Secure File Storage On Cloud Using Hybrid Cryptography
Secure File Storage On Cloud Using Hybrid Cryptography
Secure File Storage On Cloud Using Hybrid Cryptography
Abstract
Page 1589
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
Page 1590
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
Page 1591
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
Users are Slightly Moving away from analysis of cloud storage security,
traditional storage devices such as discovered that hybrid cryptography is
thumb drives, hard disks, and other better poised to ensure the attainment of
physical storage devices that are security techniques for data protection
gradually becoming obsolete. This that have been accepted universally in
modification has come due to the the field of information security.
globalization of business that has These techniques are achieved through
necessitated sharing data for mechanisms of access control,
collaborative working and using authorization, authentication, and
multiple personal devices. confidentiality. A 2016 study
However, another hybridization appreciates that cloud storage services
technique involves the combination of subscribers can only trust the
Blowfish and ECC (Elliptic Curve infrastructure’s data protection
Cryptography), which is an emerging capabilities when the prevailing data
alternative for traditional public-key protection system the mechanisms
cryptosystems, such as RSA, and which above into account.
a study argues is the best substitute for
C. Future Directions for Securing
asymmetric encryption. ECC is in itself
File Storage on Cloud
founded on the “toughness of the
Infrastructure
discrete logarithm problem (DLP),
Information Security experts should
whose network bandwidth is little, and
consider implementing high-level
the public key is short. These
security by hybridizing public key
characteristics make it difficult to guess
cryptography. Currently, hybridization
the keys of the encryption technique and
has only been applied to private key
hence render it resistant to attacks.
cryptography algorithms. Hence, the
Overall, the implementation of hybrid
research recommends secrete writing to
cryptographic techniques is better than
conceal the existence of secret data so
implementing either symmetric and
that it remains invisible to the public but
asymmetric cryptography. In their
visible to valid receivers.
Page 1592
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
Secrete Writing may useful for text data research activities identifying needs and
because it enables secret data to be demands, data collection and
secured within the text’s cover file. This preparation, through the use of DM
method ensures that the text cover file model by Botha.
resembles a normal text file and does not
attract a possible attacker’s interest. In
the rare event that an illegitimate user
finds the hidden data, they may be
dispirited by the large amount of time it
may take to recover it.
3. System Design
A conceptual framework shows the It includes also the process such as
three stage of data input, process and system design, development and system
Page 1593
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
4. Implementation
The factors included in the algorithm
flexibility, suitable for the algorithm
process the hardware and software
implementation and over all simplicity
of process. The before the encryption
process the method is divided into the
two parts, the encryption using the data
using AES for the first portion of data.
The DES encrypts the second part into
the finally the data stored in the cloud
Cloud computing providing
server.
confidentiality over the insensitive
data was the major issue related to
security. It verifies the data owned
by the server through liner
Page 1594
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
Page 1595
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
challenges conducted to understand generating the secret key. The secret key
time taken in decryption of messages. uses the file downloading process
These were conducted to prove that
DES was insufficient and shall not be 5. Conclusion and Future
applied in crucial system. The
Enhancement
Electronic Frontier Foundation (EFF)
System performance is evaluated by
and distributed.net are two firms that
calculating time of encryption, time of
played vital roles to break DES.
key generation and decryption time. The
time consumed by KP-ABE outsourcing
scheme can be measured on IDE which
refers to Integrated Development
Environment JAVA when the database
is held in MYSQL. Performance is
analyzed by calculating time of
Encryption and upload, time of
download and Decryption and time of
A comparison graph for encryption Time.
key generation. With the help of
multiple sizes of files, Performance
Evaluation for KP-ABE performance,
analysis is performed and by taking note
time required for encryption and
of encryption time of files having
uploading the file on the MYSQL
multiple sizes and decryption time of the
Database by utilizing multiple sizes of
files and key generation time, the results
file – 1KB, 2KB, 5KB, 50KB and
will be attained.
100KB is considered.
Hybrid cryptography systems currently
Time of Key generation is to generate
use combinations of RSA and AES,
key in file downloading process from
AES and Blowfish, Blowfish and ECC
the system. The size of file used are
and Triples DES among various others.
1KB, 2KB, 5KB, 50KB, and 100KB.
Such combinations ensure that those
The small file not required the time for
CSPs can harness both algorithms’
Page 1596
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
school: perception of applications and vol. 1, no. 2, pp. 12-17, 2013. Available:
Research Vol.3, No.6, pp.1-13, [9]. Odun-Ayo, I., Ajayi, O., Akanle, B.
Page 1597
ISRJournals and Publications
International Journal of Advanced Research in Computer Science Engineering and Information Technology
Volume: 6, Issue: 3,Special Issue: 1 ,Apr,2021 ,ISSN_NO: 2321-3337
Page 1598
ISRJournals and Publications