A Hybrid Cryptography Technique for Cloud Data Security
A Hybrid Cryptography Technique for Cloud Data Security
|© 2022 by IJETT Journal|
|Year of Publication : 2022|
|Authors : Swetha Gadde, J. Amutharaj, S. Usha
|DOI : 10.14445/22315381/IJETT-V70I11P228|
How to Cite?
Swetha Gadde, J. Amutharaj, S. Usha, "A Hybrid Cryptography Technique for Cloud Data Security," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 258-267, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I11P228
Cryptography, Cloud Data, Decryption, Data Security, Encryption
 Lizhe Wang, Gregor von Laszewski, Andrew Younge, Xi He, Marcel Kunze, Jie Tao and Cheng Fu "Cloud Computing: A Perspective Study," New Generation Computing, vol. 28, no. 2, pp. 137–146, 2010. Crossref, https://doi.org/10.1007/s00354-008-0081-5
 L. M. Kaufman, "Data Security in the World of Cloud Computing," IEEE Security & Privacy, vol. 7, no. 4, pp. 61–64, 2009. Crossref, https://doi.org/10.1109/MSP.2009.87
 R. V. Rao and K. Selvamani, "Data Security Challenges and its Solutions in Cloud Computing," Procedia Computer Science, vol. 48, pp. 204–209, 2015 Crossref, https://doi.org/10.1016/j.procs.2015.04.171
 N. Jirwan, A. Singh, and S. Vijay, "Review and Analysis of Cryptography Techniques," International Journal of Scientific and Engineering Research, vol. 4, no. 3, pp. 1–6, 2013.
 A. J. Amalraj and J. R. Jose, "A Survey Paper on Cryptography Techniques," International Journal of Computer Science and Mobile Computing, vol. 5, no. 8, pp. 55–59, 2016.
 Olu Olu Osaronwolu, Matthias Daniel and V. I. E Anireh, "A Secured Deduplication of Encrypted Data Over an Attribute-Based Cloud Storage," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 7, pp. 77-83, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I7P113
 V. K. Mitali and A. Sharma, "A Survey on Various Cryptography Techniques," International Journal on Emerging Trends in Technology, vol. 3, no. 4, pp. 307–312, 2014.
 M. Sudha and M. Monica, "Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography," Advances in Computer Science and its Applications, vol. 1, no. 1, pp. 32–37, 2012.
 L. Arockiam and S. Monikandan, "Efficient Cloud Storage Confidentiality to Ensure Data Security," in 2014 International Conference on Computer Communication and Informatics, pp. 1-5, 2014. Crossref, https://doi.org/10.1109/ICCCI.2014.6921762
 S. K. Sood, "A Combined Approach to Ensure Data Security in Cloud Computing," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, 2012. Crossref, https://doi.org/10.1016/j.jnca.2012.07.007
 S. Kaushik and C. Gandhi, "Cloud Data Security with Hybrid Symmetric Encryption," in 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 636-640, 2016. Crossref, https://doi.org/10.1109/ICCTICT.2016.7514656
 O. Hosam and M. H. Ahmad, "Hybrid Design for Cloud Data Security using Combination of AES, ECC and LSB Steganography," International Journal of Computational Science and Engineering, vol. 19, no. 2, pp. 153–161, 2019. Crossref, https://doi.org/10.1504/IJCSE.2019.100236
 C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure Ranked Keyword Search Over Encrypted Cloud Data," in 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 253–262, 2010. Crossref, https://doi.org/10.1109/ICDCS.2010.34
 B. Chor, N. Gilboa, and M. Naor, “Private Information Retrieval by Keywords,” Citeseer, 1997.
 P. Prasad, B. Ojha, R. R. Shahi, R. Lal, A. Vaish, and U. Goel, "3-Dimensional Security in Cloud Computing," in 2011 3rd International Conference on Computer Research and Development, vol. 3, pp. 198–201, 2011. Crossref, https://doi.org/10.1109/ICCRD.2011.5764279
 S. K. Sood, A. K. Sarje and K. Singh, "A Secure Dynamic Identity-Based Authentication Protocol for Multi-Server Architecture," Journal of Network and Computer Applications, vol. 34, no. 2, pp. 609–618, 2011. Crossref, https://doi.org/10.1016/j.jnca.2010.11.011
 Atiewi S, Al-Rahayfeh A, Almiani M, Yussof S, Alfandi O, Abugabah A and Jararweh Y, “Scalable and Secure Big Data Iot System Based on Multifactor Authentication and Lightweight Cryptography,” IEEE Access, vol. 8, pp. 113498–113511, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3002815
 Barrett P, “Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor,” In Conference on the Theory and Application of Cryptographic Techniques, Springer, Berlin, Heidelberg, vol. 263, pp. 311–323, 1986. Crossref, https://doi.org/10.1007/3-540-47721-7_24
 Chidambaram N, Raj P, Thenmozhi K and Amirtharajan R, “Advanced Framework for Highly Secure and Cloud-Based Storage of Colour Images,” IET Image Process, vol. 14, no. 13, pp. 3143–3153, 2020. Crossref, https://doi.org/10.1049/iet-ipr.2018.5654
 Fu X, Nie X, Wu T and Li F, “Large Universe Attribute based Access Control with Efficient Decryption in Cloud Storage System,” Journal of Systems and Software, vol. 135, no.c, pp. 157–164, 2018 Crossref, https://doi.org/10.1016/j.jss.2017.10.020
 BalasubramanianPrabhu kavin and Ganapathy S, “A Secured Storage and Privacy-Preserving Model Using CRT for Providing Security on Cloud and Iot-Based Applications,” Comput Networks, vol. 151, pp. 181–190, 2019. Crossref, https://doi.org/10.1016/j.comnet.2019.01.032
 Arun Pratap Singh and Himanshu Pundir, "Secure File Storage On Cloud Using Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 5, pp. 12-15, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I5P104
 Guan Y, Shao J, Wei G and Xie M, “Data Security and Privacy in Fog Computing,” IEEE Networks, vol. 32, no. 5, pp. 106– 111, 2018. Crossref, https://doi.org/10.1109/MNET.2018.1700250
 Gudeme JR, Pasupuleti SK and Kandukuri R, “Attribute-Based Public Integrity Auditing for Shared Data with Efficient User Revocation in Cloud Storage,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 1-14, 2020. Crossref, https://doi.org/10.1007/s12652-020-02302-6
 Guo C, Jia J, Choo K-KR and Jie Y, “Privacy-Preserving Image Search (PPIS): Secure Classification and Searching using Convolutional Neural Network Over Large-Scale Encrypted Medical Images,” Computers & Security, vol. 99, pp. 102021, 2020. Crossref, https://doi.org/10.1016/j.cose.2020.102021
 Gupta S, Deep K and Mirjalili S, “An Efficient Equilibrium Optimizer with Mutation Strategy for Numerical Optimization,” Applied Soft Computing, vol. 96, pp. 106542, 2020. Crossref, https://doi.org/10.1016/j.asoc.2020.106542
 Maryann Thomas and S. V. Athawale, "Study of Cloud Computing Security Methods: Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 4, pp. 1-5, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I4P101
 Gadde, Swetha, Amutharaj J and Usha S, “Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques," International Journal of Computer Science and Network Security, vol. 22, no. 5, pp. 342-347, 2022.
 F. Maqsood, M. Ahmed, M. M. Ali, and M. A. Shah, "Cryptography: A Comparative Analysis for Modern Techniques," International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 442–448, 2017. Crossref, https://doi.org/10.14569/IJACSA.2017.080659
 Swetha G and Janaki K, "Cloud-Based Secure Multimedia Medical Data Using Optimized Convolutional Neural Network and Cryptography Mechanism," Multimedia Tools and Applications, vol. 81, no. 23, pp. 33971–34007, 2022. Crossref, https://doi.org/10.1007/s11042-022-12466-2
 Gomathi N and Karlekar NP, “Ontology and Hybrid Optimization Based SVNN for Privacy Preserved Medical Data Classification in the Cloud,” International Journal on Artificial Intelligence Tools, vol. 28, no. 3, pp. 1950009, 2019. Crossref, https://doi.org/10.1142/S021821301950009X