Online ISSN: 2515-8260

Keywords : Information Security

Ultra-Secure Secret Communication by Crypto Stegano Techniques for Defence Applications


European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 376-384

This research paper proposes the communication devices in defence sectors shares secret information dynamically and it is vulnerable to hackers as they steal, corrupt or destroy the data. Though existing system uses different cryptographic techniques, yet suffers from various cyber-attacks. In order to communicate secretly, we propose novel optimized crypto stegano system with the cryptographic process implemented by Elgamal cryptosystem with secure key exchange, then steganographic process using quantum LSB image steganography by hiding the encrypted data into the randomly chosen image, also cover image is optimized using eagle strategy particle swarm optimization algorithm for high embedded efficiency. Then the data embedded in image is retrieved using steganographic retrieval technique and it is decrypted at receiver by Elgamal decryption using private key. Based on results, various parameters such as MSE, PSNR, embedded efficiency and carrier capacity are calculated and related with existing methods, thereby higher performance metrics are achieved in our proposed work.

Major Security Challenges Ofcloud Computing Technology

Abrar Atif Asghar

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 2956-2971

This paper aims to identify the challenges and threats to the information security of cloud computing, which is considered one of the most important technologies in recent decades. Cloud computing provides many virtual services that can be managed and accessed by users through the web and user interfaces. It also enables the users to store their information that can be easily accessed globally. Despite the advantages of cloud computing, there are numerous challenges and threats to the users and service providers that may directly or indirectly affect the cloud computing system as a result affect its information security. Acritical review approach has been adopted as a method to identify the knowledge gaps in the literature. Severalstudiesrelated to the information security challenges of cloud computing have been reviewed and critically evaluated. The critical review approach described in this paper resulted in a set of important information security challenges of cloud computing thatmust betaken into considerationby the users and service providers. Among the most important of these challengesare data encryption, network security, confidentiality, data privacy, malware, Authenticity, databreach, and the challenge of identity and access management.The study recommended the necessity to discover moreinformation security challenges of cloud computing and to take the challenges discussed in this paper into account in order to protect the data and information of the organization and maintain its performance.