The Design and Implementation of A Secure File Storage On The Cloud Using Hybrid Cryptography
The Design and Implementation of A Secure File Storage On The Cloud Using Hybrid Cryptography
The Design and Implementation of A Secure File Storage On The Cloud Using Hybrid Cryptography
IJARSCT
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)
Abstract: In recent years, cloud computing has become a popular way of storing and sharing data.
However, security concerns have been raised about the safety of sensitive information stored on the cloud.
Hybrid cryptography, which combines symmetric and asymmetric encryption, has been proposed as a
solution to these concerns. This paper proposes a new hybrid cryptography approach for secure file storage
on the cloud regardless of the type of deployment model i.e., either public cloud, private cloud, or hybrid
cloud. The proposed approach uses a combination of the Advanced Encryption Standard (AES) algorithm,
Triple Data Encryption Standard (DES) algorithm, and Rivest cipher 6 (RC6) algorithms are used to
provide block-wise security to data. LSB steganography technique is introduced for key information
security.
I. INTRODUCTION
Securing files on the cloud is a critical concern for individuals and organizations alike, as they want to ensure that their
confidential information remains protected from unauthorized access. Hybrid cryptography is a security approach that
combines the strengths of symmetric and asymmetric encryption to provide secure file storage on the cloud. Cloud
computing originated from earlier large-scale distributed computing technology. The National Institute of Standards
and Technology (NIST) defines Cloud computing as “a model for enabling convenient, on-demand network access to a
shared pool of configurable computing resources (e.g., networks, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service provider interaction”.
Hybrid cryptography combines the strengths of both symmetric and asymmetric encryption. The data is first encrypted
using a randomly generated symmetric key in this approach. The symmetric key is then encrypted using the receiver's
public key, and both the encrypted data and encrypted symmetric key are stored in the cloud. When the receiver wants
to access the data, they use their private key to decrypt the symmetric key and then use the decrypted symmetric key to
decrypt the data.
The proposed system of using hybrid cryptographic system uses a combination of multiple cryptographic algorithms
and steganography techniques. 3DES, RC6, and AES algorithms are used to ensure the security of data. The LSB
steganography method is also implemented to store key information securely. The file is divided into three parts during
the encryption process. Each part of the file will be encrypted using a dissimilar encryption algorithm simultaneously.
After the encryption process, the key information is inserted into an image using the LSB method.
In summary, this proposed methodology ensures better security and safety of user data because DES alone is used for
data encryption in financial transactions, electronic commerce, and other applications where high security is required.
Additionally, it provides a stronger level of encryption than the original Data Encryption Standard (DES) algorithm.
RC6 will be used because it is designed to be more efficient and faster than other block ciphers during encryption and
decryption processes where high performance and flexibility are important. While AES is coming in because it is
considered a highly secure algorithm and has become the de facto standard for encryption in many industries, including
finance, healthcare, and government data.
signature scheme as the second step process. And the last step, information is encrypted using AES and thereafter
information is transferred to the required cloud system. For decryption, the reverse procedure is applied.
"Design and Implementation of Secure Cloud Storage System using Hybrid Cryptography Algorithms with Role-based
Access Control Model" by Anjali DV, Dr. S.N Chandrashekara, (2016). This paper [11] describes the mathematical
model for calculating the trust of the user by applying the cryptography concepts proposed by AES, RSA, and SHA-1
algorithm for encryption and decryption of data, and the role-based access control model is applied to provide access
based on the role played by the user.
"Hybrid Cryptography for Secure Cloud Storage of Electronic Health Records" by V. Bharti and R. Sharma (2018).
This paper [12] proposes a hybrid cryptography approach for secure cloud storage of electronic health records (EHRs).
The system uses a combination of symmetric and asymmetric encryption, as well as digital signatures and MACs, to
ensure the confidentiality, integrity, and authenticity of EHRs. The authors also evaluate the performance of their
system using a real-world dataset.
In summary, based on the literature survey I conducted shows that hybrid cryptography is a promising solution for
securing files on the cloud. The proposed techniques and schemes combine different symmetric encryption algorithms
to ensure data confidentiality, integrity, and authenticity. These studies also evaluate the performance and security of
the proposed approaches and show that they provide secure data storage in cloud computing.
III. METHODOLOGY
Algorithm to be used.
A. The Advanced Encryption Standard (AES) Algorithm
AES is a symmetric key block cipher used to encrypt data. It is currently one of the most widely used encryption
algorithms and is considered highly secure. AES encrypts data in blocks of 128 bits and has key sizes of 128, 192, or
256 bits. It is used in many applications such as secure communication, electronic payments, and data storage.
C. 3DES Analysis
The DES satisfies both the desired properties of the block cipher. These two properties make the cipher very strong.
Avalanche effect − A minor change in plaintext resulting in a major change in the ciphertext.
Completeness − Each ciphertext bit relies on many bits of plaintext.
without significantly affecting its quality. In encryption, LSB steganography involves hiding secret data in the least
significant bits of an image or audio file, which can help conceal the secret data’s presence.
FIGURE
IGURE 1: 1 Encryption and decryption system model
The above diagram [figure 1] is an overview of the encryption process that has been adopted to implement the
prototype. Referring the Figure 1, different public keys will be generated for the encryption process and the same
process will be performed during the decryption. Meaning that three different keys will be used to decrypt the files.
The implementation of the proposed cryptographic system will involve developing a proof proof-of-concept prototype that
will be used to evaluate the effectiveness of each algorithm. Furthermore, the prototype will be intended to simulate a
cloud-based
based environment and will involve the use of a cloud server and a client to upload the files into the cloud. The
system prototype will be developed using C# programming languages and and their associated tools such as Visual Studio
.NET framework and MS SQL.
Data encryption keys are inserted into a cover image using the LSB technique. Stego-Image
Stego Image is sent to a valid receiver
using email. For file decryption purposes reverse process of encryption
encryption is applied. The files that the user will upload to
the cloud system will be encrypted with a user-specific
user specific key and stored safely on the cloud. And in the same process, the
recipient will receive an email containing a link where he/she can download a key which will be in a form of an image,
and use it for the decryption process.
In summary, the proposed work in this paper is to design and implement a robust secure cloud storage system to
achieve a higher level of security for file storage on the cloud
cloud using hybrid cryptography where the stored files are
completely secured, as the files are being encrypted not by just using one but three encryption algorithms: AES, 3DES,
and RC6. The performance of these algorithms can be evaluated on several factors including speed, security, and
flexibility.
According to [Table 1] below, it provides a comparison of the proposed system with some related works and how this
study is going to address some of the gaps.
Author & Year Algorithm Used Purpose of the system Limitations
Sanjeev, Garima DES and RSA The purpose of this system was to Vulnerability to brute force
Karnani, & Madhu algorithms take advantage of the strengths of attacks. DES and RSA do
Gaur both algorithms to provide secure and not provide forward secrecy
(2021) efficient encryption in applications
such as online banking, secure
communications, and e-commerce
Naveetha K. & Attribute-based The purpose of this system was to It takes time for encryption,
T. Tamilarasan encryption (ABE) provide fine-grained access control to key generation, and
(2021) encrypted data and provide a more decryption. The system is
flexible and secure approach to also restricted in the real-
access control and data sharing time environment
Bello A. Aliyu M. AES and SHA-2 Hash The purpose of this system was to Less secure with many
Muazu Function provide strong security measures to vulnerabilities Collisions
D.andBodinga protect sensitive data in various are easy
(2022) applications because AES is used for
encryption, while SHA-2 is used for
data integrity and authentication.
A. Poduval1, A. DES, AES, and RC6 The purpose of this system wasto The proposed system was
Doke, H. Nemade, design an encryption algorithm for prone to several security
and R. Nikam(2019) storing the secure file in multi-cloud weaknesses
storage andwireless communications,
virtual private networks (VPNs), and
other electronic data
Proposed System Design and implementation 3DES, RC6, and AES algorithms are utilized, and the key
of secure file storage on theinformation will be encrypted using the LSB steganography
cloud using hybridmethod.
cryptography Overall, the purpose of these proposed algorithms and LSB
steganography technic is to ensure that sensitive data is
protected from unauthorized access and interception during
transmission or storage. The Least Significant Bit (LSB)
steganography technic is coming in so that users should be
able to hide sensitive data, such as passwords, and encryption
keys within a digital image or audio file without visibly
altering the original file.
TABLE 1: Comparison of the proposed system with some related works
Register / Login:
All users need to register first by filling up the basic registration fields.
Using the combination of login id (email) and password, the user can log in to the system.
Upload Image:
Here, different types of files to be stored are encrypted using AES (Advance Encryption Standard), DES (Data
Encryption Standard), and RC2 (Rivest Cipher 2) encryption algorithms.
LSB (Least Significant Bit) steganography technique is introduced for key information
information security at this level.
Key information contains which part of the file is encrypted using which algorithm and key.
Download Image:
Here, when the user request for a file to be downloaded, then that file is decrypted using AES, DES, and RC2.
After successful decryption, the image file is merged into one file and then downloaded.
The key is extracted from the image.
Log Generation:
If the image file doesn’t match the sender’s image file, then the system system will display a dummy file and the
technical details such as user id, IP address, date, time, etc. will be stored in the database.
The diagram above [figure 2] simply explains how the system process works, that is from the user login process, upload
files, generation of email notification, and the process of downloading the uploaded files from the cloud system.
FIGURE 3: Performance
erformance comparison results of AES, 3DES, and RC6
Referring to the diagram above [figure 3], 3] the figure simply explains the performance comparison results of each
algorithm system after being evaluated in areas of speed, memory file size, and throughput
throughput. Four different file sizes
were selected to evaluate the speed of encrypting and decrypting the selected sample files.
XI. ACKNOWLEDGMENT
I would like to express my sincere gratitude to all those who have supported me throughout this research endeavor. First
and foremost, I would like to thank my supervisor, Dr.Glorindal Selvam, for providing me with guidance,
encouragement, and constructive criticism at every step of the way. Her expertise and insights have been invaluable to
me.
REFERENCES
[1]. Shrikanta Jogar1 & Darshan S Handral. (2022). “Secure File Storage on Cloud Using HybridCryptography”,
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT).
[2]. Gajanan T, S. Jayde, H.Gaurkhede, R. Vaidya, A.Wankhade& V.Yelekar. (2021). “Secure File Storage on
Cloud Using Hybrid Cryptography”, International Research Journal of Engineering and Technology
(IRJET). ISSN: 2395-0056.
[3]. M.Naveetha Krishnan&T.Tamilarasan. (2021). “Secure File Storage on Cloud UsingHybrid Cryptography”,
International Journal of Advanced Research in Computer Science Engineering and Information Technology
(IJARCSEIT).
[4]. Uttam Kumar, Mr. Jay Prakash. (2020). “Secure File Storage On Cloud Using Hybrid Cryptography
Algorithm”, International Journal Of Creative Research Thoughts (IJCRT). ISSN:- 2320-2882 [ Base Paper].
[5]. Aditya Poduval, Abhijeet Doke, Hitesh Nemade& Rohan Nikam. (2019). “Secure File Storage on Cloud
using Hybrid Cryptography”, International Journal of Computer Sciences and Engineering (IJCSE).E-ISSN:
2347-2693.
[6]. M. Malarvizhi, J. Angela JennifaSujana, T.Revathi. (2014). “Secure File Sharing Using Cryptographic
Techniques In Cloud”,International Conference On Green Computing Communication And Electrical
Engineering (ICGCCEE).
[7]. Rawal, B. S., & Vivek, S. S. (2107). “Secure Cloud Storage and File Sharing”. IEEE International
Conference on Smart Cloud (SmartCloud).
[8]. A. Buhari, A. Mubarak, B. Bodinga, and Muazu D. Sifawa. (2012). “Design of a Secure Virtual File Storage
System on Cloud using Hybrid Cryptography”. Int. J. Advanced Networking and Applications
[9]. Maitri, P. V., & Verma. (2016). “Secure file storage in cloud computing using a hybrid cryptography
algorithm”. International Conference on Wireless Communications, Signal Processing and Networking
(WiSPNET),
[10]. Ping, Z. L., Liang, S. Q., & Liang, L. X. (2011). “RSA Encryption and Digital Signature”. (2011),
International Conference on Computational and Information Sciences.
[11]. Rewagad, P., & Pawar, Y. (2013). “Use of Digital Signature with Diffie Hellman Key Exchange and AES
Encryption Algorithm to Enhance Data Security in Cloud Computing”.International Conference on
Communication Systems and Network Technologies.
[12]. Anjali DV, Dr. S.N Chandrashekara. (2016). "Design and Implementation of Secure Cloud Storage System
using Hybrid Cryptography Algorithms with Role-based Access Control Model", IJETR
[13]. Gajendra, B. P., Singh, V. K., & Sujeet, M. (2016). Achieving cloud security using third-party auditor, MD5,
and identity-based encryption. 2016 International Conference on Computing, Communication, and
Automation (ICCCA), 1304–1309.
[14]. Aman Kumar, Dr.Sudesh Jakhar, Mr. Sunil Makka. (2012). “Comparative Analysis between DES and RSA
Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering,
Vol.2 Issue.
[15]. M. N Wahid, A. Ali, B. Esparham, M. Marwan. (2018).“Comparison of crypto. Algo: DES, 3DES, AES,
RSA & blowfish for guessing attacks prevention” in 2018 Comp Sci Appl Techno.
[16]. Ashish Sharma, Dinesh Bhuriya, Upendra. (2017). Singh Survey of stock market prediction using machine
learning approach “International conference of Electronics, Communication and Aerospace Technology
(ICECA)”.
[17]. Mr. Gajanan N. Tikhe, Mr. Jeetendra Ambulkar. (2011). “A Certificate-Based Scheme to Defend against
Wormhole Attacks in Ant-based Adaptive Multicast Routing Protocol for MANET”, in ICCCT, Delhi
[18]. Mr. Gajanan N. Tikhe, Mr. Yogadhar Pandey. (2012) “A Secure Scheme to Avoid Wormhole Attacks in
Ant-based Adaptive Multicast Routing Protocol for MANET”, IFRSA’s International Journal Of Computing
(IIJC) Volume 2, Issue 1, ISSN (Print):2231:2153, ISSN (Online):2230:9039
[19]. Dan Dobre, Paolo Viotti, Marko Vukolic. (2017). " Hybris: Robust Hybrid Cloud Storage", ACM
Transactions on Storage, Vol . 13, Issue 3, October 2017
[20]. Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient Data Security Using Hybrid
Cryptography on Cloud Computing.
[21]. Kumar, A., Lee, B. G., Lee, H., & Kumari. (2012).“Secure storage and access of data in cloud computing”.
International Conference on ICT Convergence (ICTC).
[22]. A. Nadeem. (2006). “A performance comparison of data encryption algorithms," IEEE Information and
Communication Technologies, pp. 84-89.