Abstract
There has been a boom in the amount of data that is being transferred over the Internet. With the growth of IoT and various cloud services, it can be said that the growth of this ever-increasing flow of data will be exponential in future. Several new high-speed communication media, like optical fiber cables, are being used for faster transfer of data with higher speeds. However, there is a need to secure all the data. Especially, data from IoT devices as they usually communicate wirelessly because of their ad hoc placements which varies per individual needs. The data collected can be sensitive and hence must be secured. Same can be said for the cloud services. The data from cloud server may be routed via various different types of networks. The security of these networks cannot be guaranteed. Instead, there is a need to make sure that the data remains secured even when it is traveling through unsecure networks. Here, a new hybrid encryption algorithm is proposed which uses AES, Blowfish, and ECC combined to enhance security while still remaining time and space efficient so that it can work on relatively low powered IoT devices too.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rehman S, Talat Bajwa N, Shah MA, Aseeri AO, Anjum A (2021) Hybrid AES-ECC model for the security of data over cloud storage. Electronics 10:2673
Agrahari V (2020) Data security in cloud computing using cryptography algorithms. Int J Sci Dev Res
Sarmila KB, Manisekaran SV (2019) A study on security considerations in iot environment and data protection methodologies for communication in cloud computing. In: 2019 International Carnahan conference on security technology (ICCST), 2019, pp 1–6. https://doi.org/10.1109/CCST.2019.8888414
El_Deen AET (2013) Design and implementation of hybrid encryption algorithm. Int J Sci Eng Res 4(1)
Hemeida F, Alexan W, Sadek S (2019) Blowfish-Secured audio steganography. https://doi.org/10.1109/NILES.2019.8909206
Sharma S, Chopra V (2016) Analysis of AES encryption with ECC. In: International interdisciplinary conference on engineering science & management, India, Dec 2016, pp 195–201
Wadday A, Wadi S, Mohammed H, Abdullah A (2018) Study of WiMAX based communication channel effects on the ciphered image using MAES algorithm. Int J Appl Eng Res 13
Abd Eliminaam DS, Abdual Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. Int J Netw Secur 10(3):213–219
Iyer S, Sedamkar RR, Gupta S (2016) A novel idea on multimedia encryption using hybrid crypto approach. Procedia Comput Sci 79:293–298. https://doi.org/10.1016/j.procs.2016.03.038
Mahto D, Yadav D (2017) RSA and ECC: a comparative analysis. Int J Appl Eng Res 12:9053–9061
Miller VS (2000) Use of elliptic curves in cryptography. In: Advances in cryptology-CRYPTO’85 proceedings, vol 218. Springer, pp 417–426
Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Comput Sci 54:73–82
Nithiya C, Sridevi IIR (2016) ECC algorithm and security in cloud. Int J Adv Res Comput Sci Technol (IJARCST) 4(1):24
Abroshan H (2021) A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms. Int J Adv Comput Sc Appl 12(6)
Ghallab A, Mohammed S, Mohsen A (2021) Data integrity and security in distributed cloud computing—a review. https://doi.org/10.1007/978-981-15-7234-0_73
Kumar Y, Munjal R, Sharma H (2011) Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. Int J Comput Sci Manage Stud
Kumar S, Dhanamalar M, Ayshwarya B, Bora A, Jegatheesh G (2021) A novel algorithm to secure big data iot system. Des Eng (Toronto) 997–1011
Sharma S, Singla K, Rathee G, Saini H (2020) A hybrid cryptographic technique for file storage mechanism over cloud. https://doi.org/10.1007/978-981-15-0029-9_19
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mahajan, K., Kumar, S., Kumar, D. (2023). Hybrid Methods for Increasing Security of IoT and Cloud Data. In: Kumar Singh, K., Bajpai, M.K., Sheikh Akbari, A. (eds) Machine Vision and Augmented Intelligence. Lecture Notes in Electrical Engineering, vol 1007. Springer, Singapore. https://doi.org/10.1007/978-981-99-0189-0_45
Download citation
DOI: https://doi.org/10.1007/978-981-99-0189-0_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0188-3
Online ISBN: 978-981-99-0189-0
eBook Packages: Computer ScienceComputer Science (R0)