Cloud Security Journal
Cloud Security Journal
1
First Author,2 Second Author
1
Assistant Professor, 2 (Computer Science)
1,2
Department of Computer Science,
1,2
College Name and Address
Abstract— many industries, including the that the user uploads to the cloud will be securely
military, higher education, and others, use the stored there after being encrypted with a user-
cloud for a variety of services and the massive specific key, as seen in the above image. Security
data storage that it offers. Without having direct issues have grown more pressing as the digital
access to the server computer, users can request environment continues to evolve. These dangers
to see or retrieve data stored in this cloud. The primarily target cloud computing vendors because
various organisations and IT industries are of an organization's overall lack of insight into data
using cloud computing at a fast increasing rate, access and movement. Regardless of where client
which makes new software more affordable. information is stored, organisations handling data
Cloud computing is helpful since it's affordable may face significant governance and compliance
and makes knowledge easily accessible. issues if they don't take aggressive steps to
Numerous benefits of cloud computing include strengthen their cloud security. Regardless of the
minimal costs and online information size of your business, cloud security has to be a hot
accessibility. Considering that customers topic of discussion. Cloud infrastructure supports
frequently save sensitive data with cloud storage almost every aspect of modern computing and is
providers that may not be trustworthy ensuring present across all industries and verticals. The
cloud computing security may be a key proposed paradigm has the ability to meet cloud
consideration for the cloud computing data centre security needs. Data security and
ecosystem. Therefore, maintaining data from an privacy protection meet the fundamental challenge
untrusted cloud while exchanging it securely of keeping sensitive data apart from access control.
continues to be a difficult problem. By using Cryptography is used to convert the original data
AES and the RSA algorithm to store data over a into an unintelligible representation. There are two
single cloud, my method guarantees the security forms of cryptography: public key cryptography
and privacy of important customer information. and symmetric key cryptography. Using keys, this
Keywords— cloud computing, information sharing, approach transforms data into a format that is not
gratitude.AES and RSA algorithm readable. As a result, data on cloud servers can only
I. INTRODUCTION be accessed by authorised individuals. Information
A hybrid cryptography scheme is offered as a that has been ciphered is accessible to everybody.
means of safely storing files on the cloud. Because Compared to other symmetric algorithms, blowfish
the data are encrypted and only authorised users provides the quickest encryption and decryption
may access them, users can securely save their files rates when used to encrypt file slices. The
in online cloud storage with this method. The files principles of splitting and merging are added to
satisfy the idea of data security. The hybrid cloud storage it can be through testing and
approach boosts the security of the remote server in simulations.
a cloud environment, hence increasing user
2.2 "A Hybrid Encryption Scheme for Cloud
confidence in cloud providers. Data security is a
Storage Security" by M.A. Khan, M.A. Rahman,
primary concern. This technology may be used in
and M. Islam [2021]
the banking and corporate sectors to securely
transmit secret data. For the security of cloud storage, this paper
proposes a hybrid encryption technique that
II.LITERATURE SURVEY
combines symmetric and asymmetric encryption.
Performance Analysis Systems constitute the The suggested method makes use of the AES
foundation of every mentorship programme. An algorithms for decryption and encryption,
person will undoubtedly advance with the support respectively. The research evaluates the
and direction of statistical data, which will also performance and security of the proposed system
contribute to the success of the company that through simulations and testing, demonstrating how
employs him. To examine comparable current effectively it may allay security worries in cloud
methods that are used to analyse student storage.
performance, a background investigation is
2.3 "Secure File Storage and Sharing in Cloud
conducted. We first get a knowledge of three
Computing Using Hybrid Cryptography" by P.
current systems that bear similarities to the
Kumar and P. Singh [2020]
proposed system before beginning our literature
review. This research proposes a hybrid
2.1 "Enhanced Security for Cloud Storage Using cryptography strategy for file sharing and storage in
Hybrid Cryptography" by S.S.S. Sharma and S. cloud computing. The model uses the encryption
Kumari [2022] techniques of AES to ensure the integrity and
secrecy of the data. The study demonstrates the
This paper proposes a hybrid cryptography-
effectiveness and security of the recommended
based enhanced cloud storage security paradigm
strategy using tests and simulations.
that combines the RSA encryption and decryption
techniques. The proposed paradigm also includes a 2.4 Rohit Barvekar, Shrajal Behere, Yash
secure key management method that ensures the Pounikar, and Ms. Anushka Gulhane, "Secure
confidentiality and integrity of data kept in cloud File Storage and Sharing in Cloud Computing
storage. The study evaluates the proposed using Hybrid Cryptography" (2019)
architecture's performance and shows how safe
The recommended security measures that Proposed System
will prevent sensitive data from being used The recommended system describes the proposed
unlawfully will make the system more trustworthy. system, which offers a method for securely storing
Keys will be used in the proposed method for both information in the cloud using a hybrid
encryption and decryption. cryptography algorithm. Thanks to this technology,
users may safely store data in online cloud storage
2.5 The work "Secure File Storage and Sharing
since the files are encrypted and only authorised
in Cloud Computing using Hybrid
users can access them. As seen in the above
Cryptography" by A. Sharma and K. Sharma.
graphic, the data that the user uploads to the cloud
[2018]
will be safely kept there after being encrypted with
This research proposes a hybrid a user-specific key.
cryptography-based approach for cloud computing
and secure file storage that combines AES and ECC
encryption. The recommended method ensures
confidentiality, integrity, and availability by
utilising encryption and decryption methods. The
study demonstrates the effectiveness and security of
the recommended strategy using tests and Proposed Architecture
simulations.