A Hybrid Cryptography Technique for Cloud Data Security

A Hybrid Cryptography Technique for Cloud Data Security

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-11
Year of Publication : 2022
Authors : Swetha Gadde, J. Amutharaj, S. Usha
DOI : 10.14445/22315381/IJETT-V70I11P228

How to Cite?

Swetha Gadde, J. Amutharaj, S. Usha, "A Hybrid Cryptography Technique for Cloud Data Security," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 258-267, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I11P228

Abstract
Nowadays, data sharing and storage is one of the most frequent activities associated with cloud computing. Since cloud computing handles large-scale user data at a time, sometimes it contains confidential information or data of the user that needs additional security so that the user can store the information in the cloud storage over the un-trusted computing network. In this regard, cloud data security becomes the primary need for storing confidential information or data over the cloud. The symmetric encryption approach is considered one of the best cryptography techniques to secure cloud data. It provides more security to the cloud information or data than other techniques. This research paper proposes a hybrid symmetric encryption technique to offer additional security to the user's data stored in the cloud compared to the single symmetric encryption approach. The investigated techniques show high processing speed and secure data sharing over the cloud with others. In addition, the computation time associated with the encryption and decryption is also minimized even when multiple users access the same file over the cloud. The proposed method aims to improve the privacy policy by investigating new algorithms for extra cloud data security. There is a broad scope of cryptography techniques in cloud computing, not only for securing the cloud data but also for solving various security and privacy issues while dealing with confidential data.

Keywords
Cryptography, Cloud Data, Decryption, Data Security, Encryption

Reference
[1] Lizhe Wang, Gregor von Laszewski, Andrew Younge, Xi He, Marcel Kunze, Jie Tao and Cheng Fu "Cloud Computing: A Perspective Study," New Generation Computing, vol. 28, no. 2, pp. 137–146, 2010. Crossref, https://doi.org/10.1007/s00354-008-0081-5
[2] L. M. Kaufman, "Data Security in the World of Cloud Computing," IEEE Security & Privacy, vol. 7, no. 4, pp. 61–64, 2009. Crossref, https://doi.org/10.1109/MSP.2009.87
[3] R. V. Rao and K. Selvamani, "Data Security Challenges and its Solutions in Cloud Computing," Procedia Computer Science, vol. 48, pp. 204–209, 2015 Crossref, https://doi.org/10.1016/j.procs.2015.04.171
[4] N. Jirwan, A. Singh, and S. Vijay, "Review and Analysis of Cryptography Techniques," International Journal of Scientific and Engineering Research, vol. 4, no. 3, pp. 1–6, 2013.
[5] A. J. Amalraj and J. R. Jose, "A Survey Paper on Cryptography Techniques," International Journal of Computer Science and Mobile Computing, vol. 5, no. 8, pp. 55–59, 2016.
[6] Olu Olu Osaronwolu, Matthias Daniel and V. I. E Anireh, "A Secured Deduplication of Encrypted Data Over an Attribute-Based Cloud Storage," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 7, pp. 77-83, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I7P113
[7] V. K. Mitali and A. Sharma, "A Survey on Various Cryptography Techniques," International Journal on Emerging Trends in Technology, vol. 3, no. 4, pp. 307–312, 2014.
[8] M. Sudha and M. Monica, "Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography," Advances in Computer Science and its Applications, vol. 1, no. 1, pp. 32–37, 2012.
[9] L. Arockiam and S. Monikandan, "Efficient Cloud Storage Confidentiality to Ensure Data Security," in 2014 International Conference on Computer Communication and Informatics, pp. 1-5, 2014. Crossref, https://doi.org/10.1109/ICCCI.2014.6921762
[10] S. K. Sood, "A Combined Approach to Ensure Data Security in Cloud Computing," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, 2012. Crossref, https://doi.org/10.1016/j.jnca.2012.07.007
[11] S. Kaushik and C. Gandhi, "Cloud Data Security with Hybrid Symmetric Encryption," in 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 636-640, 2016. Crossref, https://doi.org/10.1109/ICCTICT.2016.7514656
[12] O. Hosam and M. H. Ahmad, "Hybrid Design for Cloud Data Security using Combination of AES, ECC and LSB Steganography," International Journal of Computational Science and Engineering, vol. 19, no. 2, pp. 153–161, 2019. Crossref, https://doi.org/10.1504/IJCSE.2019.100236
[13] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure Ranked Keyword Search Over Encrypted Cloud Data," in 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 253–262, 2010. Crossref, https://doi.org/10.1109/ICDCS.2010.34
[14] B. Chor, N. Gilboa, and M. Naor, “Private Information Retrieval by Keywords,” Citeseer, 1997.
[15] P. Prasad, B. Ojha, R. R. Shahi, R. Lal, A. Vaish, and U. Goel, "3-Dimensional Security in Cloud Computing," in 2011 3rd International Conference on Computer Research and Development, vol. 3, pp. 198–201, 2011. Crossref, https://doi.org/10.1109/ICCRD.2011.5764279
[16] S. K. Sood, A. K. Sarje and K. Singh, "A Secure Dynamic Identity-Based Authentication Protocol for Multi-Server Architecture," Journal of Network and Computer Applications, vol. 34, no. 2, pp. 609–618, 2011. Crossref, https://doi.org/10.1016/j.jnca.2010.11.011
[17] Atiewi S, Al-Rahayfeh A, Almiani M, Yussof S, Alfandi O, Abugabah A and Jararweh Y, “Scalable and Secure Big Data Iot System Based on Multifactor Authentication and Lightweight Cryptography,” IEEE Access, vol. 8, pp. 113498–113511, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3002815
[18] Barrett P, “Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor,” In Conference on the Theory and Application of Cryptographic Techniques, Springer, Berlin, Heidelberg, vol. 263, pp. 311–323, 1986. Crossref, https://doi.org/10.1007/3-540-47721-7_24
[19] Chidambaram N, Raj P, Thenmozhi K and Amirtharajan R, “Advanced Framework for Highly Secure and Cloud-Based Storage of Colour Images,” IET Image Process, vol. 14, no. 13, pp. 3143–3153, 2020. Crossref, https://doi.org/10.1049/iet-ipr.2018.5654
[20] Fu X, Nie X, Wu T and Li F, “Large Universe Attribute based Access Control with Efficient Decryption in Cloud Storage System,” Journal of Systems and Software, vol. 135, no.c, pp. 157–164, 2018 Crossref, https://doi.org/10.1016/j.jss.2017.10.020
[21] BalasubramanianPrabhu kavin and Ganapathy S, “A Secured Storage and Privacy-Preserving Model Using CRT for Providing Security on Cloud and Iot-Based Applications,” Comput Networks, vol. 151, pp. 181–190, 2019. Crossref, https://doi.org/10.1016/j.comnet.2019.01.032
[22] Arun Pratap Singh and Himanshu Pundir, "Secure File Storage On Cloud Using Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 5, pp. 12-15, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I5P104
[23] Guan Y, Shao J, Wei G and Xie M, “Data Security and Privacy in Fog Computing,” IEEE Networks, vol. 32, no. 5, pp. 106– 111, 2018. Crossref, https://doi.org/10.1109/MNET.2018.1700250
[24] Gudeme JR, Pasupuleti SK and Kandukuri R, “Attribute-Based Public Integrity Auditing for Shared Data with Efficient User Revocation in Cloud Storage,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 1-14, 2020. Crossref, https://doi.org/10.1007/s12652-020-02302-6
[25] Guo C, Jia J, Choo K-KR and Jie Y, “Privacy-Preserving Image Search (PPIS): Secure Classification and Searching using Convolutional Neural Network Over Large-Scale Encrypted Medical Images,” Computers & Security, vol. 99, pp. 102021, 2020. Crossref, https://doi.org/10.1016/j.cose.2020.102021
[26] Gupta S, Deep K and Mirjalili S, “An Efficient Equilibrium Optimizer with Mutation Strategy for Numerical Optimization,” Applied Soft Computing, vol. 96, pp. 106542, 2020. Crossref, https://doi.org/10.1016/j.asoc.2020.106542
[27] Maryann Thomas and S. V. Athawale, "Study of Cloud Computing Security Methods: Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 4, pp. 1-5, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I4P101
[28] Gadde, Swetha, Amutharaj J and Usha S, “Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques," International Journal of Computer Science and Network Security, vol. 22, no. 5, pp. 342-347, 2022.
[29] F. Maqsood, M. Ahmed, M. M. Ali, and M. A. Shah, "Cryptography: A Comparative Analysis for Modern Techniques," International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 442–448, 2017. Crossref, https://doi.org/10.14569/IJACSA.2017.080659
[30] Swetha G and Janaki K, "Cloud-Based Secure Multimedia Medical Data Using Optimized Convolutional Neural Network and Cryptography Mechanism," Multimedia Tools and Applications, vol. 81, no. 23, pp. 33971–34007, 2022. Crossref, https://doi.org/10.1007/s11042-022-12466-2
[31] Gomathi N and Karlekar NP, “Ontology and Hybrid Optimization Based SVNN for Privacy Preserved Medical Data Classification in the Cloud,” International Journal on Artificial Intelligence Tools, vol. 28, no. 3, pp. 1950009, 2019. Crossref, https://doi.org/10.1142/S021821301950009X