0% found this document useful (0 votes)
9 views

Cloud Security Journal

Cloud Security Journal

Uploaded by

shanmugaraja85
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Cloud Security Journal

Cloud Security Journal

Uploaded by

shanmugaraja85
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 9

TO USING HYBRID CRYPTOGRAPHY, THE CLOUD CAN STORE FILES SECURELY

1
First Author,2 Second Author
1
Assistant Professor, 2 (Computer Science)
1,2
Department of Computer Science,
1,2
College Name and Address
Abstract— many industries, including the that the user uploads to the cloud will be securely
military, higher education, and others, use the stored there after being encrypted with a user-
cloud for a variety of services and the massive specific key, as seen in the above image. Security
data storage that it offers. Without having direct issues have grown more pressing as the digital
access to the server computer, users can request environment continues to evolve. These dangers
to see or retrieve data stored in this cloud. The primarily target cloud computing vendors because
various organisations and IT industries are of an organization's overall lack of insight into data
using cloud computing at a fast increasing rate, access and movement. Regardless of where client
which makes new software more affordable. information is stored, organisations handling data
Cloud computing is helpful since it's affordable may face significant governance and compliance
and makes knowledge easily accessible. issues if they don't take aggressive steps to
Numerous benefits of cloud computing include strengthen their cloud security. Regardless of the
minimal costs and online information size of your business, cloud security has to be a hot
accessibility. Considering that customers topic of discussion. Cloud infrastructure supports
frequently save sensitive data with cloud storage almost every aspect of modern computing and is
providers that may not be trustworthy ensuring present across all industries and verticals. The
cloud computing security may be a key proposed paradigm has the ability to meet cloud
consideration for the cloud computing data centre security needs. Data security and
ecosystem. Therefore, maintaining data from an privacy protection meet the fundamental challenge
untrusted cloud while exchanging it securely of keeping sensitive data apart from access control.
continues to be a difficult problem. By using Cryptography is used to convert the original data
AES and the RSA algorithm to store data over a into an unintelligible representation. There are two
single cloud, my method guarantees the security forms of cryptography: public key cryptography
and privacy of important customer information. and symmetric key cryptography. Using keys, this
Keywords— cloud computing, information sharing, approach transforms data into a format that is not
gratitude.AES and RSA algorithm readable. As a result, data on cloud servers can only
I. INTRODUCTION be accessed by authorised individuals. Information

A hybrid cryptography scheme is offered as a that has been ciphered is accessible to everybody.

means of safely storing files on the cloud. Because Compared to other symmetric algorithms, blowfish

the data are encrypted and only authorised users provides the quickest encryption and decryption

may access them, users can securely save their files rates when used to encrypt file slices. The

in online cloud storage with this method. The files principles of splitting and merging are added to
satisfy the idea of data security. The hybrid cloud storage it can be through testing and
approach boosts the security of the remote server in simulations.
a cloud environment, hence increasing user
2.2 "A Hybrid Encryption Scheme for Cloud
confidence in cloud providers. Data security is a
Storage Security" by M.A. Khan, M.A. Rahman,
primary concern. This technology may be used in
and M. Islam [2021]
the banking and corporate sectors to securely
transmit secret data. For the security of cloud storage, this paper
proposes a hybrid encryption technique that
II.LITERATURE SURVEY
combines symmetric and asymmetric encryption.
Performance Analysis Systems constitute the The suggested method makes use of the AES
foundation of every mentorship programme. An algorithms for decryption and encryption,
person will undoubtedly advance with the support respectively. The research evaluates the
and direction of statistical data, which will also performance and security of the proposed system
contribute to the success of the company that through simulations and testing, demonstrating how
employs him. To examine comparable current effectively it may allay security worries in cloud
methods that are used to analyse student storage.
performance, a background investigation is
2.3 "Secure File Storage and Sharing in Cloud
conducted. We first get a knowledge of three
Computing Using Hybrid Cryptography" by P.
current systems that bear similarities to the
Kumar and P. Singh [2020]
proposed system before beginning our literature
review. This research proposes a hybrid
2.1 "Enhanced Security for Cloud Storage Using cryptography strategy for file sharing and storage in
Hybrid Cryptography" by S.S.S. Sharma and S. cloud computing. The model uses the encryption
Kumari [2022] techniques of AES to ensure the integrity and
secrecy of the data. The study demonstrates the
This paper proposes a hybrid cryptography-
effectiveness and security of the recommended
based enhanced cloud storage security paradigm
strategy using tests and simulations.
that combines the RSA encryption and decryption
techniques. The proposed paradigm also includes a 2.4 Rohit Barvekar, Shrajal Behere, Yash
secure key management method that ensures the Pounikar, and Ms. Anushka Gulhane, "Secure
confidentiality and integrity of data kept in cloud File Storage and Sharing in Cloud Computing
storage. The study evaluates the proposed using Hybrid Cryptography" (2019)
architecture's performance and shows how safe
The recommended security measures that Proposed System
will prevent sensitive data from being used The recommended system describes the proposed
unlawfully will make the system more trustworthy. system, which offers a method for securely storing
Keys will be used in the proposed method for both information in the cloud using a hybrid
encryption and decryption. cryptography algorithm. Thanks to this technology,
users may safely store data in online cloud storage
2.5 The work "Secure File Storage and Sharing
since the files are encrypted and only authorised
in Cloud Computing using Hybrid
users can access them. As seen in the above
Cryptography" by A. Sharma and K. Sharma.
graphic, the data that the user uploads to the cloud
[2018]
will be safely kept there after being encrypted with
This research proposes a hybrid a user-specific key.
cryptography-based approach for cloud computing
and secure file storage that combines AES and ECC
encryption. The recommended method ensures
confidentiality, integrity, and availability by
utilising encryption and decryption methods. The
study demonstrates the effectiveness and security of
the recommended strategy using tests and Proposed Architecture
simulations.

III. SYSTEM IMPLEMENTATION


Methodology
Existing System Advanced Encryption Standard (AES) with RSA
Within the current framework, cloud computing algorithm
offers a number of advantages, such as low prices To get the security of RSA with the speed of
and convenient access to information on the AES, combine symmetric encryption with RSA
Internet. Ensuring cloud computing security may be encryption in this approach. Usually, to do this, a
a crucial factor for the cloud computing temporary AES key, also known as a session key, is
environment as users commonly save sensitive generated and secured using RSA encryption. There
information with cloud storage providers, yet these are other symmetric encryption techniques than
providers may not be trusted. As such, securely AES.
transmitting data from an unreliable cloud while The Advanced Encryption Standard, or
ensuring data integrity remains a challenging issue. AES, is widely used globally. It belongs to a group
of encryption techniques known as "symmetric" fascinating math problem. When you have two
encryption. In other words, data is encrypted and physically distinct endpoints, you often utilise RSA
decrypted using the same secret, which is an keys. RSA encryption is frequently utilised in VPN
encryption key. Probably the most used encryption connections, web browser connections to your
technique for safeguarding data when it's at rest is favourite websites, and several more applications.
AES encryption. It is utilised in storage encryption, Every day, we employ asymmetric encryption.
database encryption, self-encrypting disc drives, Implementation
and other applications. It is a global standard that Data Owner (DO): The owner uploads the data to
has existed since roughly 2002. Basically, data and a cloud server. The file is divided into octet
the secret encryption key are entered into software segments, and utilising multithreading, each
that carries out AES encryption, and the result is segment is encoded concurrently. The encoded file
encrypted data. When you wish to utilise that data, is kept on a cloud server. The cover picture stores
you just enter the encrypted data into the the encryption keys. The multiuser environment is
programme together with the same encryption key, known as cloud computing.
and the original data appears that you may use. Data User (DU): File request from a Cloud User.
We'll talk about other symmetric key encryption Upon requesting the file, the user also receives a
techniques in more detail below.The three people key via email that includes important details. The
who invented the encryption technique—Adi file is decoded using a reverse technique.
Shamir, Leonard Adleman, and Ron Rivest—are Admin: After entering the home page, admin acts
honoured in the name of RSA encryption. RSA is a as the owner of the application and can activate and
member of the "asymmetric" encryption class of deactivate users as well as view all uploaded file
encryption techniques. Due to the usage of two details and request details. If the username and
linked secrets, or keys, for encryption, the term password are entered correctly, only admin can
"asymmetric" was born. The terms "public key" and access the home page; if the details entered are
"private key" refer to the two types of keys. The incorrect, admin cannot access the home page.
relationship between the keys is that only the Cloud: With all registered users' information,
corresponding private key may be used to decode owners' uploaded file information, and user-
data encrypted with the public key. Additionally, downloaded information, the admin of the cloud
the opposite is also true: only the corresponding module may manage it.
public key may be used to decrypt data that has Experimental Results
been encrypted using the private key. Factorization
and very huge prime integers are used in this
IV. CONCLUSIONS
Many large staggered organisations have moved
to storing and sharing their information on the
cloud because to its many benefits. The first step in
this effort is to raise awareness of the serious
security risks that owners of data face while sharing
it on the cloud. The most popular information
sharing schemes are then quickly reviewed to
identify any shortcomings in each of them. This
study suggests a privilege-based multilevel
organisational data sharing strategy that allays the
concerns and allows for the safe and effective
exchange of data on the cloud. divides a document
containing information into many sections based on
the benefits to the client and the material's impact.
Then, each information file portion is common, [3] In IEEE Wispnet 2020, Punam V. Maitri and
depending on the benefits of the information client. Aruna Verma present "Secure File Storage In Cloud
Assuming that the DBDH presumption is true, we Computing Using Hybrid Cryptography
formally show that is safe against adaptively Algorithm."
selected plaintext attack. This system's primary goal [4] Rashidhagat and Purvi Joshi, "Hybrid
is to safely store and retrieve data on the cloud that Cryptography for Secure File Storage,"
is under the exclusive control of the data owner. International Journal of Innovative Research in
Data security concerns with cloud storage are Technology (IJIRT), 2020.
resolved through the use of steganography and [5] Bilal Habib, Bertrand Cambou, Duane Booher,
cryptography methods. In order to secure data, the Christopher Philabaum, Public Key Exchange
AES and RSA algorithms are used. Key data is Scheme That Is Addressable (PKA), 2019 IEEE
securely preserved with the use of LSB technology CNS.
(Steganography). Using the multithreading [6]. "Secure Data Sharing In Cloud Storage Using
technology, the encryption and decryption Key Aggregation Cryptography," Tulip Dutta,
procedure takes less time. We have achieved Amarjyoti Pathak, 2019.
improved data integrity, high security, low latency, [7]. Bhale Pradeep Kumar Gajendra, Vinay Kumar
authentication, and secrecy with the aid of the Singh, and More Sujeet, "Achieving Cloud Security
suggested security mechanism. Through Identity-Based Encryption, MD5, and
Third Party Auditor," ICCCA2018.
REFERENCES
[8] Shakeeba S. Khan, Professor R.R. Tuteja,
[1] “Secure File Storage On Cloud Using Hybrid "Cryptographic Algorithms and Security in Cloud
Cryptography Algorithm,” Uttam Kumar, Mr. Jay Computing," 2017.
Prakash, International Journal Of Creative Research
Thoughts (IJCRT), 2021. 2320-2882 is the ISSN.
[Prime Document].
[2] The paper "Secure File Sharing Using
Cryptographic Techniques In Cloud" was presented
at the 2021 International Conference On Green
Computing Communication And Electrical
Engineering (ICGCCEE) by M. Malarvizhi, J.
Angela Jennifa Sujana, and T. Revathi.

You might also like