Skip to main content

Steganography and Cryptography for User Data in Calendars

  • Chapter
  • First Online:
Intelligent Information and Database Systems: Recent Developments (ACIIDS 2019)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 830))

Included in the following conference series:

  • 749 Accesses

Abstract

Privacy is the ability of an individual or group to seclude themselves, or their private information, and thereby express themselves selectively. Nowadays the increasing usage and popularity of web services indicate the likelihood of privacy disclosures. Data breaches are the number one privacy threat when using cloud services. To avoid the possibility for data theft users should not trust anyone including the service providers. If they do not rely on the providers’ defense methods, they have to make sure that outgoing traffic remains a secret for everyone. In this paper, we propose our model and our prototype implementation for a client-side data encoder, that aims to solve the privacy disclosure problems. We show different binarization (character string to binary string) and encoding methods (binary string to character string), which with, we can provide secure and hidden data encoding by translating the user data into different sentences that can be considered as valid data. We make sure that only encoded data can be stored in the providers’ storage, therefore we not just ensure that no one has direct access to unencoded data, but we are able to conceal the very existence of the encoding at all.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Sources: https://www.talkenglish.com/vocabulary/top-500-adjectives.aspx (Reached: 2018-09-14) https://www.talkenglish.com/vocabulary/top-1000-verbs.aspx (Reached: 2018-09-14) https://www.talkenglish.com/vocabulary/top-1500-nouns.aspx (Reached: 2018-09-14) https://github.com/dominictarr/random-name/blob/master/names.txt (Reached: 2018-09-14) https://github.com/dominictarr/random-name/blob/master/places.txt (Reached: 2018-09-14).

References

  1. Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech house, Boston (2000)

    Google Scholar 

  2. Shaikh, F.B., Haider, S.: Security threats in cloud computing. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 214–219. IEEE (2011)

    Google Scholar 

  3. Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47–66 (2013)

    Article  Google Scholar 

  4. Huang, D.-L., Rau, P.-L.P., Salvendy, G.: Perception of information security. Behav. Inf. Technol. 29(3), 221–232 (2010)

    Article  Google Scholar 

  5. Vörös, P., Kiss, A.: Tookie: a new way to secure sessions. In: Recent Developments in Intelligent Information and Database Systems, pp. 195–207. Springer, Berlin (2016)

    Google Scholar 

  6. Csubák, D., Szücs, K., Vörös, P., Kiss, A.: Big data testbed for network attack detection. Acta Polytech. Hung. 13(2), 47–57 (2016)

    Google Scholar 

  7. Vörös, P., Laki, S., Kiss, A.: Distributed firewall on dataplane against ddos attack. 4th Winter School of Ph.D. Students in Informatics and Mathematics, p. 37

    Google Scholar 

  8. The treacherous twelve cloud - computing top threats in 2016 (2016). https://cloudsecurityalliance.org/group/top-threats

  9. U. D. O. HEALTH, H. S. A. for Children, and Families, “State and tribal child welfare information systems, information security data breach response plans. Technical report (2015)

    Google Scholar 

  10. Pearson, S., Shen, Y., Mowbray, M.: A privacy manager for cloud computing. In: IEEE International Conference on Cloud Computing, pp. 90–106. Springer, Berlin (2009)

    Google Scholar 

  11. Song, D., Shi, E., Fischer, I., Shankar, U.: Cloud data protection for the masses. Computer 45(1), 39–45 (2012)

    Article  Google Scholar 

  12. Antonenkov, L., Romanovskiy, S., Uraltsev, N., Prokofiev, A.: Client-side encryption, US Patent App. 14/271,918, 18 Dec 2014

    Google Scholar 

  13. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing security, pp. 85–90. ACM, New York (2009)

    Google Scholar 

  14. Sanamrad, T., Nick, P., Widmer, D., Kossmann, D., Braun, L.: My private google calendar and gmail. IEEE Data Eng. Bull. 35(4), 83–92 (2012)

    Google Scholar 

  15. He, W., Akhawe, D., Jain, S., Shi, E., Song, D.: Shadowcrypt: encrypted web applications for everyone. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1028–1039. ACM, New York (2014)

    Google Scholar 

  16. Jones, M.N., Mewhort, D.J.: Case-sensitive letter and bigram frequency counts from large-scale english corpora. Behav. Res. Methods Instrum. Comput. 36(3), 388–396 (2004)

    Article  Google Scholar 

Download references

Acknowledgements

Supported by the ÚNKP-18-3 New National Excellence Program of the Ministry of Human Capacities.

The project was supported by the European Union, co-financed by the European Social Fund (EFOP-3.6.3-VEKOP-16-2017-00002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Péter Vörös .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Vörös, P., Hudoba, P., Kiss, A. (2020). Steganography and Cryptography for User Data in Calendars. In: Huk, M., Maleszka, M., Szczerbicki, E. (eds) Intelligent Information and Database Systems: Recent Developments. ACIIDS 2019. Studies in Computational Intelligence, vol 830. Springer, Cham. https://doi.org/10.1007/978-3-030-14132-5_19

Download citation

Publish with us

Policies and ethics