Cloud Storage Security using Firebase and Fernet Encryption

Cloud Storage Security using Firebase and Fernet Encryption

© 2022 by IJETT Journal
Volume-70 Issue-9
Year of Publication : 2022
Authors : Dhruv Sharma, C. Fancy
DOI : 10.14445/22315381/IJETT-V70I9P237

How to Cite?

Dhruv Sharma, C. Fancy, "Cloud Storage Security using Firebase and Fernet Encryption" International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 371-375, 2022. Crossref,

In a brief span of time, cloud computing has revolutionized from a small network of computers to virtualizing ‘n’ a number of operating systems on your personal system. It offers a lot of services in just one click. The services are majorly divided into three categories, Infrastructure as a service (IAAS), Platform as a service (PAAS) and Software as a Service (SAAS). There are all possible measures taken to make the cloud secure to work in. They are services-level agreements to clearly explain the security of the clouds and security in the cloud. One of the best and most acceptable methods to secure the data in the cloud is through Encryption Techniques. Encryption Techniques are different for data in rest and data in transition. Still, the probability of data breaches in the cloud has increased from 27.9 percent in 2018 to 29.6 percent in 2019. All confidential and sensitive data falls in the hand of the attacker, which might damage the organization’s reputation. Adding an extra layer of encryption, data can be secured. If, in some way or the other, the data fall into the wrong hands, even in that condition, the attacker will not be able to open the data as it has double protection and a doubly encrypted layer. So, to add this extra layer of encryption, there are multiple techniques. Some of the most used are DES (Data Encryption Standard), AES (Advanced Encryption Standard), RSA (Rivest, Shamir and Adleman) and Blowfish algorithm.

Cloud computing, Encryption, Security, Data breach, Algorithms.

[1] W. Fumy, and P. Landrock, “Principles of Key Management,” IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 785-793, 1993.
[2] D. Mazieres, M. Kaminsky, M. F. Kaashoek, and E. Witchel, “Separating Key Management from File System Security,” in Proceedings of the Seventeenth Acm Symposium on Operating Systems Principles, pp. 124-139, 1999.
[3] C. K. Wong, and S. S. Lam, “Keystone: A Group Key Management Service,” In the International Conference on Telecommunications, ICT, 2000.
[4] Arun Pratap Singh, Himanshu Pundir, "Secure File Storage on Cloud Using Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 5, pp. 12-15, 2020. Crossref,
[5] M. Eltoweissy, M. H. Heydari, L. Morales, and I. H. Sudborough, “Combinatorial Optimization of Group Key Management,” Journal of Network and Systems Management, vol. 12, no. 1, pp. 33-50, 2004.
[6] K. Lu, Y. Qian, M. Guizani, and H. H. Chen, “A Framework for a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 2, pp. 639-647, 2008.
[7] Maryann Thomas, S. V. Athawale, "Study of Cloud Computing Security Methods: Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 4, pp. 1-5, 2019. Crossref,
[8] Y. Hao, Y. Cheng, C. Zhou, and W. Song, “A Distributed Key Management Framework with Cooperative Message Authentication in Vanets,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 3, pp. 616-629.
[9] A. Ambekar, M. Hassan, and H. D. Schotten, “ Improving Channel Reciprocity for Effective Key Management Systems,” In 2012 International Symposium on Signals, Systems, and Electronics (ISSSE) pp. 1-4, 2012.
[10] M. Pitchaiah, and P. Daniel, “Implementation of Advanced Encryption Standard Algorithm,” 2012.
[11] D. Mukhopadhyay, G. Sonawane, P. S. Gupta, S. Bhavsar, and V. Mittal, “Enhanced Security for Cloud Storage Using File Encryption,” Arxiv Preprint Arxiv, 1303.7075, 2013.
[12] S. H. Seo, X. Ding, and E. Bertino, “Encryption Key Management for Secure Communication in Smart Advanced Metering Infrastructures,” In 2013 IEEE International Conference on Smart Grid Communications (Smart grid comm) , pp. 498-503, 2013.
[13] Y. W. Law, M. Palaniswami, G. Kounga, and A. Lo, “Wake: Key Management Scheme for Wide-Area Measurement Systems in Smart Grid,” IEEE Communications Magazine, vol. 51, no. 1, pp. 34-41, 2013.
[14] R. Arora, A. Parashar, and C. C. I, “Transforming, Secure User Data in Cloud Computing Using Encryption Algorithms,” International Journal of Engineering Research and Applications, vol. 3, no. 4, pp. 1922-1926, 2013.
[15] P. Mahajan, and A. Sachdeva, “A Study of Encryption Algorithms AES, Des and RSA for Security,” Global Journal of Computer Science and Technology , 2013.
[16] R. Chandramouli, M. Iorga, and S. Chokhani, “Cryptographic Key Management Issues and Challenges in Cloud Services,” In Secure Cloud Computing , Springer, New York, NY, pp. 1-30, 2014.
[17] N. Aleisa, “A Comparison of the 3des and AES Encryption Standards,” International Journal of Security and Its Applications, vol. 9, no. 7, pp. 241-246, 2015.
[18] N. Surv, B. Wanve, R. Kamble, S. Patil, and J. Katti, “Framework for Client-Side AES Encryption Technique in Cloud Computing,” In 2015 IEEE International Advance Computing Conference (IACC) , pp. 525-528, 2015.
[19] A. Nandgaonkar, and P. Kulkarni, “Encryption Algorithm for Cloud Computing,” 2016.
[20] M. P. Babitha, and K. R. Babu, “Secure Cloud Storage Using AES Encryption,” In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT) pp. 859-864, 2016.
[21] N. Islam, and M. K. V. Riyas, “Analysis of Various Encryption Algorithms in Cloud Computing,” International Journal of Computer Science and Mobile Computing, vol. 6, no. 7, pp. 90-97, 2017.
[22] S. Thota, R. P. R. Induri, and R. Kune, “Split Key Management Framework for Openstack Swift Object Storage Cloud,” CSI Transactions on ICT, vol. 5, no. 4, pp. 397-406, 2017.
[23] A. Abdullah., “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data,” Cryptography And Network Security, vol. 16, pp. 1-11, 2017.
[24] E. G. Ismail, A. Chahboun, and N. Raissouni, “Fernet Symmetric Encryption Method to Gather MQTT E2e Secure Communications for Iot Devices,” 2020.
[25] S. S. Tyagi., “Enhancing Security of Cloud Data Through Encryption With AES and FERNET Algorithm Through ConvolutionalNeural-Networks (CNN),” International Journal of Computer Networks and Applications, vol. 8, no. 4, pp. 288-299, 2021.
[26] S. Capkun, L. Buttyan, and J. P. Hubaux, “Self-Organized Public-Key Management for Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, 2003.
[27] W. Zeng, Y. Zhao, K. Ou, and W. Song, “Research on Cloud Storage Architecture and Key Technologies,” in Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human , pp. 1044-1048, 2009.