Skip to main content
Log in

Enhancing the security of cloud data using hybrid encryption algorithm

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Cloud computing is a term which is employed to explain different concepts of computing that includes several PCs linked through a real time network of communication such as internet. Cloud computing is a developing paradigm which has in the recent times attracted lot of researchers because of its capability to decrease the costs related with computing. Due to the rapid growth of cloud computing techniques the rapid raise of services of cloud became outstanding. In today’s world data security is a challenging problem. The essential issue related with cloud computing is the security of cloud and the proper cloud implementation over the network. In cloud the models of security namely confidentiality, authentication, accessibility, data recovery and data integrity. It includes services of cloud, model of deployment, security problems and barriers in cloud computing. Nowadays, enhancing security of data in cloud has become a major concern and the solution for this is to apply appropriate encryption techniques while storing the data in the cloud. This study proposes a hybrid algorithm to enhance security of cloud data using encryption algorithm. The main purpose of using encryption algorithms is to secure or store huge amount of information in cloud. This study combines homographic encryption and blowfish encryption to enhance cloud security. It can be concluded that if the security issues are resolved then the future will be the solutions for cloud storage for small as well as large firms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Abbas SA, Mohammed MQ (2017) Enhancing security of cloud computing by using RC6 encryption algorithm. Int J Appl Inf Syst 12(8):27–32

    Google Scholar 

  • Ahmad I, Khandekar A (2014) Homomorphic encryption method applied to cloud computing. Int J Inf Comput Technol 4(15):1519–1530

    Google Scholar 

  • Arockiam L, Monikandan S (2014) Data security and privacy in cloud storage using hybrid symmetric encryption algorithm. Int J Adv Res Comput Commun Eng 2(8):3064–3069

    Google Scholar 

  • Bangar A, Shinde S (2014) Study and comparison of cryptographic methods for cloud security. Int J Comput Sci Eng Inf Technol Res 4(2):205–213

    Google Scholar 

  • Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H (2016) Security algorithms for cloud computing. Procedia Comput Sci 85:535–542

    Article  Google Scholar 

  • Dharini A, Saranya Devi RM, Chandrasekar I (2014) Data security for cloud computing using RSA with magic square algorithm. Int J Innov Sci Res 11(2):439–444

    Google Scholar 

  • Gowthami Saranya R, Kousalya A (2017) A comparative analysis of security algorithms using cryptographic techniques in cloud computing. Int J Comput Sci Inf Technol 8(2):306–310

    Google Scholar 

  • Gunasekaran S, Lavanya MP (2015) A review on enhancing data security in cloud computing using RSA and AES algorithms. Int J Adv Eng Res 9(4):1–7

    Google Scholar 

  • Handa K, Singh U (2015) Data security in cloud computing using encryption and steganography. Int J Comput Sci Mob Comput 4(5):786–791

    Google Scholar 

  • Kartit Z, Azougaghe A, Idrissi HK, El Marraki M, Hedabou M, Belkasmi M, Kartit A (2015) Applying encryption algorithm for data security in cloud storage. In: Sabir E, Medromi H, Sadik M (eds) Advances in ubiquitous networking. Springer, Singapore, pp 141–154

    Google Scholar 

  • Katende N, Wilson C, Kibe AM (2017) Enhancing trust in cloud computing using MD5 hashing algorithm and RSA encryption standard. Int J Sci Eng Res 8(3):550–564

    Google Scholar 

  • Kaur R, Kinger S (2014) Analysis of security algorithms in cloud computing. Int J Appl Innov Eng Manag 3(3):171–176

    Google Scholar 

  • Khorsheed NK, Khorsheed OK, Rashad MZ, Hamza TT (2015) Proposed encryption technique for cloud applications. Int J Sci Eng Res 6(9):693–698

    Google Scholar 

  • Lenka SR, Nayak B (2014) Enhancing data security in cloud computing using RSA encryption and MD5 algorithm. Int J Comput Sci Trends Technol 2(3):60–64

    Google Scholar 

  • Masthanamma V, Lakshmi Preya G (2015) An efficient data security in cloud computing using the RSA encryption process algorithm. Int J Innov Res Sci Eng Technol 4(3):1441–1445

    Google Scholar 

  • Mushtaque MDA, Dhiman H, Hussain S, Maheshwari S (2014) Evaluation of DES, TDES, AES, bowfish and twofish encryption algorithm: based on space complexity. Int J Eng Res Technol (IJERT) 3(4):1922–1933

    Google Scholar 

  • Nasarul Islam KV, Mohamed Riyas KV (2017) Analysis of various encryption algorithms in cloud computing. Int J Comput Sci Mob Comput 6(7):90–97

    Google Scholar 

  • Neha MK (2016) Enhanced security using hybrid encryption algorithm. Int J Innov Res Comput Commun Eng 4(7):13001–13007

    Article  Google Scholar 

  • Pallikonda S, Yeshwanth Reddy S (2017) Securing cloud data using encryption algorithms. Int J Adv Res Sci Eng 6(11):1188–1193

    Google Scholar 

  • Rahman MO, Hossen MK, Morsad G, Roy AC, Chowdhury SA (2018) An approach for enhancing security of cloud data using cryptography and steganography with E-LSB encoding technique. Int J Comput Sci Netw Secur 18(9):85–92

    Google Scholar 

  • Ramaporkalai T (2017) Security algorithms in cloud computing. Int J Comput Sci Trends Technol 5(2):500–502

    Google Scholar 

  • Salem MZ, Sabbeh SF, EL-Shishtawy T (2017) An efficient privacy preserving public auditing mechanism for secure cloud storage. Int J Appl Eng Res 12(6):1093–1101

    Google Scholar 

  • Sangeetha SKB, Vanithadevi V, Rathika SKB (2018) Enhancing cloud security through efficient fragment based encryption. Int J Pure Appl Math 118(18):2425–2436

    Google Scholar 

  • Saranya V, Kavitha K (2017) A modified blowfish algorithm for improving the cloud security. Elsiyum J 4(3):1–6

    Google Scholar 

  • Shereek BM, Muda Z, Yasin S (2014) Improve cloud computing security using RSA algorithm with Fermat’s little theorem. IOSR J Eng 4(2):1–8

    Article  Google Scholar 

  • Shinde MR, Taur RD (2015) Encryption algorithm for data security and privacy in cloud storage. Am J Comput Sci Eng Surv 3(1):34–39

    Google Scholar 

  • Sidhu A, Mahajan R (2014) Enhancing security in cloud computing structure by hybrid encryption. Int J Recent Sci Res 5(1):128–132

    Google Scholar 

  • Stephen O (2014) The study of the application of data encryption techniques in cloud storage to ensure stored data integrity and availability. Int J Sci Res Publ 4(10):1–7

    Google Scholar 

  • Tannu, Karambir (2017) Enhancing data security in cloud using encryption techniques. Indian J Comput Sci Eng 8(3):280–283

    Google Scholar 

  • Tebaa M, Hajji SE (2014) Secure cloud computing through homomorphic encryption. arXiv preprint arXiv:1409.0829

  • Thimma Reddy B, Bala Chowdappa K, Raghunath Reddy S (2016) Cloud security using blowfish and key management encryption algorithm. Int J Eng Appl Sci (IJEAS) 2(6):59–62

    Google Scholar 

  • Yugandhara K, Ashwini J, Pooja P, Suchita P, Pawar JS (2016) Secure data storage and forwarding in cloud using AES and HMAC. Int Res J Eng Technol 03(02):75–79

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. R. Sajay.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sajay, K.R., Babu, S.S. & Vijayalakshmi, Y. Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01403-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-019-01403-1

Keywords

Navigation