Abstract
Privacy is the ability of an individual or group to seclude themselves, or their private information, and thereby express themselves selectively. Nowadays the increasing usage and popularity of web services indicate the likelihood of privacy disclosures. Data breaches are the number one privacy threat when using cloud services. To avoid the possibility for data theft users should not trust anyone including the service providers. If they do not rely on the providers’ defense methods, they have to make sure that outgoing traffic remains a secret for everyone. In this paper, we propose our model and our prototype implementation for a client-side data encoder, that aims to solve the privacy disclosure problems. We show different binarization (character string to binary string) and encoding methods (binary string to character string), which with, we can provide secure and hidden data encoding by translating the user data into different sentences that can be considered as valid data. We make sure that only encoded data can be stored in the providers’ storage, therefore we not just ensure that no one has direct access to unencoded data, but we are able to conceal the very existence of the encoding at all.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Sources: https://www.talkenglish.com/vocabulary/top-500-adjectives.aspx (Reached: 2018-09-14) https://www.talkenglish.com/vocabulary/top-1000-verbs.aspx (Reached: 2018-09-14) https://www.talkenglish.com/vocabulary/top-1500-nouns.aspx (Reached: 2018-09-14) https://github.com/dominictarr/random-name/blob/master/names.txt (Reached: 2018-09-14) https://github.com/dominictarr/random-name/blob/master/places.txt (Reached: 2018-09-14).
References
Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech house, Boston (2000)
Shaikh, F.B., Haider, S.: Security threats in cloud computing. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 214–219. IEEE (2011)
Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47–66 (2013)
Huang, D.-L., Rau, P.-L.P., Salvendy, G.: Perception of information security. Behav. Inf. Technol. 29(3), 221–232 (2010)
Vörös, P., Kiss, A.: Tookie: a new way to secure sessions. In: Recent Developments in Intelligent Information and Database Systems, pp. 195–207. Springer, Berlin (2016)
Csubák, D., Szücs, K., Vörös, P., Kiss, A.: Big data testbed for network attack detection. Acta Polytech. Hung. 13(2), 47–57 (2016)
Vörös, P., Laki, S., Kiss, A.: Distributed firewall on dataplane against ddos attack. 4th Winter School of Ph.D. Students in Informatics and Mathematics, p. 37
The treacherous twelve cloud - computing top threats in 2016 (2016). https://cloudsecurityalliance.org/group/top-threats
U. D. O. HEALTH, H. S. A. for Children, and Families, “State and tribal child welfare information systems, information security data breach response plans. Technical report (2015)
Pearson, S., Shen, Y., Mowbray, M.: A privacy manager for cloud computing. In: IEEE International Conference on Cloud Computing, pp. 90–106. Springer, Berlin (2009)
Song, D., Shi, E., Fischer, I., Shankar, U.: Cloud data protection for the masses. Computer 45(1), 39–45 (2012)
Antonenkov, L., Romanovskiy, S., Uraltsev, N., Prokofiev, A.: Client-side encryption, US Patent App. 14/271,918, 18 Dec 2014
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing security, pp. 85–90. ACM, New York (2009)
Sanamrad, T., Nick, P., Widmer, D., Kossmann, D., Braun, L.: My private google calendar and gmail. IEEE Data Eng. Bull. 35(4), 83–92 (2012)
He, W., Akhawe, D., Jain, S., Shi, E., Song, D.: Shadowcrypt: encrypted web applications for everyone. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1028–1039. ACM, New York (2014)
Jones, M.N., Mewhort, D.J.: Case-sensitive letter and bigram frequency counts from large-scale english corpora. Behav. Res. Methods Instrum. Comput. 36(3), 388–396 (2004)
Acknowledgements
Supported by the ÚNKP-18-3 New National Excellence Program of the Ministry of Human Capacities.
The project was supported by the European Union, co-financed by the European Social Fund (EFOP-3.6.3-VEKOP-16-2017-00002).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Vörös, P., Hudoba, P., Kiss, A. (2020). Steganography and Cryptography for User Data in Calendars. In: Huk, M., Maleszka, M., Szczerbicki, E. (eds) Intelligent Information and Database Systems: Recent Developments. ACIIDS 2019. Studies in Computational Intelligence, vol 830. Springer, Cham. https://doi.org/10.1007/978-3-030-14132-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-14132-5_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14131-8
Online ISBN: 978-3-030-14132-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)