HYBRID ALGORITHM DESIGN AND PERFORMANCE TESTING FOR USER DATA PRIVACY IN CLOUD ENVIRONMENT
Keywords:
Hybrid, Data, ImplementationAbstract
Most of the IT companies are offering theirs software services to users now using
CloudPlatform , that is now very famous and flexible technology but security of user data is a
very serious concern to better motivation [1]. Cloud computing is referred as ‘the fifth utility’,
in addition to water, electricity, telephone and, gas [2] because it offers ondemand computing
services over the internet on pay as use model .Traditional encryption methods such as
symmetric and asymmetric encryption have limitations when applied individually in cloud
environments. Symmetric encryption provides fast encryption and decryption but suffers from
key distribution challenges, while asymmetric encryption offers secure key exchange but is
computationally expensive. This paper proposes a hybrid encryption algorithm that combines
the advantages of both approaches to address the security and privacy needs of cloud-based
systems, with a specific emphasis on user data protection.As we gone through with available
literature [3] we found that most of the researchers used a single key for both encryption and
decryption which might be is a weak target of various identified malicious attacks. Hence, in
our proposed designed hybrid algorithm, we have implemented our algorithm using multikey
for encryption and decryption on large text files .
References
D. P. Timothy and A. K. Santra, "A hybrid cryptography algorithm for cloud computing
security," 2017 International conference on Microelectronic Devices, Circuits and Systems
(ICMDCS), Vellore, India, 2017, pp. 1-5, doi: 10.1109/ICMDCS.2017.8211728.
Buyya R., Chee S.Y., and Venugopal S. (2008) Market Oriented Cloud Computing: Vision,
Hype, and Reality for Delivering IT Services as Computing Utilities in 10th IEEE International
Conference on High Performance Computing and Communication., pp.5-13
Goyal, V., Kant, C. (2018). An Effective Hybrid Encryption Algorithm for Ensuring Cloud
Data Security. In: Aggarwal, V., Bhatnagar, V., Mishra, D. (eds) Big Data Analytics. Advances
in Intelligent Systems and Computing, vol 654. Springer, Singapore
Priyadarshini P., Prashant N., Narayan D. G., and Meena S. M., (2016). A Comprehensive
Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish, Procedia
Computer Science 78 (1): 617 – 624.
Ankita, V, Paramita G, and Sunita M. (2016) Comparative Study of Different Cryptographic
Algorithms, International Journal of Emerging Trends & Technology in Computer Science, 5
(1): 58-63
Hodowu, D.K.M.; Korda, D.R.; Ansong, E.D. An enhancement of data security in cloud
computing with an implementation of a two-level cryptographic technique, using AES and
ECC algorithm. Int. J. Eng. Res. Technol. 2020, 9, 639–650.
HYBRID ALGORITHM DESIGN AND PERFORMANCE TESTING
FOR USER DATA PRIVACY IN CLOUD ENVIRONMENT
ISSN:1517-4492 | E-ISSN:2178-7727 388 © 2024 Authors
Vol. 7, No. 1 (2024)
Shen,Y.;Sun,Z.;Zhou,T.SurveyonAsymmetricCryptographyAlgorithms.InProceedingsofth
e2021InternationalConferenceon Electronic Information Engineering and Computer Science
(EIECS), Changchun, China, 23–26 September 2021; pp. 464–469.
Kumar,S.;Singh,B.K.;Akshita;Pundir,S.;Batra,S.;Joshi,R.AsurveyonSymmetricandAsy
mmetricKeybasedImageEncryption. In Proceedings of the 2nd International Conference
on Data, Engineering and Applications (IDEA), Changchun, China, 23–
September2020;pp.1–5.
Rivest,R.L.;Shamir,A.;Adleman,L.AMethodforObtainingDigitalSignaturesandPublicKeyCryptosystems.Commun. ACM1978, 21, 120–126.
Koblitz,N.EllipticCurveCryptosystems.Math.Comput.1987,48,203–209.
Menezes,A.J.;Vanstone,S.A.Ellipticcurvecryptosystemsandtheirimplementation.J.Cryptol.199
,6,209–224