HYBRID ALGORITHM DESIGN AND PERFORMANCE TESTING FOR USER DATA PRIVACY IN CLOUD ENVIRONMENT

Authors

  • Mamta Joshi, Dr. Rashmi Priya

Keywords:

Hybrid, Data, Implementation

Abstract

Most of the IT companies are offering theirs software services to users now using
CloudPlatform , that is now very famous and flexible technology but security of user data is a
very serious concern to better motivation [1]. Cloud computing is referred as ‘the fifth utility’,
in addition to water, electricity, telephone and, gas [2] because it offers ondemand computing
services over the internet on pay as use model .Traditional encryption methods such as
symmetric and asymmetric encryption have limitations when applied individually in cloud
environments. Symmetric encryption provides fast encryption and decryption but suffers from
key distribution challenges, while asymmetric encryption offers secure key exchange but is
computationally expensive. This paper proposes a hybrid encryption algorithm that combines
the advantages of both approaches to address the security and privacy needs of cloud-based
systems, with a specific emphasis on user data protection.As we gone through with available
literature [3] we found that most of the researchers used a single key for both encryption and
decryption which might be is a weak target of various identified malicious attacks. Hence, in
our proposed designed hybrid algorithm, we have implemented our algorithm using multikey
for encryption and decryption on large text files .

References

D. P. Timothy and A. K. Santra, "A hybrid cryptography algorithm for cloud computing

security," 2017 International conference on Microelectronic Devices, Circuits and Systems

(ICMDCS), Vellore, India, 2017, pp. 1-5, doi: 10.1109/ICMDCS.2017.8211728.

Buyya R., Chee S.Y., and Venugopal S. (2008) Market Oriented Cloud Computing: Vision,

Hype, and Reality for Delivering IT Services as Computing Utilities in 10th IEEE International

Conference on High Performance Computing and Communication., pp.5-13

Goyal, V., Kant, C. (2018). An Effective Hybrid Encryption Algorithm for Ensuring Cloud

Data Security. In: Aggarwal, V., Bhatnagar, V., Mishra, D. (eds) Big Data Analytics. Advances

in Intelligent Systems and Computing, vol 654. Springer, Singapore

Priyadarshini P., Prashant N., Narayan D. G., and Meena S. M., (2016). A Comprehensive

Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish, Procedia

Computer Science 78 (1): 617 – 624.

Ankita, V, Paramita G, and Sunita M. (2016) Comparative Study of Different Cryptographic

Algorithms, International Journal of Emerging Trends & Technology in Computer Science, 5

(1): 58-63

Hodowu, D.K.M.; Korda, D.R.; Ansong, E.D. An enhancement of data security in cloud

computing with an implementation of a two-level cryptographic technique, using AES and

ECC algorithm. Int. J. Eng. Res. Technol. 2020, 9, 639–650.

HYBRID ALGORITHM DESIGN AND PERFORMANCE TESTING

FOR USER DATA PRIVACY IN CLOUD ENVIRONMENT

ISSN:1517-4492 | E-ISSN:2178-7727 388 © 2024 Authors

Vol. 7, No. 1 (2024)

Shen,Y.;Sun,Z.;Zhou,T.SurveyonAsymmetricCryptographyAlgorithms.InProceedingsofth

e2021InternationalConferenceon Electronic Information Engineering and Computer Science

(EIECS), Changchun, China, 23–26 September 2021; pp. 464–469.

Kumar,S.;Singh,B.K.;Akshita;Pundir,S.;Batra,S.;Joshi,R.AsurveyonSymmetricandAsy

mmetricKeybasedImageEncryption. In Proceedings of the 2nd International Conference

on Data, Engineering and Applications (IDEA), Changchun, China, 23–

September2020;pp.1–5.

Rivest,R.L.;Shamir,A.;Adleman,L.AMethodforObtainingDigitalSignaturesandPublicKeyCryptosystems.Commun. ACM1978, 21, 120–126.

Koblitz,N.EllipticCurveCryptosystems.Math.Comput.1987,48,203–209.

Menezes,A.J.;Vanstone,S.A.Ellipticcurvecryptosystemsandtheirimplementation.J.Cryptol.199

,6,209–224

Downloads

Published

2024-03-23

How to Cite

Mamta Joshi, Dr. Rashmi Priya. (2024). HYBRID ALGORITHM DESIGN AND PERFORMANCE TESTING FOR USER DATA PRIVACY IN CLOUD ENVIRONMENT . Acta Scientiae, 7(1), 382–388. Retrieved from https://periodicosulbrabra.org/index.php/acta/article/view/88

Issue

Section

Articles