Skip to main content
Log in

A hybrid algorithm-based optimization protocol to ensure data security in the cloud

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Cloud computing security involves the procedures, technologies, and policies that protect data, applications, and resources in cloud computing environments. As communities increasingly rely on cloud services for computing requirements, protecting their data's security and privacy becomes critical to retain confidence and safeguard against possible attacks. Consequently, many researchers are interested in the security and privacy of computerised data. The present study aims to devise a protocol for data safety during its storage and dissemination. We developed a hybrid algorithm for data protection during the process. The highlights of the as-proposed approach include (1) Secured information input in the cloud; (2) Protected response to the information within such a manner that the data integrity is maintained. (3) Correct use and distribution of the public, private, and secret keys used in the encryption/decryption procedures. These keys consist of a public key, which may be used to encrypt data, a private key, which can be used for decrypting data, and a secret key, which can be used for authenticating users. The proposed solution can potentially speed up data transmission between the user and the cloud storage while preventing the unsolicited user from breaching the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Rittinghouse JW, Ransome JF (2010) Cloud computing implementation, management, and security. Taylor & Francis Group. http://www.crcpress.com

  2. El Kafhali S, El Mir I, Hanini M (2022) Security threats, defense mechanisms, challenges, and future directions in cloud computing. Arch Comput Methods Eng 29:223–246

    Article  Google Scholar 

  3. Ping H (2022) Network information security data protection based on data encryption technology. Wirel Pers Commun. https://doi.org/10.1007/s11277-022-09838-0

    Article  Google Scholar 

  4. Tajammul M, Parveen R (2020) Auto encryption algorithm for uploading data on cloud storage. Int J Inf Technol (Singapore) 12(3):831–837. https://doi.org/10.1007/s41870-020-00441-9

    Article  Google Scholar 

  5. Mell P, Grance T (2011) The NIST defination of cloud computing. Acta Hortic 728:269–274

    Google Scholar 

  6. Imam R, Anwer F, Nadeem M (2022) An effective and enhanced RSA based public key encryption scheme (XRSA). Int J Inf Technol 14(5):2645–2656. https://doi.org/10.1007/S41870-022-00993-Y/METRICS

    Article  Google Scholar 

  7. Astuti NRDP, Aribowo E, Saputra E (2020) Data security improvements on cloud computing using cryptography and steganography. In: IOP conference series: materials science and engineering, vol 821(1). https://doi.org/10.1088/1757-899X/821/1/012041

  8. Basu S et al (2018) Cloud computing security challenges & solutions—a survey. In: 2018 IEEE 8th annual computing and communication workshop and conference (CCWC). https://doi.org/10.1109/CCWC.2018.8301700

  9. Jintcharadze E, Iavich M (2020) Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems. In: 2020 IEEE East-West Design Test Symposium EWDTS 2020—Proceedings, pp 0–4. https://doi.org/10.1109/EWDTS50664.2020.9224901

  10. Tariq H, Agarwal P (2020) Secure keyword search using dual encryption in cloud computing. Int J Inf Technol (Singapore) 12(4):1063–1072. https://doi.org/10.1007/s41870-018-0091-6

    Article  Google Scholar 

  11. Raymond Choo K-K, Esposito C, Pop F (2017) Challenges of connecting edge and cloud computing: a security and forensic perspective. IEEE Cloud Comput 4(2):13–17

    Article  Google Scholar 

  12. Kumar PR, Raj PH, Jelciana P (2018) Exploring data security issues and solutions in cloud computing. Proc Comput Sci 125(2009):691–697. https://doi.org/10.1016/j.procs.2017.12.089

    Article  Google Scholar 

  13. Lee B, Dewi EK, Wajdi MF (2018) Data security in cloud computing using AES under HEROKU cloud, pp 4–8

  14. Shamsuddin NSM, Pitchay SA, Pitchay SA (2020) Implementing location-based cryptography on mobile application design to secure data in cloud storage. J Phys Conf Ser 1551(1):1–13. https://doi.org/10.1088/1742-6596/1551/1/012008

    Article  Google Scholar 

  15. Zou L, Ni M, Huang Y, Shi W, Li X (2020) Hybrid encryption algorithm based on AES and RSA in file encryption. In: Frontier computing, pp 541–551

  16. Anjana A, Singh A (2019) Security concerns and countermeasures in cloud computing: a qualitative analysis. Int J Inf Technol 11(4):683–690. https://doi.org/10.1007/S41870-018-0108-1/METRICS

    Article  Google Scholar 

  17. Bhat R, Sunitha NR, Iyengar SS (2023) A probabilistic public key encryption switching scheme for secure cloud storage. Int J Inf Technol (Singapore) 15(2):675–690. https://doi.org/10.1007/s41870-022-01084-8

    Article  Google Scholar 

  18. Gupta M, Sinha A (2021) Enhanced-AES encryption mechanism with S-box splitting for wireless sensor networks. Int J Inf Technol (Singapore) 13(3):933–941. https://doi.org/10.1007/s41870-021-00626-w

    Article  Google Scholar 

  19. Zou L, Ni M, Huang Y, Shi W, Li X (2020) Hybrid encryption algorithm based on AES and RSA in file encryption. In: International conference on frontier computing, vol 551, pp 541–551. https://doi.org/10.1007/978-981-15-3250-4_68

  20. Thabit F, Can O, Alhomdy S, Al-Gaphari GH, Jagtap S (2022) A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing. Int J Intell Networks 3(April):16–30. https://doi.org/10.1016/j.ijin.2022.04.001

    Article  Google Scholar 

  21. Malgari V, Dugyala R, Kumar A (2019) A novel data security framework in distributed cloud computing. In: 2019 fifth international conference on image information processing (ICIIP), pp 373–378. https://doi.org/10.1109/ICIIP47207.2019.8985941

  22. Rubio D (2017) Beginning Django. Apress

    Book  Google Scholar 

  23. Hamza A, Kumar B (2020) A review paper on DES, AES, RSA Encryption Standards. In: Proceedings of the 2020 9th international conference on system modeling & advancement in research trends, SMART 2020, pp 333–338. https://doi.org/10.1109/SMART50582.2020.9336800

  24. Bozic J, Marsso L, Mateescu R, Wotawa F (2018) A formal TLS handshake model in LNT. Electron Proc Theor Comput Sci EPTCS 268:1–40. https://doi.org/10.4204/EPTCS.268.1

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swaleha Zubair.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare. All co-authors have seen and agree with the contents of the manuscript and there is no financial interest to report. We certify that the submission is original work and is not under review at any other publication.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zubair, S., Ahmed, H.M.A. A hybrid algorithm-based optimization protocol to ensure data security in the cloud. Int. j. inf. tecnol. (2023). https://doi.org/10.1007/s41870-023-01546-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-023-01546-7

Keywords

Navigation