Secure Cloud Storage Using Hybrid Cryptography

Shruti KambaliStudent, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, IndiaGhanshyam GadekarStudent, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, IndiaPoorva PadaveStudent, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, IndiaPoorva PatilStudent, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, IndiaProf. Swati VyasProfessor, Dept. of AI & ML, Smt. Indira Gandhi College of Engineering, Ghansoli, New Mumbai, Maharashtra, India

Vol 7 No 5 (2023): Volume 7, Issue 5, May 2023 | Pages: 351-356

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 12-06-2023

doi Logo doi.org/10.47001/IRJIET/2023.705052

Abstract

This proposed hybrid algorithm can be made much more powerful and secure by increasing the number of iterations in the encryption algorithm to suit the level of security required. An inverse policy of reducing the number of iterations for lower security can also be employed. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. This system can be implemented into banking and corporate sectors to securely transfer confidential data in the world of data being the key asset, safeguarding our asset are primary responsibility. Communications, databases, infrastructure, transactions, knowledge; an organization’s data is arguably its most valuable asset. It is in a business’ best interests to keep its information safe, regardless of legal or regulatory requirements. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided into symmetric key cryptography and public key cryptography. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server. Cipher text data is visible for all people.

Keywords

AES, Advanced Encryption, Standard, DES, Data Encryption Standard, IDEA, International Data Encryption Algorithm, RC6, Rivest cipher 6, ECC, Elliptic Curve Cryptography


Citation of this Article

Shruti Kambali, Ghanshyam Gadekar, Poorva Padave, Poorva Patil, Prof. Swati Vyas, “Secure Cloud Storage Using Hybrid Cryptography” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 5, pp 351-356, May 2023. https://doi.org/10.47001/IRJIET/2023.705052

References
  1. Sombir Singh, Sunil k. Maakar, Dr. Sudesh Kumar “Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques”, IJARCSSE, Volume 3, Issue 6, pp 464-470, June 2013.
  2. Nick Hoffman “A Simplified IDEA Algorithm” Department of Mathematics, Northern Kentucky University pp 1-5, 2007.
  3. Meier, W., On the Security of the IDEA block cipher, Advances in Cryptology.
  4. Atul Kahate “Cryptography and Network Security” second edition.
  5. Shaaban Sahmoud, Wisam Elmasry and Shadi Abdulfa “Enhancement the security of AES againt modern attacks by using variable key block cipher”.
  6. Data Encryption Standard (DES), Federal Information processing standards, Publication 46-3, 1999 October 25.
  7. Advanced Encryption Standard, National Institute of Standards and Technology (US).
  8. URL:http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  9. William Stallings:”Cryptography and network security: Principles and Practices”.
  10. Advanced Encryption Standard, [online], Available URL: http://en.wikip/Advanced_Encryption_Standard
  11. T.S. Chen, H.-W. Tsai, Y.-H. Chang, and T.-C. Chen, “Geographic converge cast using mobile sink in wireless sensor networks,” Comput. Commun., vol. 36, no. 4, pp. 445–458, Feb. 2013.
  12. Clustering and routing in wireless sensor networks,” Comput. Netw., vol. 55, no. 13, pp. 2803–2820, Sep. 2011.
  13. William Stallings:”Cryptography and network security: Principles and Practices”.