Abstract
Cloud computing security involves the procedures, technologies, and policies that protect data, applications, and resources in cloud computing environments. As communities increasingly rely on cloud services for computing requirements, protecting their data's security and privacy becomes critical to retain confidence and safeguard against possible attacks. Consequently, many researchers are interested in the security and privacy of computerised data. The present study aims to devise a protocol for data safety during its storage and dissemination. We developed a hybrid algorithm for data protection during the process. The highlights of the as-proposed approach include (1) Secured information input in the cloud; (2) Protected response to the information within such a manner that the data integrity is maintained. (3) Correct use and distribution of the public, private, and secret keys used in the encryption/decryption procedures. These keys consist of a public key, which may be used to encrypt data, a private key, which can be used for decrypting data, and a secret key, which can be used for authenticating users. The proposed solution can potentially speed up data transmission between the user and the cloud storage while preventing the unsolicited user from breaching the system.
Similar content being viewed by others
References
Rittinghouse JW, Ransome JF (2010) Cloud computing implementation, management, and security. Taylor & Francis Group. http://www.crcpress.com
El Kafhali S, El Mir I, Hanini M (2022) Security threats, defense mechanisms, challenges, and future directions in cloud computing. Arch Comput Methods Eng 29:223–246
Ping H (2022) Network information security data protection based on data encryption technology. Wirel Pers Commun. https://doi.org/10.1007/s11277-022-09838-0
Tajammul M, Parveen R (2020) Auto encryption algorithm for uploading data on cloud storage. Int J Inf Technol (Singapore) 12(3):831–837. https://doi.org/10.1007/s41870-020-00441-9
Mell P, Grance T (2011) The NIST defination of cloud computing. Acta Hortic 728:269–274
Imam R, Anwer F, Nadeem M (2022) An effective and enhanced RSA based public key encryption scheme (XRSA). Int J Inf Technol 14(5):2645–2656. https://doi.org/10.1007/S41870-022-00993-Y/METRICS
Astuti NRDP, Aribowo E, Saputra E (2020) Data security improvements on cloud computing using cryptography and steganography. In: IOP conference series: materials science and engineering, vol 821(1). https://doi.org/10.1088/1757-899X/821/1/012041
Basu S et al (2018) Cloud computing security challenges & solutions—a survey. In: 2018 IEEE 8th annual computing and communication workshop and conference (CCWC). https://doi.org/10.1109/CCWC.2018.8301700
Jintcharadze E, Iavich M (2020) Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems. In: 2020 IEEE East-West Design Test Symposium EWDTS 2020—Proceedings, pp 0–4. https://doi.org/10.1109/EWDTS50664.2020.9224901
Tariq H, Agarwal P (2020) Secure keyword search using dual encryption in cloud computing. Int J Inf Technol (Singapore) 12(4):1063–1072. https://doi.org/10.1007/s41870-018-0091-6
Raymond Choo K-K, Esposito C, Pop F (2017) Challenges of connecting edge and cloud computing: a security and forensic perspective. IEEE Cloud Comput 4(2):13–17
Kumar PR, Raj PH, Jelciana P (2018) Exploring data security issues and solutions in cloud computing. Proc Comput Sci 125(2009):691–697. https://doi.org/10.1016/j.procs.2017.12.089
Lee B, Dewi EK, Wajdi MF (2018) Data security in cloud computing using AES under HEROKU cloud, pp 4–8
Shamsuddin NSM, Pitchay SA, Pitchay SA (2020) Implementing location-based cryptography on mobile application design to secure data in cloud storage. J Phys Conf Ser 1551(1):1–13. https://doi.org/10.1088/1742-6596/1551/1/012008
Zou L, Ni M, Huang Y, Shi W, Li X (2020) Hybrid encryption algorithm based on AES and RSA in file encryption. In: Frontier computing, pp 541–551
Anjana A, Singh A (2019) Security concerns and countermeasures in cloud computing: a qualitative analysis. Int J Inf Technol 11(4):683–690. https://doi.org/10.1007/S41870-018-0108-1/METRICS
Bhat R, Sunitha NR, Iyengar SS (2023) A probabilistic public key encryption switching scheme for secure cloud storage. Int J Inf Technol (Singapore) 15(2):675–690. https://doi.org/10.1007/s41870-022-01084-8
Gupta M, Sinha A (2021) Enhanced-AES encryption mechanism with S-box splitting for wireless sensor networks. Int J Inf Technol (Singapore) 13(3):933–941. https://doi.org/10.1007/s41870-021-00626-w
Zou L, Ni M, Huang Y, Shi W, Li X (2020) Hybrid encryption algorithm based on AES and RSA in file encryption. In: International conference on frontier computing, vol 551, pp 541–551. https://doi.org/10.1007/978-981-15-3250-4_68
Thabit F, Can O, Alhomdy S, Al-Gaphari GH, Jagtap S (2022) A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing. Int J Intell Networks 3(April):16–30. https://doi.org/10.1016/j.ijin.2022.04.001
Malgari V, Dugyala R, Kumar A (2019) A novel data security framework in distributed cloud computing. In: 2019 fifth international conference on image information processing (ICIIP), pp 373–378. https://doi.org/10.1109/ICIIP47207.2019.8985941
Rubio D (2017) Beginning Django. Apress
Hamza A, Kumar B (2020) A review paper on DES, AES, RSA Encryption Standards. In: Proceedings of the 2020 9th international conference on system modeling & advancement in research trends, SMART 2020, pp 333–338. https://doi.org/10.1109/SMART50582.2020.9336800
Bozic J, Marsso L, Mateescu R, Wotawa F (2018) A formal TLS handshake model in LNT. Electron Proc Theor Comput Sci EPTCS 268:1–40. https://doi.org/10.4204/EPTCS.268.1
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare. All co-authors have seen and agree with the contents of the manuscript and there is no financial interest to report. We certify that the submission is original work and is not under review at any other publication.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zubair, S., Ahmed, H.M.A. A hybrid algorithm-based optimization protocol to ensure data security in the cloud. Int. j. inf. tecnol. (2023). https://doi.org/10.1007/s41870-023-01546-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41870-023-01546-7