A Hybrid Approach Using AES-RSA Encryption for Cloud Data Security

Authors

  • Juvi Bharti Department of Computer Science, Sri Guru Granth Sahib World University Punjab, India
  • Sarpreet Singh Department of Computer Science, Sri Guru Granth Sahib World University Punjab, India

Keywords:

AES, RSA, Encryption, Cloud, Security

Abstract

This paper provides an in-depth analysis of cloud vulnerabilities and explores the role of encryption techniques in addressing security challenges within cloud services. We compare a range of symmetric and asymmetric encryption algorithms and discuss recent advancements in modified encryption models. The study highlights the importance of understanding the encryption landscape, selecting appropriate techniques based on specific requirements and threat models, and keeping up to date with the latest developments in cryptography to ensure data security in the cloud.

Downloads

Download data is not yet available.

References

Mante, R.V.; Bajad, N.R. A study of searchable and auditable attribute based encryption in cloud. In Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 10–12 June 2020; IEEE: Piscataway, NJ, USA, 2021; pp. 1411–1415.

Vennala, A.; Radha, M.; Rohini, M.; Anees Fathima, M.; Lakshmi, P.D. Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage. J. Eng. Sci. 2022, 13, 532–541.

Li, R.; Yang, H.; Wang, X.A.; Yi, Z.; Niu, K. Improved Public Auditing System of Cloud Storage Based on BLS Signature. Secur. Commun. Netw. 2022, 2022, 6800216.

He, J.; Zhang, Z.; Li, M.; Zhu, L.; Hu, J. Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access 2018, 7, 6226–6239.

K. D. Abel, S. Misra, A. Agrawal, R. Maskeliunas, and R. Damasevicius, "Data Security Using Cryptography and Steganography Technique on the Cloud," in Computational Intelligence in Machine Learning, Singapore, 2022, pp. 475–481, https://doi.org/10.1007/978- 981-16-8484-5_46.

M. E. Saleh, A. A. Aly, and F. A. Omara, "Data Security Using Cryptography and Steganography Techniques," International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, 2016, https://doi.org/10.14569/IJACSA.2016.070651.

A. O. Aljahdali, F. Thabit, H. Aldissi, and W. Nagro, "Dynamic Keystroke Technique for a Secure Authentication System based on Deep Belief Nets," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10906–10915, Jun. 2023, https://doi.org/10.48084/ etasr.5841.

Z. Yan, R. H. Deng, and V. Varadharajan, "Cryptography and data security in cloud computing," Information Sciences, vol. 387, pp. 53–55, May 2017, https://doi.org/10.1016/j.ins.2016.12.034.

V. Agrahari, "Data security in cloud computing using cryptography algorithms," International Journal of Scientific Development and Research (IJSDR), vol. 5, no. 9, pp. 258–260, 2020.

F. Thabit, A. S. Alhomdy, A. H. A. Al-Ahdal, and D. S. Jagtap, "Exploration of Security Challenges in Cloud Computing: Issues," Journal of Information and Computational Science, vol. 10, no. 12, pp. 35–57, 2020. [

F. Thabit, S. Alhomdy, and S. Jagtap, "Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing," Global Transitions Proceedings, vol. 2, no. 1, pp. 100–110, Jun. 2021, https://doi.org/10.1016/j.gltp.2021.01.014.

F. Thabit, S. Alhomdy, and S. Jagtap, "A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions," International Journal of Intelligent Networks, vol. 2, pp. 18–33, Jan. 2021, https://doi.org/10.1016/j.ijin.2021.03.001.

F. Thabit, O. Can, R. U. Z. Wani, M. A. Qasem, S. B. Thorat, and H. A. Alkhzaimi, "Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms," Concurrency and Computation: Practice and Experience, vol. 35, no. 21, 2023, Art. no. e7691, https://doi.org/10.1002/cpe.7691.

O. Can, F. Thabit, A. O. Aljahdali, S. Al-Homdy, and H. A. Alkhzaimi, "A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing," Cybernetics and Systems, 2023, https://doi.org/10.1080/01969722.2023.2175117.

E. S. I. Harba, "Secure Data Encryption Through a Combination of AES, RSA and HMAC," Engineering, Technology & Applied Science Research, vol. 7, no. 4, pp. 1781–1785, Aug. 2017, https://doi.org/ 10.48084/etasr.1272.

A. H. Al-Omari, "Lightweight Dynamic Crypto Algorithm for Next Internet Generation," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4203–4208, Jun. 2019, https://doi.org/ 10.48084/etasr.2743.

G. S. Mahmood, D. J. Huang, and B. A. Jaleel, "Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing," nternational Journal of Network Security, vol. 21, no. 2, pp. 326–332, https://doi.org/ 10.6633/IJNS.201903 21(2).17.

S. M. Chavanv and S. C. Tamane, "Comparison of symmetric and asymmetric algorithms for cloud storage security," International Journal of Advanced Science and Technology, vol. 29, no. 3, pp. 785–91, 2020.

B. Seth et al., "Secure Cloud Data Storage System using Hybrid PaillierBlowfish Algorithm," Computers, Materials & Continua, vol. 67, no. 1, pp. 779–798, 2021, https://doi.org/10.32604/cmc.2021.014466.

K. El Makkaoui, A. Beni-Hssane, A. Ezzati, and A. El-Ansari, "Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing," Procedia Computer Science, vol. 113, pp. 33–40, Jan. 2017, https://doi.org/10.1016/j.procs.2017.08.282.

E. Elgeldawi, M. Mahrous, and A. Sayed, "A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey," International Journal of Computer Applications, vol. 182, no. 48, pp. 7–16, Apr. 2019, https://doi.org/10.5120/ijca2019918726.

Chen, Y.; Liu, H.; Wang, B.; Sonompil, B.; Ping, Y.; Zhang, Z. A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 2021, 10, 3.

Sajay, K.R.; Babu, S.S.; Vijayalakshmi, Y. Enhancing the security of cloud data using hybrid encryption algorithm. J. Ambient Intell. Humaniz. Comput. 2019, 1–10.

Latha, K.; Sheela, T. Block based data security and data distribution on multi cloud environment. J. Ambient Intell. Humaniz. Comput. 2019, 1–7.

Cha, J.; Singh, S.K.; Kim, T.W.; Park, J.H. Blockchain-empowered cloud architecture based on secret sharing for smart city. J. Inf. Secur. Appl. 2021, 57, 102686.

Viswanath, G.; Krishna, P.V. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol. Intell. 2021, 14, 691–698.

Xu, Y.; Ding, L.; Cui, J.; Zhong, H.; Yu, J. PP-CSA: A privacy-preserving cloud storage auditing scheme for data sharing. IEEE Syst. J. 2020, 15, 3730–3739.

Nguyen, G.N.; Le Viet, N.H.; Elhoseny, M.; Shankar, K.; Gupta, B.B.; Abd El-Latif, A.A. "Secure blockchain-enabled Cyber–physical systems in healthcare using deep belief network with ResNet model." J. Parallel Distrib. Comput., 2021, 153, 150–160.

He, J.; Zhang, Z.; Li, M.; Zhu, L.; Hu, J. "Provable data integrity of cloud storage service with enhanced security in the internet of things." IEEE Access, 2018, 7, 6226–6239.

Rathore, H.; Mohamed, A.; Guizani, M. "A survey of blockchain-enabled cyber-physical systems." Sensors, 2020, 20, 282.

Downloads

Published

26.03.2024

How to Cite

Bharti, J. ., & Singh, S. . (2024). A Hybrid Approach Using AES-RSA Encryption for Cloud Data Security. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 62–69. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5339

Issue

Section

Research Article