Full Paper View Go Back

Securing the Cloud Storage by Using Different Algorithms of Cryptography

Maria Jan1 , Qamar Shahzad2 , Salman Afsar3

Section:Research Paper, Product Type: Journal-Paper
Vol.10 , Issue.2 , pp.38-45, Apr-2022


Online published on Apr 30, 2022


Copyright © Maria Jan, Qamar Shahzad, Salman Afsar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Maria Jan, Qamar Shahzad, Salman Afsar, “Securing the Cloud Storage by Using Different Algorithms of Cryptography,” International Journal of Scientific Research in Computer Science and Engineering, Vol.10, Issue.2, pp.38-45, 2022.

MLA Style Citation: Maria Jan, Qamar Shahzad, Salman Afsar "Securing the Cloud Storage by Using Different Algorithms of Cryptography." International Journal of Scientific Research in Computer Science and Engineering 10.2 (2022): 38-45.

APA Style Citation: Maria Jan, Qamar Shahzad, Salman Afsar, (2022). Securing the Cloud Storage by Using Different Algorithms of Cryptography. International Journal of Scientific Research in Computer Science and Engineering, 10(2), 38-45.

BibTex Style Citation:
@article{Jan_2022,
author = {Maria Jan, Qamar Shahzad, Salman Afsar},
title = {Securing the Cloud Storage by Using Different Algorithms of Cryptography},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2022},
volume = {10},
Issue = {2},
month = {4},
year = {2022},
issn = {2347-2693},
pages = {38-45},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2751},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2751
TI - Securing the Cloud Storage by Using Different Algorithms of Cryptography
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Maria Jan, Qamar Shahzad, Salman Afsar
PY - 2022
DA - 2022/04/30
PB - IJCSE, Indore, INDIA
SP - 38-45
IS - 2
VL - 10
SN - 2347-2693
ER -

482 Views    365 Downloads    67 Downloads
  
  

Abstract :
Cloud Computing offers services via the internet that allows for virtual servers, dynamic memory pools, as well as easy access. Because distributed computing is based on the internet, security concerns such as information security, confidentiality, data protection, concealment, & authentication arise. The data security of cloud storage is a major issue. In this research, we aimed to examine various combinations of data security techniques. The usage of cryptographic algorithms is employed for resolving data protection and privacy problems in cloud storage. In the proposed Hybrid system of algorithm RC4, DES & AES Algorithms were used to improve data security and privacy. The proposed hybrid system of algorithm secured the Upload and download of data on cloud storage. For this, Secret keys are required for both encryption and decryption. As a result, several parameters are calculated utilizing evaluation factors also including encryption time, memory consumption, decryption time, as well as throughput. To show the effectiveness of the hybrid system, simulations of data are provided in JAVA, using the Eclipse IDE tool. The proposed hybrid system of the algorithm is executed and evaluated using various file formats such as text and image data. The suggested algorithm is believed to work well to provide more data security.

Key-Words / Index Term :
DES, RC4, encryption system, upload, download, AES

References :
[1] E. Ghazizadeh, "Cloud Surfing: A General Comparison of Cloud Identity Guidelines," in the proceedings of Americas Conference on Information Systems (AMCIS 2020), USA, pp. 30-34,2020.
[2] J. Gibson,"Benefits and challenges of three cloud computing service models." In the proceedings of Fourth International Conference on Computational Aspects of Social Networks (CASoN),Brazil, pp. 198-205. 2012.
[3] A. Orobosade, "Cloud application security using hybrid encryption," Communications, vol. 7,pp. 25-31, 2020.
[4] P. Srivastava, "A review paper on cloud computing," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8,issue. 6. pp. 17-20, 2018.
[5] H. Tabrizchi, "A survey on security challenges in cloud computing: issues, threats, and solutions," The journal of supercomputing, vol. 76,issue. 12. pp. 9493-9532, 2020.
[6] R. Chatterjee, "Cryptography in cloud computing: a basic approach to ensure security in cloud," International Journal of Engineering Science, vol.7, issue. 5, pp. 11818-11821,2017.
[7] S. Sharma, "A hybrid cryptographic technique for file storage mechanism over cloud," in First international conference on sustainable technologies for computational intelligence, Poland, Vol. 1045, pp. 241-256, 2020.
[8] K. Logunleko, "A comparative study of symmetric cryptography mechanism on DES, AES and EB64 for information security," International Journal Scientific Research in Computer Science and Engineering,vol. 8,issue. 1. pp. 45-51, 2020.
[9] S. K. Ghosh, "Hybrid Cryptography Algorithm For Secure And Low Cost Communication," in proceedings of International Conference on Computer Science, Engineering and Applications (ICCSEA), UK, pp. 1-5, 2020.
[10] S. R. Zeebaree, "DES encryption and decryption algorithm implementation based on FPGA," Indonesian Journal of Electrical Engineering and Computer Science, vol. 18,issue. 2. pp. 774-781, 2020.
[11] O. Hajihassani, "Fast AES implementation: A high-throughput bitsliced approach," IEEE Transactions on parallel and distributed systems, vol. 30,issue. 10. pp. 2211-2222, 2019.
[12] O. G. Abood, "A survey on cryptography algorithms," International Journal of Scientific and Research Publications, vol. 8,issue. 7. pp. 495-516, 2018.
[13] N. A. Sharma, "A performance test on symmetric encryption algorithms—RC2 Vs Rijndael," International Journal Of Scientific & Technology Research,vol. 6,issue. 07. pp. 292-294, 2017.
[14] K. Sajay, "Enhancing the security of cloud data using hybrid encryption algorithm," Journal of Ambient Intelligence and Humanized Computing, pp. 1-10, 2019.
[15] P. R. Kumar, "Exploring data security issues and solutions in cloud computing," Procedia Computer Science, vol. 125,pp. 691-697, 2018.
[16] V. S. Mahalle, "Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm," in the proceedings of International Conference on Power, Automation and Communication (INPAC), India,pp. 146-149, 2014.
[17] A. Kumar, "A new approach for security in cloud data storage for IOT applications using hybrid cryptography technique," in the proceedings of international conference on power electronics & IoT applications in renewable energy and its control (PARC), pp. 514-517, 2020.
[18] R. Arora, "Secure user data in cloud computing using encryption algorithms," International journal of engineering research and applications, vol. 3,issue. 4. pp. 1922-1926, 2013.
[19] S. Harnal, "Hybrid Cryptography based E2EE for Integrity & Confidentiality in Multimedia Cloud Computing," International Journal of Innovative Technology and Exploring Engineering (IJITEE), Scopus, vol. 8,issue. 10. pp. 918-924, 2019.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation