ADVANCED SECURITY IN CLOUD COMPUTING OF MILITARY WEAPONS
Keywords:
steganography,Abstract
Many individuals all around the globe utilise cloud storage services to save and share
their own media files, documents, photos, and videos. Many organisations, both public
and commercial, as well as the military, are increasingly storing their databases in the
cloud. Users' confidence in media cloud service providers' offerings is an important
concern, nevertheless. To protect user data during transmission to the media cloud,
many conventional security measures have been suggested. But here's the rub: military
users face the dilemma of how to trust the cloud to securely provide launching codes to
military admirals and chiefs when scientists create new weapons for the military.
Hackers may readily access sensitive information and military weapon data stored in
cloud storage these days. To prevent the potentially disastrous disclosure of sensitive
military weapon data stored in the cloud to terrorists or hostile nations, this article
suggests using a number of security measures, including steganography, watermarking,
picture encryption, and visual cryptography. Using steganography, one may conceal the
code to fire a weapon behind an image captcha. The number of individuals in a military
group determines how visual cryptography distributes picture captchas. Every sharing
of the captcha will be encrypted. Following this, the cloud and users may authenticate
each share by adding a watermark. Recipients must first de-watermark images, decode
them using visual cryptography, and then get the launch code and captcha. The results
of our research demonstrate that the recommended strategy successfully safeguards the
nation's future
Downloads
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.