Research Article | | Peer-Reviewed

File Storage Security in Cloud Computing Using Hybrid Encryption

Received: 16 December 2023    Accepted: 28 December 2023    Published: 11 January 2024
Views:       Downloads:
Abstract

Cloud is used in various fields for storage of big data with the major challenge regarding this storage being security. Existing conventional encryption systems can be vulnerable to brute-force attacks. The goal of this project was to develop a hybrid encryption scheme that will only allow authorized users to access and download files stored online, thus enhancing file storage security in the cloud. Rapid Application Development (RAD) methodology was used to create the proposed system, allowing for modifications to be made to the system as it was being developed. The hybrid encryption scheme employs both symmetric and asymmetric encryption. The AES (Advanced Encryption Standard) algorithm and RSA (Rivest–Shamir–Adleman) algorithm were combined to develop the proposed hybrid encryption system. PHP, JavaScript and Laravel were the programming languages and web framework used to implement the system. The proposed system was tested and evaluated by users. The experimental results show that the proposed hybrid encryption scheme was fast and provided a high level of security but had some drawbacks which include increase in file size after it was encrypted and inability to sort files in the web app. Overall, the proposed system enhances confidentiality and data protection in cloud environments, guarding against potential breaches and unauthorized access.

Published in Internet of Things and Cloud Computing (Volume 12, Issue 1)
DOI 10.11648/j.iotcc.20241201.11
Page(s) 1-9
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cloud Computing, Cryptography, Hybrid Encryption, Data Integrity, Access Control

References
[1] Abiona, O., Islam, R., Patamsetti, V., Gadhi, A., Gondu. R., Bandaru, C., and Kesani, S.,. (2023). The Future of Cloud Computing: Benefits and challenges. International Journal of Communications, Network and System Sciences, 16, 53-65.
[2] Seth, B., Dalal, S., & Kumar, R. (2019). Hybrid homomorphic encryption scheme for secure cloud data storage. Recent Advances in Computational Intelligence, 71-92.
[3] Harnal, S., and Chauhan, R. K. (2019). Hybrid Cryptography base E2EE for Integrity & Confidentiality in Multimedia Cloud Computing. International Journal of Innovative Technology and Exploring Engineering, 918-924.
[4] Orobosade, A., Favour-Bethy, T., Kayode, A., and Gabriel, A. (2020). Cloud Application Security using Hybrid Encryption. Commun. Appl. Electron, 7, 25-31.
[5] Sowmiya, M., & Prabavathi, S. (2019). Symmetric and asymmetric encryption algorithms in cryptography. Int J Recent Technol Eng, 8(1S2), 355-7.
[6] Poduval, A., Doke, A., Nemade, H., and Nikam, R. (2019). Secure File Storage on Cloud using Hybrid Cryptography. International Journal of Computer Sciences and Engineering (IJCSE).
[7] Mohammed, N., & Ibrahim, N. (2019). Implementation of new secure encryption technique for cloud computing. International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA), 1-5.
[8] Abdel-Kader, R., El-Sherif, S., & Rizk, R. (2020). Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing. International Journal of Electrical & Computer Engineering.
[9] Viswanath, G., & Krishna, P. V. (2021). Hybrid encryption framework for securing big data storage in multi-cloud environment. Evolutionary Intelligence, 14, 691-698.
[10] Rashmi, R., Gandhi, Y., Sarmalkar, V., Pund, P., and Khetani, V. (2020). Secure Cloud Storage with Deduplication Technique. Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 1280-1283.
[11] Kumar, U., and Prakash, J. (2020). Secure File Storage On Cloud Using Hybrid Cryptography Algorithm. International Journal Of Creative Research Thoughts (IJCRT). Vol. 8, No. 7. ISSN: 2320-2882, 334-340.
[12] Sirohi, P., and Agarwal, A. (2015). Cloud computing data storage security framework relating to data integrity, privacy and trust. 1st International Conference on Next Generation Computing Technologies (NGCT).
[13] Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., and Bose, M. (2018). Cloud computing security challenges & solutions - A survey. IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).
[14] Naveetha, K., and Tamilarasan, T. (2021). Secure File Storage on Cloud Using Hybrid Cryptography. International Journal of Advanced Research in Computer Science Engineering and Information Technology (IJARCSEIT).
[15] Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient data security using hybrid cryptography on cloud computing. In Inventive Communication and Computational Technologies: Proceedings of ICICCT 2020 (pp. 537-547). Springer Singapore.
[16] Timothy, D., and Santra, A. (2017). A hybrid cryptography algorithm for cloud computing security. International Conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 1-5.
[17] Jintcharadze, E and Lavich, M. (2020). Hybrid implementation of Twofish, AES, ElGamal and RSA Cryptosystems. IEEE East-West Design and Test Symposium (EWDTS), 1-5.
[18] Shukla, D. K.; Dwivedi, V. K.; Trivedi, M. C. (2020). Encryption algorithm in cloud computing. Mater. Today Proc, 1869-1875.
[19] Yahia, H., Zeebaree, S., Sadeeq, M., Salim, N., Kak, S., Al-Zebari, A., Salih, A., Hussein, H. (2021). Comprehensive survey for cloud computing based nature-inspired algorithms optimization scheduling. Asian J. Res. Comput. Sci, 1-16.
[20] Madhavi, G., Samatha, J. (2020). Secure data storage and access of data in cloud using Elliptic curve cryptography. IEEE J.
[21] Selvam, J., Srivaramangai, P. (2020). Time complexity analysis of cloud authentications and data security: Polynomial based hashing and elliptic curve cryptography. Int. J. Anal. Exp. Modal Anal.
[22] Kaur, H. (2017). A Novel Technique of Data Security in Cloud Computing based on Blowfish with MD5 method. International Journal of Advance Research, Ideas and Innovations in Technology, Volume 3, Issue 6.
[23] Sharma, S., Singla, K., Rathee, G., and Saini, H. (2020). A hybrid cryptographic technique for file storage mechanism over cloud. In (pp. 241-256). Springer, Singapor. First international conference on sustainable technologies for computational intelligence, 241-256.
[24] Hodowu, D., Korda, D., Ansong, E. (2020). An enhancement of data security in cloud computing with an implementation of a two-level cryptographic technique, using AES and ECC algorithm. Int. J. Eng. Res. Technol, 9, 639-650.
Cite This Article
  • APA Style

    Betrand, C. U., Onukwugha, C. G., Benson-Emenike, M. E., Ofoegbu, C. I., Awaji, N. M. (2024). File Storage Security in Cloud Computing Using Hybrid Encryption. Internet of Things and Cloud Computing, 12(1), 1-9. https://doi.org/10.11648/j.iotcc.20241201.11

    Copy | Download

    ACS Style

    Betrand, C. U.; Onukwugha, C. G.; Benson-Emenike, M. E.; Ofoegbu, C. I.; Awaji, N. M. File Storage Security in Cloud Computing Using Hybrid Encryption. Internet Things Cloud Comput. 2024, 12(1), 1-9. doi: 10.11648/j.iotcc.20241201.11

    Copy | Download

    AMA Style

    Betrand CU, Onukwugha CG, Benson-Emenike ME, Ofoegbu CI, Awaji NM. File Storage Security in Cloud Computing Using Hybrid Encryption. Internet Things Cloud Comput. 2024;12(1):1-9. doi: 10.11648/j.iotcc.20241201.11

    Copy | Download

  • @article{10.11648/j.iotcc.20241201.11,
      author = {Chidi Ukamaka Betrand and Chinwe Gilean Onukwugha and Mercy Eberechi Benson-Emenike and Christopher ifeanyi Ofoegbu and Nneka Martina Awaji},
      title = {File Storage Security in Cloud Computing Using Hybrid Encryption},
      journal = {Internet of Things and Cloud Computing},
      volume = {12},
      number = {1},
      pages = {1-9},
      doi = {10.11648/j.iotcc.20241201.11},
      url = {https://doi.org/10.11648/j.iotcc.20241201.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20241201.11},
      abstract = {Cloud is used in various fields for storage of big data with the major challenge regarding this storage being security. Existing conventional encryption systems can be vulnerable to brute-force attacks. The goal of this project was to develop a hybrid encryption scheme that will only allow authorized users to access and download files stored online, thus enhancing file storage security in the cloud. Rapid Application Development (RAD) methodology was used to create the proposed system, allowing for modifications to be made to the system as it was being developed. The hybrid encryption scheme employs both symmetric and asymmetric encryption. The AES (Advanced Encryption Standard) algorithm and RSA (Rivest–Shamir–Adleman) algorithm were combined to develop the proposed hybrid encryption system. PHP, JavaScript and Laravel were the programming languages and web framework used to implement the system. The proposed system was tested and evaluated by users. The experimental results show that the proposed hybrid encryption scheme was fast and provided a high level of security but had some drawbacks which include increase in file size after it was encrypted and inability to sort files in the web app. Overall, the proposed system enhances confidentiality and data protection in cloud environments, guarding against potential breaches and unauthorized access.
    },
     year = {2024}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - File Storage Security in Cloud Computing Using Hybrid Encryption
    AU  - Chidi Ukamaka Betrand
    AU  - Chinwe Gilean Onukwugha
    AU  - Mercy Eberechi Benson-Emenike
    AU  - Christopher ifeanyi Ofoegbu
    AU  - Nneka Martina Awaji
    Y1  - 2024/01/11
    PY  - 2024
    N1  - https://doi.org/10.11648/j.iotcc.20241201.11
    DO  - 10.11648/j.iotcc.20241201.11
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 1
    EP  - 9
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.20241201.11
    AB  - Cloud is used in various fields for storage of big data with the major challenge regarding this storage being security. Existing conventional encryption systems can be vulnerable to brute-force attacks. The goal of this project was to develop a hybrid encryption scheme that will only allow authorized users to access and download files stored online, thus enhancing file storage security in the cloud. Rapid Application Development (RAD) methodology was used to create the proposed system, allowing for modifications to be made to the system as it was being developed. The hybrid encryption scheme employs both symmetric and asymmetric encryption. The AES (Advanced Encryption Standard) algorithm and RSA (Rivest–Shamir–Adleman) algorithm were combined to develop the proposed hybrid encryption system. PHP, JavaScript and Laravel were the programming languages and web framework used to implement the system. The proposed system was tested and evaluated by users. The experimental results show that the proposed hybrid encryption scheme was fast and provided a high level of security but had some drawbacks which include increase in file size after it was encrypted and inability to sort files in the web app. Overall, the proposed system enhances confidentiality and data protection in cloud environments, guarding against potential breaches and unauthorized access.
    
    VL  - 12
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Nigeria

  • Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Nigeria

  • Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Nigeria

  • Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Nigeria

  • Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Owerri, Nigeria

  • Sections