Abstract
Cloud computing is one of the most research hot topics in IT industry nowadays. A lot of startup organizations are adopting cloud eagerly due to massive cloud facilities available with minimal investment; but as every coin has two sides, so with cloud. In the cloud, the user data is stored at some off-site location. So cloud data security is one of the main concerns of any organizations, before shifting to the cloud. The data owners can ensure the data security at its premises using firewalls, VPN (Virtual Private Network) like most used security options. But as data owner stores their sensitive data to remote servers and users access required data from these remote cloud servers, which is not under their control. So storing data outside client premises, raises the issue of data security. Thus, one of the primary research areas in cloud computing is cloud data protection. In this research paper, strategies followed include categorization of the data on the basis of their sensitivity and importance, followed by the various cryptography techniques such as the AES (a Symmetric Cryptography technique), SHA-1 (a Hashing technique), and ECC (Elliptic curve Cryptography (an Asymmetric Cryptography technique). Till date, most of the authors were using a single key for both encryption and decryption which is a weak target of various identified malicious attacks. Hence, in the designed hybrid algorithm, two separate keys are used for each encryption and decryption. The cloud user who wants to access cloud data, need to first register with CSP and cloud owner. After registration, user login id, password and OTP (One Time Password) sent to the user registered mobile number, are required to access the encrypted cloud data.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cloud Security Alliance “Top Threats to Cloud Computing” published in USA: Cloud Security Alliance, (2010)
Maghrabi, L.A.: The threats of data security over the cloud as perceived by experts and university students. University of the West of England, Bristol, United Kingdom (2013)
Singh, A., Shrivastava, M.: Overview of attacks on cloud computing. Int. J. Eng. Innovative Technol. 1(4), 321–323 (2012)
Yu, H.S., Gelogo, Y.E., Kim, K.J.: Securing data storage in cloud computing. J. Secur. Eng. 251–260 (2012)
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. In: IEEE Transactions on Information Forensics and Security, Vol. 2, no. 4 (2007)
Li, X., Yu, L., Wei, L.: The application of hybrid encryption algorithm in software security. 978-1-4799-2860-6, IEEE, (2013)
Tweney, A., Crane, S.: Trust guide: An exploration of privacy preferences in an online world. In: Expanding the Knowledge Economy Applications Case Studies. IOS Press, Amsterdam (2007)
Tang, Z., Wang, X., Jia, L., Zhang, X., Man, W.: Study on data security of cloud computing. IEEE Xplore: 978-1-4577-1964-6 © 2012 IEEE, pp. 1–3 (2012)
Rong, C., Nguyen, S.T., JaatUN, M.G.: Beyond lightning: A Survey on security challenges in cloud computing. In: Elsevier Computers and Electrical Engineering. pp. 47–54 (2012)
Grobauer, B., Walloschek, T., Stöcker Siemens, E.: Understanding cloud computing vulnerabilities. IEEE J. Comput. Reliab. Socities 9(2), 50–57 (2011)
Waleed, Al.W., Li, C., Naji, H.A.H.: The faults of data security and privacy in the cloud computing. J. Netw. 9(12), pp. 3313–3320 (2014)
Lin, G.: Research on electronic Data security strategy based on cloud computing. In: IEEE Xplore: 978-1-4577-1415-3 ©2012 IEEE, pp 1228–1231 (2012)
Divya, S.V., Dr.Shaji R.S.: Security in data forwarding through elliptic curve cryptography in cloud. In: 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 978-1-4799-4190-2 ©2014 IEEE, pp. 1083–1088 (2014)
Kumar, A., Lee, B.G., Lee, H.J., Kumari, A.: Secure storage and access of data in cloud computing. ICTC 2012, IEEE Xplore: 978-1-4673-4828-7 ©2012 IEEE, pp. 336–339 (2012)
Fu, Z., Cao, X., Wang, J., Sun, X.: Secure storage of data in cloud computing. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE Xplore: 978-1-4799-5390-5 © 2014 IEEE, pp. 783–786 (2014)
Tan, Y., Wang, X.: Research of cloud computing data security technology. In: IEEE Xplore: 978-1-4577-1415-3 © 2012 IEEE, pp. 2781–2783 (2012)
Sinha, R., Srivastava, H.K., Gupta, S.: Performance based comparison study of rsa and elliptic curve cryptography. Int. J. Sci. Eng. Res. ISSN 2229–5518, 4(5), 720–725 (2013)
Abdul, D.S.H., Abdul Kader, M., Hadhoud, M.M.: Performance evaluation of symmetric encryption algorithms. J. Commun. IBIMA, ISSN: 1943–7765, 8, 58–64 (2009)
Pavithra, S., Ramadevi, E.: Performance evaluation of symmetric algorithms. J. Global Res. Comput. Sci. ISSN 2229-371X, 3(8), 43–45 (2012)
Mahalle, V.S., Shahade, A.K.: Enhancing the data security in cloud by implementing hybrid (RSA & AES) Encryption Algorithm. IEEE 978-1-4799-7169-5 ©. (2014)
Tripathi, A., Yadav, P.: Enhancing security of cloud computing using elliptic curve cryptography. Int. J. Comput. Appl. ISSN: 0975–8887, 57(1), pp. 26–30 (2012)
Mohamed, E.M., Abdelkader, H.S., EI-Etriby, S.: Enhanced data security model for cloud computing. In: 8th International Conference on informatics and Systems (INFOS2012), pp. 12–17 (2012)
Dinadayalan1, P., Jegadeeswari, S., Gnanambigai, D.: Data security issues in cloud environment and solutions. In: 2014 World Congress on Computing and Communication Technologies, IEEE Xplore: 978-1-4799-2876-7 © 2013 IEEE, pp. 88–91 (2013)
Daemen, J., and Rijmen, V.: Rijndael: the advanced encryption standard. Dr. Dobb’s J. 137–139. (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Goyal, V., Kant, C. (2018). An Effective Hybrid Encryption Algorithm for Ensuring Cloud Data Security. In: Aggarwal, V., Bhatnagar, V., Mishra, D. (eds) Big Data Analytics. Advances in Intelligent Systems and Computing, vol 654. Springer, Singapore. https://doi.org/10.1007/978-981-10-6620-7_20
Download citation
DOI: https://doi.org/10.1007/978-981-10-6620-7_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6619-1
Online ISBN: 978-981-10-6620-7
eBook Packages: EngineeringEngineering (R0)