 image
of cover2 image
Cover2 image
Cover2 image HistogramHistogram of cover2 image
of cover2 image
Sensors 2022, 22, 1109 19 of 23
Sensors
SensorsTable
2022, 3.x2022,
22, FOR22,
Cont. x FOR
PEER PEER REVIEW
REVIEW 20
Sensors
Sensors 2022, 22, x2022,
FOR22, x FOR
PEER PEER REVIEW
REVIEW 20
Sensors 2022, 22, x FOR PEER REVIEW 20
Cover2
Sensors 2022, image
22, x FOR PEER REVIEW Histogram of cover2 image 20
Sensors 2022, 22, x FOR PEER REVIEW 2
Stego2 image
Stego2 image Histogram
Histogram of Stego2of image
Stego2 image
Stego2
Stego2 image
Stego2 image image Histogram of
of Stego2
Histogram
Histogram Stego2 ofimage
Stego2 image
image
Stego2 image Histogram of Stego2 image
Stego2 image
Stego2 image Histogram of Stego2
Histogram image
of Stego2 image
Stego2 image Histogram of Stego2 image
Cover3 Cover3
image image Histogram
Histogram of cover3of image
cover3 image
Cover3 Cover3
image image Histogram
Histogram of cover3of image
cover3 image
Cover3Cover3
Cover3
image
image image Histogram
Histogram of
of cover3
Histogram cover3 image
image
of cover3 image
Cover3 image Histogram of cover3 image
Cover3 image Histogram of cover3 image
Stego3 image
Stego3 image Histogram
Histogram of stego3 ofimage
stego3 image
Stego3 image
Stego3 image Histogram
Histogram of stego3 ofimage
stego3 image
Stego3 image
Stego3 image Histogram
Histogram of stego3
of stego3 image
image
Stego3 image
Stego3 image Histogram
Histogram of
of stego3
stego3 image
image
Stego3 image Histogram of stego3 image
Sensors 2022, 22, 1109 20 of 23
4. Conclusions
The authors have been able to effectively integrate cryptography and steganography
security approaches to give twice the protection for cloud data security and privacy. To
protect cloud data, we introduced a dynamic four-step model with hybrid encryption,
in which the AES-256 symmetric method is paired with the RSA asymmetric technique.
The encrypted data are then concealed in a photo using the LSB steganography technique.
The users’ chosen strategies can be used to back up the results of the decryption process.
With identity-based encryption (IBE), the results of the encryption and decryption may be
shared and securely transferred to authorized recipients. The results also reveal that when
the picture distortion is minimized, the quantity of data concealed in the image rises. For
diverse companies of varied sizes, objectives, and demands, the suggested methodology
is more flexible, adaptable, and efficient for safeguarding cloud data. In comparison to
other comparable efforts, the approach additionally assures cloud data redundancy. The
qualities of the proposed model make it suited for data exchange in the cloud, financial,
and healthcare environments. The model can safeguard the confidentiality, privacy, and
Sensors 2022, 22, 1109 21 of 23
integrity of cloud data by employing the approaches described. As a result, since the model
verifies data integrity, it can be concluded that the goal of this work, which was to improve
data security and the privacy of cloud data, has been met. The security goals of looking at
how cryptography and steganography are used are also met. Nonetheless, more research
on how to improve the combination and provide greater security for multimedia data is
necessary in the future.
Author Contributions: R.A. Initial idea, research, paper write-up. H.M. Focusing of the original idea,
feedback, and input on various research stages, feedback, and modifications on the manuscript. All
authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Informed Consent Statement: Informed consent was obtained from all subjects involved in the study.
Acknowledgments: We would like to thank and acknowledge all individuals who helped see this
paper to completion. Special thanks to Andreas Constantinou for contributing to the early parts of
the research. Finally, thanks to all our peers for providing additional constructive feedback with
insightful comments.
Conflicts of Interest: The authors declare no conflict of interest. The funders had no role in the
study’s design, collection, analyses, or interpretation of data, the writing of the manuscript, or in the
decision to publish the results.
Appendix A
Practice
The aim is to offer security and maintain the privacy of data in cloud computing. Cloud computing security is done on behalf of relevant professionals for clients or
users through user-friendly digital tools like Microsoft 365 and Google cloud. These cloud computing tools allow data protection through encryption and decryption
of data at rest and during transmission in the cloud. This practice aims to keep data safe by preventing data breaches and preventing data loss, manipulation, and
theft. The practice also aims to improve data governance through the least access of data. The key activities include data protection through encryption and
decryption, steganography to hide data, performing data backups and recovery, and sharing data. The stakeholders include cloud and IT administrators,
organizations employing cloud computing services, employees, the clients collaborating with the organizations, and third-party cloud service providers.
Artifact
Problem
Classification: the artifact is identified as a model.
Broad problem: Data in the cloud are not safe. They
The paper’s output is a four-step data security
are prone to data loss, manipulation, and theft.
model for cloud computing based on encryption
Research problem: The existing data security
algorithms and steganography. The four steps it
models employ encryption algorithms to ensure the
would contain are: In the first stage, data protection
secrecy of the data. However, encryption by itself Research Process
and security through encryption algorithms. The
has proved to be insufficient in providing data An extensive literature review was conducted on the
second stage employs steganography. The third
security and protection for data being stored and existing literature on cloud computing security and
stage performs data backup and data recovery.
transmitted in cloud computing environments. privacy concerns for problem explication.
Finally, the fourth stage performs data sharing.
We performed a document review or literature study
Requirements of existing security data models to define the
Functional Requirements requirements. We used questionnaires in a survey to
The artifact should be able: validate the document review requirements.
Quality and Effects
• To improve data security through encryption For the evaluation, we used ex-ante evaluation; the
strategy used was an artificial approach. Quality
and decryption.
The artifact fulfills all functional and non-functional
• To add an extra layer of security by applying We used design thinking to emphasize, define,
ideate, and prototype our solution. We tested our requirements.
steganography.
• To provide data backups. solution for design and development using the The model is simple and easy to use for protecting
data in transit and in storage in the cloud.
• To enable data recovery in the cloud. Python programming language.
Effects
• To facilitate secure data sharing. The project outcomes will be shared with target
audiences in academia and the IT industry. The security model will increase users’ confidence in
Non-functional Requirements transmitting and storing information in the cloud.
The artifact should: The model will allow for an increase in cloud service
• Be simple/easy to use.Be simple/easy to use. users.
• Be ethical.
• Be effective.
• Be reliable.
• Be scalable.
Knowledge Base
A document review is also a secondary data analysis of existing security and privacy articles, including existing data security models. The document review serves as
the primary knowledge base for this paper. Later in the research, a survey questionnaire was introduced to help validate the document review requirements.
Sensors 2022, 22, 1109 22 of 23
References
1. Alkhamese, A.Y.; Shabana, W.R.; Hanafy, I.M. Data Security in Cloud Computing Using Steganography: A Review. In Proceedings
of the 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), Aswan, Egypt, 2–4 February 2019.
2. Yuefa, W.D.; Yaqiang, G. Data security model for cloud computing. In Proceedings of the 2009 International Workshop on
Information Security and Application (IWISA 2009), Qingdao, China, 21–22 November 2009; pp. 141–144.
3. Bolton, T.; Dargahi, T.; Belguith, S.; Al-Rakhami, M.S.; Sodhro, A.H. On the Security and Privacy Challenges of Virtual Assistants.
Sensors 2021, 21, 2312. [CrossRef] [PubMed]
4. Khari, M.; Kumar, M.; Vaishali. Secure data transference architecture for cloud computing using cryptography algorithms.
In Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom),
New Delhi, India, 16–18 March 2016; pp. 2141–2146.
5. Singh, S.; Kumar, V. Secured User’s Authentication and Private Data Storage-Access Scheme in Cloud Computing. In Proceedings
of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India,
11–13 March 2015; pp. 791–795.
6. Ghuge, S.S.; Kumar, S.; Savitha, S.; Suraj, V. Multilayer Technique to Secure Data Transfer in Private Cloud for SaaS Applications. In
Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore,
India, 5–7 March 2020; pp. 646–651. [CrossRef]
7. Pant, V.K.; Prakash, J.; Asthana, A. Three step data security model for cloud computing based on RSA and steganography. In
Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Greater Noida, India,
8–10 October 2015; pp. 490–494. [CrossRef]
8. Timothy, D.P.; Santra, A.K. A hybrid cryptography algorithm for cloud computing security. In Proceedings of the 2017 Inter-
national Conference on Microelectronic Devices, Circuits and Systems (ICMDCS), Vellore, India, 10–12 August 2017; pp. 1–5.
[CrossRef]
9. Jaber, A.N.; Zolkipli, M.F.B. Use of cryptography in cloud computing. In Proceedings of the 2013 IEEE International Conference
on Control System, Computing and Engineering, Penang, Malaysia, 29 November–1 December 2013; pp. 179–184. [CrossRef]
10. Islam, S.M.J.; Chaudhury, Z.H.; Islam, S. A Simple and Secured Cryptography System of Cloud Computing. In Proceedings of
the 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Edmonton, AB, Canada, 5–8 May 2019;
pp. 1–3. [CrossRef]
11. Chachapara, K.; Bhadlawala, S. Secure sharing with cryptography in cloud computing. In Proceedings of the 2013 Nirma
University International Conference on Engineering (NUiCONE), Ahmedabad, India, 28–30 November 2013; pp. 28–30. [CrossRef]
12. Singh, R. Ensuring Data Storage Security in Cloud Computing. IOSR J. Eng. 2012, 2, 17–21. [CrossRef]
13. Wei, J.; Liu, W.; Hu, X. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption. IEEE Trans.
Cloud Comput. 2016, 6, 1136–1148. [CrossRef]
14. Sajjad, M.; Muhammad, K.; Baik, S.W.; Rho, S.; Jan, Z.; Yeo, S.-S.; Mehmood, I. Mobile-cloud assisted framework for selective
encryption of medical images with steganography for resource-constrained devices. Multimed. Tools Appl. 2016, 76, 3519–3536.
[CrossRef]
15. Ajoudanian, S.; Ahmadi, M.R. A Novel Data Security Model for Cloud Computing. Int. J. Eng. Technol. 2012, 4, 326–329.
[CrossRef]
16. Sanghi, A.; Chaudhary, S.; Dave, M. Enhance the Data Security in Cloud Computing by Text Steganography. Lect. Notes Netw.
Syst. 2017, 241–248. [CrossRef]
17. Peng, Y.; Zhao, W.; Xie, F.; Dai, Z.-H.; Gao, Y.; Chen, D.-Q. Secure cloud storage based on cryptographic techniques. J. China Univ.
Posts Telecommun. 2012, 19 (Suppl. 2), 182–189. [CrossRef]
18. Shanthakumari, R.; Malliga, S. Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud
environment. Sadhana Acad. Proc. Eng. Sci. 2019, 44, 119. [CrossRef]
19. Premarathne, U.; Abuadbba, A.; Alabdulatif, A.; Khalil, I.; Tari, Z.; Zomaya, A.; Buyya, R. Hybrid Cryptographic Access Control
for Cloud-Based EHR Systems. IEEE Cloud Comput. 2016, 3, 58–64. [CrossRef]
20. Bansal, P.; Sharma, B.; Saxena, M. Low Error Rate Based Secure Sharing of Personal Health Record in Cloud Computing Using
DWT Steganography. In Proceedings of the 2016 8th International Conference on Computational Intelligence and Communication
Networks (CICN), Tehri, India, 23–25 December 2016; pp. 428–431. [CrossRef]
21. Reza, H.; Sonawane, M. Enhancing Mobile Cloud Computing Security Using Steganography. J. Inf. Secur. 2016, 7, 245–259.
[CrossRef]
22. Peffers, K.; Tuunanen, T.; Rothenberger, M.A.; Chatterjee, S. A Design Science Research Methodology for Information Systems
Research. J. Manag. Inf. Syst. 2007, 24, 45–77. [CrossRef]
23. Kumar, L.; Bandal, N. A review on hybrid encryption in cloud computing. In Proceedings of the 2019 4th International Conference
on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019.
24. Khan, I.A.; Qazi, R. Data Security in Cloud Computing Using Elliptic Curve Cryptography. Int. J. Comput. Commun. Netw. 2019, 1,
46–52.
25. Denis, R.; Madhubala, P. Evolutionary Computing Assisted Visually-Imperceptible Hybrid Cryptography and Steganography
Model for Secure Data Communication over Cloud Environment. Int. J. Comput. Netw. Appl. 2020, 7, 208–230. [CrossRef]
Sensors 2022, 22, 1109 23 of 23
26. Hadisukmana, R.N. An Approach of Securing Data using Combined Cryptography and Steganography. Int. J. Math. Sci. Comput.
2020, 6, 1–9. [CrossRef]
27. Alegro, J.K.P.; Arboleda, E.R.; Pereña, M.R.; Dellosa, R.M. Hybrid schnorr, rsa, and aes cryptosystem. Int. J. Sci. Technol. Res. 2019,
8, 1770–1776.
28. Chittibabu, P.; Kannan, M.; Priya, C.; Vaishnavisree, S.; Scholar, R. A Comparative Analysis of Des, Aes and Rsa Crypt Algorithms
for Network Security in Cloud Computing. J. Emerg. Technol. Innov. Res. 2019, 6, 574–582.
29. Alsaffar, D.M.; Almutiri, A.S.; Alqahtani, B.; Alamri, R.M.; Alqahtani, H.F.; Alqahtani, N.N.; Alshammari, G.M.; Ali, A.A.
Image Encryption Based on AES and RSA Algorithms. In Proceedings of the 2020 3rd International Conference on Computer
Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 19–21 March 2020; pp. 1–5. [CrossRef]
30. Tamimi, A.A.; Dawood, R.; Sadaqa, L. Disaster recovery techniques in cloud computing. In Proceedings of the 2019 IEEE Jordan
International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 9–11 April 2019;
pp. 845–850. [CrossRef]
31. Hamadah, S. Cloud-based disaster recovery and planning models: An overview. ICIC Express Lett. 2019, 13, 593–599. [CrossRef]
32. Zaghloul, E.; Zhou, K.; Ren, J. P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing.
IEEE Trans. Big Data 2019, 6, 804–815. [CrossRef]
33. Tao, Y.; Xu, P.; Jin, H. Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage. IEEE Access 2019, 8, 15963–15972.
[CrossRef]
34. Anjana; Singh, A. Security concerns and countermeasures in cloud computing: A qualitative analysis. Int. J. Inf. Technol. 2018, 11,
683–690. [CrossRef]
35. Yarrapothu, S. Effectiveness of Backup and Disaster Recovery in Cloud: A Comparative Study on Tape and Cloud Based Backup
and Disaster Recovery. Master’s Thesis, Faculty of Computing, Blekinge Institute of Technology, Karlskrona, Sweden, 2015.
36. Wang, H. Privacy-Preserving Data Sharing in Cloud Computing. J. Comput. Sci. Technol. 2010, 25, 401–414. [CrossRef]
37. Dong, X.; Yu, J.; Luo, Y.; Chen, Y.; Xue, G.; Li, M. Achieving an effective, scalable and privacy-preserving data sharing service in
cloud computing. Comput. Secur. 2014, 42, 151–164. [CrossRef]
38. Kanatt, S.; Talwar, P.; Jadhav, A. Review of Secure File Storage on Cloud using Hybrid Cryptography. Int. J. Eng. Res. 2020, 9,
16–20. [CrossRef]
39. Narasimhan, S.; Shah, S.L. Model identification and error covariance matrix estimation from noisy data using PCA. IFAC Proc.
Vol. 2004, 37, 511–516. [CrossRef]