Is Cloud Computing Steganography-proof?
Abstract
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver. These scenarios as well as the threats that steganographic methods can cause must be taken into account when designing secure cloud computing services.
- Publication:
-
arXiv e-prints
- Pub Date:
- July 2011
- arXiv:
- arXiv:1107.4077
- Bibcode:
- 2011arXiv1107.4077M
- Keywords:
-
- Computer Science - Cryptography and Security
- E-Print:
- 2 pages, 1 figure