Enhancing Communication Security in Hybrid Cloud Environments Through an Innovative Cryptographic Algorithm

Authors

  • Kuber Datt Gautam Research Scholar, Dr. A. P. J. Abdul Kalam University, Indore, Department of Computer Science and Engineering
  • Rajeev G. Vishwakarma Research Supervisor and Pro Vice-Chancellor, Dr. A. P. J. Abdul Kalam University, Indore, (M.P.), India. Department of Computer Science and Engineering

Keywords:

Cloud Computing, Elliptic Curve Cryptography, Rivest Cipher 6, Message Digest Algorithm 5, Public Cloud

Abstract

Cloud computing, a relatively recent innovation, enhances potential without requiring costly hardware or software updates. It reduces overall system costs by facilitating resource sharing across hardware, software, and platforms. Its widespread adoption and practicality have made it indispensable in today's business world. However, its popularity and reliance on third parties also make it a prime target for cybercriminals. For service providers, security is crucial to gaining customer trust and maintaining a positive brand image. Consequently, many large businesses are shifting their services to the cloud to benefit from its cost-effective and efficient infrastructure sharing. With an abundance of data stored remotely and third-party involvement, prioritizing security is essential. Various security algorithms have been evaluated for their ability to protect sensitive data with minimal resource consumption. This study focuses on data integrity, considering ECC and RC6 as alternatives to ECC + RC6 and MD5. It proposes an enhanced security system based on the ECC and RC6 algorithms and the Role-based Access Control Model. To demonstrate the system's effectiveness, a public cloud application using Java technology was created. The application's computation time for different file sizes and formats was analyzed, offering insights into its performance and potential for secure cloud computing.

Downloads

Download data is not yet available.

References

C Akshita Bhandari, Ashutosh Gupta, Debasis D, “A framework for Data Security and Storage in Cloud Computing”, International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 2016, pp. 1-7.

Arora, Rachna, Anshu Parashar, “Secure user data in cloud computing using encryption algorithms”, International Journal of Engineering Research and Applications, Vol. 3, pp.1922-1926, 2013.

Wang, Cong, “Privacy-preserving public auditing for secure cloud storage”, Computers, IEEE Transactions on Vol 62.2, pp 362-375, 2013.

B. Shereek, “Improve Cloud Computing Security Using RSA Encryption WithFermats Little Theorem”, IOSR Journal of Engineering, vol. 4, no. 2, pp. 01-08, 2014.

B. Samanthula,Y. Elmehdwi, G. Howser and S. Madria, “A secure data sharing and query processing framework via federation of cloud computing”, Information Systems, vol. 48, pp. 196-212, 2015.

Jin-Mook Kim and Jeong-Kyung Moon,”Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments” published in International Journal of Distributed Sensor Networks by Hindwai Publication Corporation. Volume-1, 2014.

Mrudula Sarvabhatla, Chandra Mouli Reddy M, Chandra Sekhar Vorugunti, “A Secure and Light Weight Authentication Service in Hadoop using One Time Pad”, “2nd International Symposium on Big Data and Cloud Computing (ISBCC’15)”, Procedia Computer Science 50 ( 2015 ) 81 – 86.

TumpeMoyo, and JagdevBhogal, “Investigating Security Issues in Cloud Computing. IEEE Eighth International Conference on Complex”, Intelligent and Software Intensive Systems, 2014.

. Nasrin Khanezaei, ZurinaMohdHanapi, “A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services”, System, Process and Control (ICSPC), 2014.

Deyan Chen; Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing", in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on , vol.1, no., pp.647-651, 23-25 March 2012.

C. Y. Chen and J. F. Tu2, “A Novel Cloud Computing Algorithm of Security and Privacy”, Hindawi Publishing Corporation: Mathematical Problems in Engineering, 2013.

G. L. Prakash, M. Prateek and I. Singh, “Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System”, International Journal Of Engineering And Computer Science, vol. 3, issue 4, pp. 5215-5223, April 2014.

ChorB,GilboaN,Naor M, “Private Information Retrieval by Keywords”, Report 98-03, Theory of Cryptography Library, 1998.

D. Zissis and D. Lekkas, “Addressing cloud computing security issues”, Elsevier Journal of Future Generation Computer Systems, vol. 28, pp. 583592, 2012.

F. F. Moghaddam, M. T. Alrashdan and O. Karimi, “A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments”, Journal of Advances in Computer Network, vol. 1, No. 3, Sep. 2013.

Downloads

Published

06.01.2024

How to Cite

Gautam , K. D. ., & Vishwakarma , R. G. . (2024). Enhancing Communication Security in Hybrid Cloud Environments Through an Innovative Cryptographic Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(11s), 640–648. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4485

Issue

Section

Research Article