An Enhanced Three Layer Cryptographic Algorithm for Cloud Information Security

Authors

  • Anjana Department of CSE & IT, Bhagat Phool Singh Mahila Vishwavidyalaya, Khanpur Kalan, Sonipat, Haryana, India
  • Ajit Singh Department of CSE & IT, Bhagat Phool Singh Mahila Vishwavidyalaya, Khanpur Kalan, Sonipat, Haryana, India

Keywords:

Advanced Encryption Standard, SHA 3, Cloud computing, information security, cloud storage, ChaCha20 encryption, storage security

Abstract

The rapid adoption of cloud computing has ushered in unparalleled opportunities for efficient data storage and processing, but it also brings forth significant challenges related to information security. This study focuses on the design and analysis of effective techniques for enhancing information security in cloud computing environments, with a particular emphasis on the hybrid encryption technique. This research delves into the theoretical underpinnings of AES+ChaCha20 and SHA-3 evaluates its suitability for cloud-based applications, considering factors such as encryption strength, computational efficiency, and resistance to cryptographic attacks. The SHA-3 algorithm is employed to generate fixed-size hash values from input data. In this study, the plain text file is encrypted using the AES+ChaCha20, the cipher text file is hashed using the SHA3 algorithm to produce a message digest. Through a comprehensive analysis, including performance benchmarks and security assessments, this study aims to provide a nuanced understanding of the effectiveness of AES+ChaCha20 in mitigating common threats in cloud computing environments. The outcomes of this research contribute valuable insights to the on-going discourse on information security in cloud computing, offering a foundation for the development and implementation of robust security measures. As organizations increasingly rely on cloud services, the findings of this study are poised to inform best practices for securing data and ensuring the confidentiality and integrity of information in cloud-based systems.

Downloads

Download data is not yet available.

References

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.

Sadeeq, M. A., Zeebaree, S. R., Qashi, R., Ahmed, S. H., & Jacksi, K. (2018, October). Internet of Things security: a survey. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 162-166). IEEE.

Orobosade, A., Favour-Bethy, T. A., Kayode, A. B., & Gabriel, A. J. (2020). Cloud application security using hybrid encryption. Communications on Applied Electronics, 7(33), 25-31.

Kaur, R., & Singh, R. P. (2014, September). Enhanced cloud computing security and integrity verification via novel encryption techniques. In 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1227-1233). IEEE.

Poduval, V., Koul, A., Rebello, D., Bhat, K., & Wahul, R. M. (2020). Cloud based secure storage of files using hybrid cryptography and image steganography. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 665-667.

Salih, A. A., Zeebaree, S. R., Abdulraheem, A. S., Zebari, R. R., Sadeeq, M. A., & Ahmed, O. M. (2020). Evolution of mobile wireless communication to 5G revolution. Technology Reports of Kansai University, 62(5), 2139-2151.

Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST cloud computing reference architecture. NIST special publication, 500(2011), 1-28.

Cloud, H. (2011). The nist definition of cloud computing. National Institute of Science and Technology, Special Publication, 800(2011), 145.

Rimal, B. P., Choi, E., & Lumb, I. (2009, August). A taxonomy and survey of cloud computing systems. In 2009 fifth international joint conference on INC, IMS and IDC (pp. 44-51). Ieee.

Tsai, W. T., Sun, X., & Balasooriya, J. (2010, April). Service-oriented cloud computing architecture. In 2010 seventh international conference on information technology: new generations (pp. 684-689). IEEE.

Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2011). Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 5(2), 220-232.

Son, S., Jung, G., & Jun, S. C. (2013). An SLA-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider. The Journal of Supercomputing, 64, 606-637.

Wei, G., Vasilakos, A. V., Zheng, Y., & Xiong, N. (2010). A game-theoretic method of fair resource allocation for cloud computing services. The journal of supercomputing, 54, 252-269.

Abbas, M. S., Mahdi, S. S., & Hussien, S. A. (2020, April). Security improvement of cloud data using hybrid cryptography and steganography. In 2020 international conference on computer science and software engineering (CSASE) (pp. 123-127). IEEE.

Rashid, A., & Chaturvedi, A. (2019). Cloud computing characteristics and services: a brief review. International Journal of Computer Sciences and Engineering, 7(2), 421-426.

Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient data security using hybrid cryptography on cloud computing. In Inventive Communication and Computational Technologies: Proceedings of ICICCT 2020 (pp. 537-547). Springer Singapore.

Sudharson, K., Akshaya, M., Lokeswari, M., & Gopika, K. (2022, March). Secure Authentication scheme using CEEK technique for Trusted Environment. In 2022 International Mobile and Embedded Technology Conference (MECON) (pp. 66-71). IEEE.

Bermani, A. K., Murshedi, T. A., & Abod, Z. A. (2021). A hybrid cryptography technique for data storage on cloud computing. Journal of Discrete Mathematical Sciences and Cryptography, 24(6), 1613-1624.

AbdElnapi, N. M., Omara, F. A., & Omran, N. F. (2016). A hybrid hashing security algorithm for data storage on cloud computing. International Journal of Computer Science and Information Security (IJCSIS), 14(4).

Jassem, Y. H., & Abdullah, A. A. (2020). Enhancement of quantum key distribution protocol for data security in cloud environment. Icic International, 11(3), 279-288.

Sharma, S., Singla, K., Rathee, G., & Saini, H. (2020). A hybrid cryptographic technique for file storage mechanism over cloud. In First International Conference on Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2019 (pp. 241-256). Springer Singapore.

kadhim Bermani, A., Manaa, M. E., & Al-Salih, A. (2020). Efficient cryptography techniques for image encryption in cloud storage. Periodicals of Engineering and Natural Sciences, 8(3), 1359-1373.

Sadeeq, M. M., Abdulkareem, N. M., Zeebaree, S. R., Ahmed, D. M., Sami, A. S., & Zebari, R. R. (2021). IoT and Cloud computing issues, challenges and opportunities: A review. Qubahan Academic Journal, 1(2), 1-7.

AlSufaian, R. A., AlMoussa, R. A., AlQahtani, K. H., AlGhamdi, R. A., AlAjmi, R. M., & Nagy, N. Secure File Storage on Cloud Using Hybrid Cryptography.

Anjana, & Singh, A. (2019). Security concerns and countermeasures in cloud computing: a qualitative analysis. International Journal of Information Technology, 11, 683-690.

Anjana, D. A. S. (2022). Hybrid Cryptographic solution using RSA, Blowfish and MD5 for Information Security in Cloud Computing. Mathematical Statistician and Engineering Applications, 71(3s), 1250-1268.

Ramachandra, M. N., Srinivasa Rao, M., Lai, W. C., Parameshachari, B. D., Ananda Babu, J., & Hemalatha, K. L. (2022). An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data and Cognitive Computing, 6(4), 101

Al-gohany, N. A., & Almotairi, S. (2019). Comparative study of database security in cloud computing using AES and DES encryption algorithms. Journal of Information Security and Cybercrimes Research, 2(1), 102-109

Wankhade, N. M., Sahare, K. A., & Bhujade, V. G. (2014). Secure cloud simulation using triple DES. International Journal of Research in Advent Technology, 2(1)

Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16(1), 11

D'souza, F. J., & Panchal, D. (2017, May). Advanced encryption standard (AES) security enhancement using hybrid approach. In 2017 International Conference on Computing, Communication and Automation (ICCCA) (pp. 647-652). IEEE

Mahdi, M. S., Hassan, N. F., & Abdul-Majeed, G. H. (2021). An improved chacha algorithm for securing data on IoT devices. SN Applied Sciences, 3(4), 429

Taha, M. H., & Al-Tuwaijari, J. M. (2021). Improvement of Chacha20 Algorithm based on Tent and Chebyshev Chaotic Maps. Iraqi Journal of Science, 2029-2039

Pfau, J., Reuter, M., Harbaum, T., Hofmann, K., & Becker, J. (2019, September). A hardware perspective on the ChaCha ciphers: Scalable Chacha8/12/20 implementations ranging from 476 slices to bitrates of 175 Gbit/s. In 2019 32nd IEEE International System-on-Chip Conference (SOCC) (pp. 294-299). IEEE

Chang, S. J., Perlner, R., Burr, W. E., Turan, M. S., Kelsey, J. M., Paul, S., & Bassham, L. E. (2012). Third-round report of the SHA-3 cryptographic hash algorithm competition. NIST Interagency Report, 7896, 121

Bayat-Sarmadi, S., Mozaffari-Kermani, M., & Reyhani-Masoleh, A. (2014). Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm. IEEE transactions on computer-aided design of integrated circuits and systems, 33(7), 1105-1109

Preneel, B. (2010, March). The first 30 years of cryptographic hash functions and the NIST SHA-3 competition. In Cryptographers’ track at the RSA conference (pp. 1-14). Berlin, Heidelberg: Springer Berlin Heidelberg

Ye, G., Jiao, K., & Huang, X. (2021). Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dynamics, 104, 2807-2827.

Downloads

Published

23.02.2024

How to Cite

Anjana, A., & Singh, A. . (2024). An Enhanced Three Layer Cryptographic Algorithm for Cloud Information Security. International Journal of Intelligent Systems and Applications in Engineering, 12(17s), 615–627. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4927

Issue

Section

Research Article