Secure Cloud Storage Using Hybrid Cryptography

Abstract

This proposed hybrid algorithm can be made much more powerful and secure by increasing the number of iterations in the encryption algorithm to suit the level of security required. An inverse policy of reducing the number of iterations for lower security can also be employed. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. This system can be implemented into banking and corporate sectors to securely transfer confidential data in the world of data being the key asset, safeguarding our asset are primary responsibility. Communications, databases, infrastructure, transactions, knowledge; an organization’s data is arguably its most valuable asset. It is in a business’ best interests to keep its information safe, regardless of legal or regulatory requirements. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided into symmetric key cryptography and public key cryptography. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server. Cipher text data is visible for all people.

Country : India

1 Shruti Kambali2 Ghanshyam Gadekar3 Poorva Padave4 Poorva Patil5 Prof. Swati Vyas

  1. Student, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, India
  2. Student, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, India
  3. Student, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, India
  4. Student, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, India
  5. Professor, Dept. of AI & ML, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, India

IRJIET, Volume 7, Issue 5, May 2023 pp. 351-356

doi.org/10.47001/IRJIET/2023.705052

References

  1. Sombir Singh, Sunil k. Maakar, Dr. Sudesh Kumar “Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques”, IJARCSSE, Volume 3, Issue 6, pp 464-470, June 2013.
  2. Nick Hoffman “A Simplified IDEA Algorithm” Department of Mathematics, Northern Kentucky University pp 1-5, 2007.
  3. Meier, W., On the Security of the IDEA block cipher, Advances in Cryptology.
  4. Atul Kahate “Cryptography and Network Security” second edition.
  5. Shaaban Sahmoud, Wisam Elmasry and Shadi Abdulfa “Enhancement the security of AES againt modern attacks by using variable key block cipher”.
  6. Data Encryption Standard (DES), Federal Information processing standards, Publication 46-3, 1999 October 25.
  7. Advanced Encryption Standard, National Institute of Standards and Technology (US).
  8. URL:http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  9. William Stallings:”Cryptography and network security: Principles and Practices”.
  10. Advanced Encryption Standard, [online], Available URL: http://en.wikip/Advanced_Encryption_Standard
  11. T.S. Chen, H.-W. Tsai, Y.-H. Chang, and T.-C. Chen, “Geographic converge cast using mobile sink in wireless sensor networks,” Comput. Commun., vol. 36, no. 4, pp. 445–458, Feb. 2013.
  12. Clustering and routing in wireless sensor networks,” Comput. Netw., vol. 55, no. 13, pp. 2803–2820, Sep. 2011.
  13. William Stallings:”Cryptography and network security: Principles and Practices”.