Towards Empowering Cyber Attack Resiliency Using Steganography
Jędrzej Bieniasz , Krzysztof Szczypiorski
AbstractThe fog computing has emerged as the extension of cloud computing to the network edge. The idea could be considered as a promising mechanism for cybersecurity by assuming that higher uncertainty of information from perspective of adversaries would improve the security of networks and data. This approach is recognized as cyberfog security in which data, split into fragments, is dispersed across multiple end-user devices. Even if some of them would be compromised, the adversary could not decode information and the availability of data would not be affected. This paper considers applying two steganographic proposals (StegHash and SocialStegDisc) for a new distributed communication system by fulfilling assumptions of cyberfog security approach. The initial design of such system is proposed. Features and limitations were analyzed to prepare recommendations for further development and research.
|Publication size in sheets||0.5|
|Book||Jacques Blanc-talon, Szczypiorski Krzysztof (eds.): Proceedings of the 4th International Conference on Frontiers of Signal Processing - ICFSP 2018, 2018, IEEEXplore, ISBN 978-1-5386-7852-7, 175 p.|
|Keywords in English||fog computing; information hiding; steganography; distributed filesystems; StegHash; SocialStegDisc; cyber-physical systems|
|Score|| = 0.0, 03-12-2018, BookChapterMatConf|
= 0.0, 03-12-2018, BookChapterMatConf
* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.