Is Cloud Computing Steganography-Proof?
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security the authors move to brief description of steganography. In particular they introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver. These scenarios as well as the threats that steganographic methods can cause must be taken into account when designing secure cloud computing services. Cloud computing is a very popular but still evolving paradigm. It allows customers of cloud providers to avoid start-up costs and/or reduce operating cost. It also increases their flexibility by immediately acquiring services and infrastructural resources when needed.