Securing of Cloud Storage Data Using Hybrid AES-ECC Cryptographic Approach
DOI:
https://doi.org/10.13052/jmm1550-4646.1921Keywords:
Multimedia security, Symmetric Cryptography, AES, ECC, Asymmetric Cryptography, blowfish, cloud storage security and authentication.Abstract
Internet has revolutionized the world in a way no one could have ever imagined. It paved the way for various different technologies, that have transformed the world exceptionally. Internet enabled cloud technology which provides cost-effective, scalable, on-demand computing resources with little to no downtime. Cloud storage allows its users to store and access private data from anywhere in the world without needing any high-end computing system. Cloud storage isn’t always secure, but that doesn’t imply it isn’t. The security of a data depends on the security policies followed by the provider along with the security of the communication channel via which the data is being sent. Encryption is used to obfuscate the data so that it can only be viewed when correct credentials, known as encryption keys, are provided. Following study proposes an encryption technique using ECC (Elliptic Curve Cryptography) along with AES (Advance Encryption Standard) to provide data confidentiality in an efficient way for securing data on cloud and hence, protect the personal information of user from any adversary. This new method is more effective, and the results are superior as a consequence.
Downloads
References
Daemen, Joan, Rijmen, Vincent. (March 9,), AES Proposal: Rijndael. National Institute of Standards and Technology 2003; p. 1. Retrieved 21 February 2013.
Jawahar Thakur, Nagesh Kumar. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation-Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering December 2011; vol. 1(2), pp. 6–12.
Shukla, D.K.; Dwivedi, V.K.; Trivedi, M.C. Encryption algorithm in cloud computing. Mater. Today Proc. 2020, 37, 1869–1875.
Yahia, H.S.; Zeebaree, S.R.M.; Sadeeq, M.A.M.; Salim, N.O.M.; Kak, S.F.; Al-Zebari, A.; Salih, A.A.; Hussein, H.A. Comprehensive survey for cloud computing-based nature-inspired algorithms optimization scheduling. Asian J. Res. Computer. Sci. 2021, 1–16.
Qazi, R.; Khan, I.A. Data security in cloud computing using elliptic curve cryptography. Int. J. Computer. Communication. Network. 2019, 1, 46–52.
Chen, Y.; Liu, H.; Wang, B.; Sonompil, B.; Ping, Y.; Zhang, Z. A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 2021, 10, 3.
Sridharan, S.; Arokiasamy, A. Effective secure data storage in cloud by using ecc algorithm. Middle-East J. Sci. Res. 2017, 25, 117–127.
Abdullahi Ibrahim, A.; Cheruiyot, W.; Kimwele, M.W. Data security in cloud computing with elliptic curve cryptography core. Int. J. Comput. 2017, 26, 1–14. Available online: http://ijcjournal.org/ (accessed on 22 October 2021).
Manaa, M.E.; Hadi, Z.G. Scalable and robust cryptography approach using cloud computing. J. Discret. Math. Sci. Cryptogr. 2020, 23, 1439–1445.
Madhavi, G.; Samatha, J. Secure data storage and access of data in cloud using Elliptic curve cryptography. IEEE J. 2020, 11. Available online: www.jespublication.com (accessed on 20 December 2021).
Zhu, Y.; Fu, A.; Yu, S.; Yu, Y.; Li, S.; Chen, Z. New algorithm for secure outsourcing of modular exponentiation with optimal checkability based on single untrusted server. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6.
S.M. Celestin, V.K. Muneeswaran, Implementation of Text based Cryptosystem using Elliptic Curve Cryptography. IEEE International Conference on Advanced Computing Dec 2009; pp. 82–85.
Hafid Mammass and Fattehallah Ghadi, Implementation of Smartcard Personalization Software. International Journal of Future Generation Communication and Networking 2012; vol. 5(4). pp. 39–54.
F. Amounas and E.H. El Kinani, A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin 1/2 Matrices. International Journal of Information & Network Security (IJINS) 2013; vol. 2(3), pp. 190–196.
Md. Zaheer Abbas, Dr. JVR Murthy, Authenticated And Policy – Compliant Source Routing. International Journal of Engineering Research and Applications (IJERA) 2012; vol. 2(3), pp. 1347–1352.
Bruce Schneier (1993). “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”. Fast Software Encryption, Cambridge Security Workshop Proceedings. Springer-Verlag: 191–204. Archived from the original on 2014-01-26.
“Cryptography: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”. Schneier on Security. Archived from the original on 2016-03-04. Retrieved 2015-12-31. (Wikipedia).
Arockia, P.; Dharani, N.; Aiswarya, R.; Shailesh, P. Cloud data security using elliptic curve cryptography. Int. Res. J. Eng. Technol. 2017, 4, 32–36.
Li, Y.; Gai, K.; Qiu, L.; Qiu, M.; Zhao, H. Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 2017, 387, 103–115.
Saeed, Z.R.; Ayop, Z.; Azma, N.; Rizuan Baharon, M. Improved cloud storage security of using three layers cryptography algorithms. Int. J. Comput. Sci. Inf. Secur. 2018, 16, 34–39.
Al-Dhuraibi, Y.; Paraiso, F.; Djarallah, N.; Merle, P. Elasticity in cloud computing: State of the art and research challenges. IEEE Trans. Serv. Comput. 2017, 11, 430–447.
Hodowu, D.K.M.; Korda, D.R.; Ansong, E.D. An enhancement of data security in cloud computing with an implementation of a two-level cryptographic technique, using AES and ECC algorithm. Int. J. Eng. Res. Technol. 2020, 9, 639–650.
Zhu, Y.; Fu, A.; Yu, S.; Yu, Y.; Li, S.; Chen, Z. New algorithm for secure outsourcing of modular exponentiation with optimal checkability based on single untrusted server. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6.
Agrahari, V. Data security in cloud computing using cryptography algorithms. Int. J. Sci. Dev. Res. 2020. Available online: www.ijsdr.org (accessed on 22 October 2021).
Selvam, J.M.; Srivaramangai, P. Time complexity analysis of cloud authentications and data security: Polynomial based hashing and elliptic curve cryptography. Int. J. Anal. Exp. Modal Anal. 2020, 12, 850–860.
Awad, W.S. A framework for improving information security using cloud computing. Int. J. Adv. Res. Eng. Technol. 2020, 11, 264–280.
Astuti, N.R.D.P.; Aribowo, E.; Saputra, E. Data security improvements on cloud computing using cryptography and steganography. IOP Conf. Series Mater. Sci. Eng. 2020, 821, 012041.
Manaa, M.E. Data encryption scheme for large data scale in cloud computing. J. Telecommun. Electron. Comput. Eng. 2017, 9, 1–5. Available online: https://jtec.utem.edu.my/jtec/article/view/2759 (accessed on 22 October 2021).
Suresha, R.G. Enhancing security in cloud storage using ecc algorithm. Int. J. Sci. Res. 2013, 2–8. Available online: https://www.ijsr.net/archive/v2i7/MDIwMTM3NA==.pdf (accessed on 22 December 2021).
Abbas, S.; Maryoosh, A.A. Improving data storage security in cloud computing using elliptic curve cryptography. IOSR J. Comput. Eng. 2015, 17, 48–53.
Barati, M.; Aujla, G.S.; Llanos, J.T.; Duodu, K.A.; Rana, O.F.; Carr, M.; Rajan, R. Privacy-Aware cloud auditing for gdpr compliance verification in online healthcare. IEEE Trans. Ind. Inform. 2021, 1.
Mahto, D.; Yadav, D.K. RSA and ECC: A comparative analysis. Int. J. Appl. Eng. Res. 2017, 12, 9053–9061. Sridhar C. Iyer, R.R. Sedamkar, and Shiwani Gupta. “A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach”, Procedia Computer Science, vol. 79, 2016. doi: 10.1016/j.procs.2016.03.038