Information security is the number one priority for any establishment concerned with its growth and privacy of its data. Attackers have devised a variety of strategies to get access to organizations' databases, both on cloud and offline systems. The incorporation of both cryptography and cloud folder model to secure cloud based storage presented in this paper, is a contemporary approach to securing cloud storage. The Cloud Folder Model adds to the storage strength. It serves as a significant deterrent against eavesdropping and injection assaults on the cloud storage. The model leverages RSA and AES data encryption, as well as a folder concept for storing the files in the cloud. It only enables authorized entities to have access to data and rejects suspicions and fraudulent attempts to access secured data. The system also created a mechanism that utilizes public and private keys. The system is be divided into two sections: online and offline. Data is encrypted using RSA and the Advanced Encryption Standard on the offline side (AES) while the online system adds to the encrypted data's security by guarding against injection attacks and data eavesdropping in transit. Our result shows that the new system provides better security for cloud storage than the existing system.
Published in | American Journal of Computer Science and Technology (Volume 5, Issue 3) |
DOI | 10.11648/j.ajcst.20220503.14 |
Page(s) | 178-183 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
Cryptography, Cloud Storage, Data Security, Cloud Folder
[1] | Abubakar M., Aloysius A., Umar Z. & Dauda M., (2019). Comparative Analysis of Some Efficient Data Security Methods among Cryptographic Techniques for Cloud Data Security, Nigerian Journal of Basic and Applied Science, 27, (1), 81-88. |
[2] | Ahmad I., Bakht H. & Mohan U., (2017). Cloud Computing - A Comprehensive Definition. Journal of Computing and Management Studies. 1. |
[3] | Aman, S., Shivashankar, R., Ginni, and Advin, M. (2021). Securing File Storage on the Cloud using Cryptography. International Journal of Advanced Research in Computer and Communication Engineering. 10 (4), 265-268. |
[4] | Chang X., Li W., Yan A., Tsang P., & Poon T. (2022). Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm. Scientific Reports. 7 (12). https://doi.org/10.1038/s41598-022-11861/ |
[5] | Ghamya K., Suma K., & Bhargavi V., (2019). An Authorized ClouDedup in Hybrid Cloud using Triple Data Encryption Standard, International Journal of Recent Technology and Engineering (IJRTE), 8 (4), 9803-9807. |
[6] | Muhammad P., Sijjad A., Ghazala P. & Kamran A., (2019). SACA: A Study of Symmetric and Asymmetric Cryptographic Algorithms. International Journal of Computer Science and Network Security (IJCSNS), 19 (1). |
[7] | Muhammad R., Quazi M. & Rafiqul I., (2022). Lightweight cryptography in IoT networks: A survey, Future Generation Computer Systems, v129, p 77-89, ISSN 0167-739X, https://doi.org/10.1016/ j.future.2021.11.011 |
[8] | Muhned H., Ghassan H. & Haider K., (2021). New Lightweight Hybrid Encryption Algorithm for Cloud Computing (LMGHA-128bit) by using new 5-D hyperchaos system, Turkish Journal of Computer and Mathematics Education, 12 (10), 2531-2540. |
[9] | Nidhi, K and Vimmi, M (2022). Secure Cloud Data storage using Hybrid Cryptography. International Journal for Research in Applied Science and Engineering Technology. 10 (4), 50-63. |
[10] | Pandey & Bathla, (2020). A Secure And Managed Cloud Storage System Using Encryption With Machine Learning Approach, International Journal of Science and Technology, 6, (3), 87-101. |
[11] | Priya (2018). Information Security And Privacy In Cloud Using Hybrid Cryptographic Algorithm, International Journal of Engineering Applied Sciences and Technology, 3, (4), 49-53. |
[12] | Rahul Neware, (2019). Survey on Security Issues in Mobile Cloud Computing and Preventive Measures, Smart Computing Paradigms: New Progresses and Challenges. |
[13] | Shynu P., Nadesh R., Varun G., Venu P., Mahdi A. & Mohammad R., (2020). A Secure Data Deduplication System For Integrated Cloud-Edge Networks, Journal of Cloud Computing: Advances, Systems and Applications, 9 (6), 100-109. |
[14] | Sofia, M. V Joann, D, Kerry, M, Shun, R… Ozonot, A.(2020). A Cloud based Bio-informatics Analytic infrastructure and Data Management Core for the Expanded Program on Immunization Consortium. DMC Journal. 6 (7), 104-110. |
[15] | Sood, S., (2021). A combined approach to ensure data security in cloud computing, Journal of Networking and Computer Application, 3 (5), 1831–1838. |
[16] | Sumagna, P., Sunil, A., and Rakesh, R. (2021). Hybrid cryptography algorithm for secure file Storage in the cloud. A Journal of Composition Theory. 9 (10), 25-28. |
[17] | Sunyaev A., (2020). Cloud Computing. In: Internet Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-34957-8_7. |
[18] | Supern, S (2011). Cloud Security in 21st Century: Current Key issues in Service Models on Cloud Computing. University of Nottingham. |
[19] | Vasileios, A. M and Kostas, E P (2014). A New Methodology based on Cloud Computing for Efficient Virus Detection. IEEE Conference. |
[20] | Vincent C., Michaela I., Wei B., Ang L., Qinghua L., Antonios, G., (2020). National Institute of Standards and Technology, https://doi.org/10.6028/NIST.SP.800-210 Vttam, K and Jay, P.(2020). Secure File Storage on Cloud using Hybrid Cryptography Algorithm. International Journal of creative thoughts. 8 (7), 334-341. |
[21] | Youseff L., Butrico M., & Da Silva D., (2008). “Toward a Unified Ontology of Cloud Computing”, IEEE, 1–10. |
APA Style
Anietie Ekong, Odikwa Henry, Abasiama Silas, Imou Douglas. (2022). Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage. American Journal of Computer Science and Technology, 5(3), 178-183. https://doi.org/10.11648/j.ajcst.20220503.14
ACS Style
Anietie Ekong; Odikwa Henry; Abasiama Silas; Imou Douglas. Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage. Am. J. Comput. Sci. Technol. 2022, 5(3), 178-183. doi: 10.11648/j.ajcst.20220503.14
@article{10.11648/j.ajcst.20220503.14, author = {Anietie Ekong and Odikwa Henry and Abasiama Silas and Imou Douglas}, title = {Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage}, journal = {American Journal of Computer Science and Technology}, volume = {5}, number = {3}, pages = {178-183}, doi = {10.11648/j.ajcst.20220503.14}, url = {https://doi.org/10.11648/j.ajcst.20220503.14}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajcst.20220503.14}, abstract = {Information security is the number one priority for any establishment concerned with its growth and privacy of its data. Attackers have devised a variety of strategies to get access to organizations' databases, both on cloud and offline systems. The incorporation of both cryptography and cloud folder model to secure cloud based storage presented in this paper, is a contemporary approach to securing cloud storage. The Cloud Folder Model adds to the storage strength. It serves as a significant deterrent against eavesdropping and injection assaults on the cloud storage. The model leverages RSA and AES data encryption, as well as a folder concept for storing the files in the cloud. It only enables authorized entities to have access to data and rejects suspicions and fraudulent attempts to access secured data. The system also created a mechanism that utilizes public and private keys. The system is be divided into two sections: online and offline. Data is encrypted using RSA and the Advanced Encryption Standard on the offline side (AES) while the online system adds to the encrypted data's security by guarding against injection attacks and data eavesdropping in transit. Our result shows that the new system provides better security for cloud storage than the existing system.}, year = {2022} }
TY - JOUR T1 - Hybridized Cryptography and Cloud Folder Model (CFM) for Secure Cloud-Based Storage AU - Anietie Ekong AU - Odikwa Henry AU - Abasiama Silas AU - Imou Douglas Y1 - 2022/09/27 PY - 2022 N1 - https://doi.org/10.11648/j.ajcst.20220503.14 DO - 10.11648/j.ajcst.20220503.14 T2 - American Journal of Computer Science and Technology JF - American Journal of Computer Science and Technology JO - American Journal of Computer Science and Technology SP - 178 EP - 183 PB - Science Publishing Group SN - 2640-012X UR - https://doi.org/10.11648/j.ajcst.20220503.14 AB - Information security is the number one priority for any establishment concerned with its growth and privacy of its data. Attackers have devised a variety of strategies to get access to organizations' databases, both on cloud and offline systems. The incorporation of both cryptography and cloud folder model to secure cloud based storage presented in this paper, is a contemporary approach to securing cloud storage. The Cloud Folder Model adds to the storage strength. It serves as a significant deterrent against eavesdropping and injection assaults on the cloud storage. The model leverages RSA and AES data encryption, as well as a folder concept for storing the files in the cloud. It only enables authorized entities to have access to data and rejects suspicions and fraudulent attempts to access secured data. The system also created a mechanism that utilizes public and private keys. The system is be divided into two sections: online and offline. Data is encrypted using RSA and the Advanced Encryption Standard on the offline side (AES) while the online system adds to the encrypted data's security by guarding against injection attacks and data eavesdropping in transit. Our result shows that the new system provides better security for cloud storage than the existing system. VL - 5 IS - 3 ER -