Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Design and Implementation of Efficient Transmission of Cloud Data in Wireless Media

Version 1 : Received: 20 November 2021 / Approved: 22 November 2021 / Online: 22 November 2021 (15:17:12 CET)

How to cite: Nikam, V.P.; Dhande, S.S. Design and Implementation of Efficient Transmission of Cloud Data in Wireless Media. Preprints 2021, 2021110410. https://doi.org/10.20944/preprints202111.0410.v1 Nikam, V.P.; Dhande, S.S. Design and Implementation of Efficient Transmission of Cloud Data in Wireless Media. Preprints 2021, 2021110410. https://doi.org/10.20944/preprints202111.0410.v1

Abstract

Nowadays, information security is a challenge especially when transmitted or shared in public clouds. Many of researchers have been proposed technique which fails to provide data integrity, security, authentication and another issue related to sensitivity data. The most common techniques were used to protect data during transmission on public cloud are cryptography, steganography, and compression. The proposed scheme suggests an entirely new approach for data security on public cloud. Authors have suggested an entirely new approach that completely makes secret data invisible behind carrier object and it is not been detected with the image performance parameters like PSNR, MSE, entropy and others. The details of results are explain in result section of paper. Proposed technique have better outcome than any other existing technique as a security mechanism on a public cloud. Primary focus of suggested approach is to minimize integrity loss of public storage data due to unrestricted access rights by uses. To improve reusability of carrier even after data concealed is really a challenging task and achieved through suggested approach.

Keywords

Data compression; data hiding; psnr; mse; virtual data; public cloud; quantization error

Subject

Engineering, Control and Systems Engineering

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.