Data Security in Cloud Computing Using Encryption, Steganography and Image Compression
A. Aruna1, Inmita Abhishikta Behera2, Bhuvaneswari. K3, Preethi.G4

1A. Aruna, Assistant Professor, Undergraduate Students, SRM Institute of Science and Technology, Kattankulathur (Tamil Nadu), India.
2Inmita Abhishikta Behera, Undergraduate Students, SRM Institute of Science and Technology, Kattankulathur (Tamil Nadu), India.
3Bhuvaneswari.K, Undergraduate Students, SRM Institute of Science and Technology, Kattankulathur (Tamil Nadu), India.
4Preethi.G, Undergraduate Students, SRM Institute of Science and Technology, Kattankulathur (Tamil Nadu), India.

Manuscript received on 18 April 2019 | Revised Manuscript received on 25 April 2019 | Manuscript published on 30 April 2019 | PP: 1426-1430 | Volume-8 Issue-4, April 2019 | Retrieval Number: D6139048419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper tells about the security of information in distributed computing. Distributed-computing is an investigation of information in cloud and highlights identified with it in regards to security. It is common that distributed computing comprises of numerous plausible views of interest and numerous endeavor applications and information are moving towards open or half and half cloud. Be in any case, identifying with some career-simple functions, the businesses, especially huge endeavors, still would not move them to cloud. This paper offers a short concerning balanced examination on knowledge security and protection insurance problems related to distributed computing over all phases of information life cycle. At last, this paper depicts future examination work with regard to information security and protection assurance problems in cloud
Keywords: Cloud Computing; Data Security; Privacy Protection, AES Algorithm, Steganography.

Scope of the Article: Cloud Computing