A Hybrid Cryptography Technique of Security for Data Sharing In Clouds
Keywords:
Hash, VCS, Hybrid, Data, Cryptogrsphy, Security, Cloud, IOT, ServerAbstract
The use of cloud computing has become the most desirable alternative. It's probable that the user will pay some consideration to the accuracy of the data as well as the privacy of the information. The data security that cloud computing offers can be improved in a number of ways, one of which is by making use of the several cryptographic technologies that are currently accessible. A hybrid cryptography technique for ensuring the safety of cloud data storage was provided in this work. The strategy was based on a combination of the hash function and the visual cryptography approach. When using the hash function, the user first computes the hash value or hash digest of the file, and then uploads the file to the cloud computing service for storage. In addition to that, the research presented a hybrid cryptography technique for the purpose of ensuring the safety of cloud-based data storage that has a visual cryptography approach. The data that is stored in the cloud and encrypted during the process of being stored there. The simulation is carried out with the help of MATLAB 8.3, which is the type of software that is utilized.
Downloads
References
H. Hu, Z. Cao and X. Dong, "Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds," in IEEE Access, vol. 10, pp. 87322-87332, 2022, doi: 10.1109/ACCESS.2022.3200084.
K. Prathapkumar and A. T. Raja, "Privacy and Security using Double Signature Based Cryptocraphy using DS-SHA256 in Cloud Cimputing," 2023 International Conference on New Frontiers in Communication, Automation, Management and Security (ICCAMS), Bangalore, India, 2023, pp. 1-8, doi: 10.1109/ICCAMS60113.2023.10526007.
A. B. Desai, F. R. Chowdhury, C. Sharma, M. Mittal and K. K. Thoti, "Multi-Keyword Search in Encoded Cloud Data Using Homomorphic Encryption and Prim's Algorithm," 2023 IEEE International Conference on Paradigm Shift in Information Technologies with Innovative Applications in Global Scenario (ICPSITIAGS), Indore, India, 2023, pp. 380-385, doi: 10.1109/ICPSITIAGS59213.2023.10527493.
S. I. Tamboli and C. S. Arage, "Enhancement of Privacy Preservation and Security in Cloud Databases using Blockchain Technology," 2023 IEEE Engineering Informatics, Melbourne, Australia, 2023, pp. 1-7, doi: 10.1109/IEEECONF58110.2023.10520353.
S. Ge, S. Xiong, P. Chen and Q. Xie, "A Blockchain-Based Searchable Encryption Scheme for Efficient Data Sharing," 2023 Eleventh International Conference on Advanced Cloud and Big Data (CBD), Danzhou, China, 2023, pp. 80-85, doi: 10.1109/CBD63341.2023.00023.
S. Zhao and W. Chiang, "Privacy-Preserving, Low-Storage, and High-Quality Image Processing in IoT and Clouds," 2023 International Conference on Intelligent Communication and Computer Engineering (ICICCE), Changsha, China, 2023, pp. 9-13, doi: 10.1109/ICICCE61720.2023.00008.
L. Chen, J. Wang, L. Xiong, S. Zeng and J. Geng, "A Privacy-Preserving Federated Learning Framework Based on Homomorphic Encryption," 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing China, 2023, pp. 512-517, doi: 10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00099.
H. Yicai, Z. Qing and Y. Bin, "Multi-Client Dynamic Searchable Symmetric Encryption Scheme with Supporting Conjunction Query," 2023 9th International Conference on Computer and Communications (ICCC), Chengdu, China, 2023, pp. 803-809, doi: 10.1109/ICCC59590.2023.10507509.
W. Cheng, B. Lin and L. Cheng, "A Cloud Native Zero Trust Full Process Video Image Authentication Encryption Method to Protect Video Data Security," 2022 4th International Symposium on Smart and Healthy Cities (ISHC), Shanghai, China, 2022, pp. 74-77, doi: 10.1109/ISHC56805.2022.00024.
T. Y. Ou and W. -L. Tsai, "Designing a Flow-Based Mechanism for Accessing Electronic Health Records on a Cloud Environment," in Journal of Web Engineering, vol. 21, no. 5, pp. 1491-1517, July 2022, doi: 10.13052/jwe1540-9589.2156.
SKA, Manish Kumar Mukhija, and Pooja Singh "A Security Approach to Manage a Smart City's Image Data on Cloud," AI-Centric Smart City Ecosystems: Technologies, Design and Implementation (1st ed.), PP: 68-82, (2022). CRC Press. https://doi.org/10.1201/9781003252542.
SKA. Secure Algorithm for File Sharing Using Clustering Technique of K-Means Clustering. IJRITCC 2016, 4, 35-39.
SKA and Abha Jadaun. “Design and Performance Assessment of Light Weight Data Security System for Secure Data Transmission in IoT”, Journal of Network Security, 2021, Vol-9, Issue-1, PP: 29-41.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.