CryptShareX: Secure File Sharing Platform with AES and Steganography
Keywords:
Cryptography, Advanced Encryption Standard Algorithm (AES), Rivest Shamir Adleman Algorithm (RSA), SteganographyAbstract
In the evolving landscape of contemporary data exchange, the critical need to simultaneously ensure efficiency and security in cloud-based file transfers takes precedence. This research delves into the nuanced intricacies of file transfer mechanisms, proposing a holistic approach characterized by dual encryption through advanced algorithms like AES and RSA. Through the integration of cryptographic techniques, coupled with the infusion of steganography, this study strives to establish a resilient framework. Its aim is not only to bolster the security of cloud-based file transfers but also to facilitate an effective and seamless data exchange process within the dynamic cloud environment. The amalgamation of these encryption methodologies, strategically complemented by the incorporation of steganographic principles, represents an innovative stride towards achieving an optimal equilibrium between data protection and the streamlined operations of file transfers in the cloud.
Downloads
References
E. Bertino, "Data Security and Privacy: Concepts, Approaches, and Research Directions," 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA, 2016, pp. 400-407, doi: 10.1109/COMPSAC.2016.89.
Pradeep, Vijayan & Vaishali, & Shetty, Vandan & M, Varsha. (2022). A Review Paper on Network Security and Cryptography. International Journal of Advanced Research in Science, Communication and Technology. 133-138. 10.48175/IJARSCT-7081. .
N. Subramanian, O. Elharrouss, S. Al-Maadeed and A. Bouridane, "Image Steganography: A Review of the Recent Advances," in IEEE Access, vol. 9, pp. 23409-23423, 2021, doi: 10.1109/ACCESS.2021.3053998..
K. Jaspin, S. Selvan, S. Sahana and G. Thanmai, "Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm," 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 2021, pp. 791-796, doi: 10.1109/ESCI50559.2021.9397005.
L. Li and J. Kuai, "File Encryption System Based on the Hybrid LPC Coefficient and AES Algorithm," 2020 International Conference on Wireless Communications and Smart Grid (ICWCSG), Qingdao, China, 2020, pp. 1-4, doi: 10.1109/ICWCSG50807.2020.00008. keywords: {Encryption;Erbium;Conferences;Wireless communication;Smart grids;Hybrid power systems;Data processing;hybrid LPC coefficient;AES algorithm;file encryption system},
D'souza, Flevina & Panchal, Dakshata. (2017). Advanced encryption standard (AES) security enhancement using hybrid approach. 647-652. 10.1109/CCAA.2017.8229881.
Mohamed, Shady & Magdy, Baher & Abd El Ghany, Mohamed. (2016). Efficient implementation of the AES algorithm for security applications. 206-210. 10.1109/SOCC.2016.7905466.
G. Peng and S. Zhu, "FPGA Implementation of AES Encryption Optimization Algorithm," 2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), Xi'an, China, 2021, pp. 650-653, doi: 10.1109/ICITBS53129.2021.00165.
M. Kumar, A. Soni, A. R. S. Shekhawat and A. Rawat, "Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique," 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2022, pp. 1453-1457, doi: 10.1109/ICAIS53314.2022.9742942.
B. Mahalakshmi, G. Deshmukh and V. N. L. N. Murthy, "Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm," 2019 Fifth International Conference on Image Information Processing (ICIIP), Shimla, India, 2019, pp. 363-366, doi: 10.1109/ICIIP47207.2019.8985665.
N. Manohar and P. V. Kumar, "Data Encryption & Decryption Using Steganography," 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2020, pp. 697-702, doi: 10.1109/ICICCS48265.2020.9120935.
Abbas, N.A.F., Abdulredha, N., Ibrahim, R.K., and Ali, A.H. (2022). "Security and imperceptibility improving of image steganography using pixel allocation and random function techniques." International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 1, pp. 694-705.
https://gofile.io/, GoFile Server
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.