Skip to main content

Hybrid Cryptography for Cloud Security: Methodologies and Designs

  • Conference paper
  • First Online:
Digital Transformation Technology

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 224))

Abstract

Cloud computing is a trending information technology applied for storing and accessing information over the Internet. Probably, sensitive information is stored on remote servers that are not managed nor controlled by the customers. Therefore, potential attacks may be launched against stored information from either inside the cloud service provider or outsider attackers. Cryptography is the fundamental mechanism that provides enough level of security to the cloud. Hybrid cryptography endeavors to enhance security and performance by integrating more than one cryptographic algorithm. In our study, we conducted a survey on applied hybrid cryptographic models for data security in the cloud between 2013 and 2020. We have presented the design, the implementation methodology, limitations found, and the suggested applications for each proposal. We finalized this paper with a comparison summary table. We hope to make a scientific contribution to secure the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Badger ML, Grance T, Patt-Corner R, Voas JM (2012) Cloud computing synopsis and recommendations. National Institute of Standards & Technology

    Google Scholar 

  2. Kyriazis D, Voulodimos A, Gogouvitis SV, Varvarigou TA (2013) Data intensive storage services for cloud environments. Business Science Reference

    Google Scholar 

  3. Singh V, Pandey SK (2020) Cloud computing: vulnerability and threat indications. In: Performance management of integrated systems and its applications in software engineering. Springer, Singapore, pp 11–20

    Google Scholar 

  4. Sinchana MK, Savithramma RM (2020) Survey on cloud computing security. In: Innovations in computer science and engineering. Springer, Singapore, pp 1–6

    Google Scholar 

  5. Forouzan BA (2007) Cryptography and network security. McGraw-Hill, Inc.

    Google Scholar 

  6. Schneier B (2007) Applied cryptography: protocols, algorithms, and source code. C. John Wiley & Sons

    Google Scholar 

  7. Sengupta N, Holmes J (2013) Designing of cryptography based security system for cloud computing. In: 2013 international conference on cloud & ubiquitous computing & emerging technologies. IEEE, pp 52–57

    Google Scholar 

  8. Mahalle VS, Shahade AK (2014) Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm. In: 2014 International Conference on Power, Automation and Communication (INPAC). IEEE, pp 146–149

    Google Scholar 

  9. Olumide A, Alsadoon A, Prasad PWC, Pham L (2015) A hybrid encryption model for secure cloud computing. In: 2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015). IEEE, pp 24–32

    Google Scholar 

  10. Maitri PV, Verma A (2016) Secure file storage in cloud computing using hybrid cryptography algorithm. In: 2016 international conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 1635–1638

    Google Scholar 

  11. Chauhan A, Gupta J (2017) A novel technique of cloud security based on hybrid encryption by Blowfish and MD5. In: 2017 4th International conference on signal processing, computing and control (ISPCC). IEEE, pp 349–355

    Google Scholar 

  12. Sharma T (2018) Proposed hybrid RSA algorithm for cloud computing. In: 2018 2nd international conference on inventive systems and control (ICISC), pp 60–64. IEEE

    Google Scholar 

  13. Salma RF, Khaizuran Abdullah R, Darwis H (2018) Enhancing cloud data security using hybrid of advanced encryption standard and blowfish encryption algorithms. In: 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, pp 18–23

    Google Scholar 

  14. Murad SH, Gody AM, Barakat TM (2019) Enhanced security of symmetric encryption using combination of steganography with visual cryptography. arXiv preprint arXiv: 1902.11167

    Google Scholar 

  15. Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, pp 1–12

    Google Scholar 

  16. Kaushik S, Patel A (2019) Secure cloud data using hybrid cryptographic scheme. In: 2019 4th international conference on internet of things: smart innovation and usages (IoT-SIU), pp 1–6. IEEE

    Google Scholar 

  17. Cai H, Liu X, Cangelosi A (2019) Security of cloud intelligent robot based on RSA algorithm and digital signature. In: 2019 IEEE symposium series on computational intelligence (SSCI). IEEE, pp 1453–1456

    Google Scholar 

  18. Kumar A, Jain V, Yadav A (2020) A new approach for security in cloud data storage for IOT applications using hybrid cryptography technique. In: 2020 international conference on power electronics & IoT applications in renewable energy and its control (PARC), pp 514–517. IEEE

    Google Scholar 

  19. Sharma S, Singla K, Rathee G, Saini H (2020) A hybrid cryptographic technique for file storage mechanism over cloud. In: First international conference on sustainable technologies for computational intelligence, pp 241–256. Springer, Singapore

    Google Scholar 

  20. Poduval V, Koul A, Rebello D, Bhat K, Wahul RM (2020) Cloud based secure storage of files using hybrid cryptography and image steganography. (IJRTE) Int J Recent Technol Eng 8(6)

    Google Scholar 

  21. Nigoti R, Jhuria M, Singh S (2013) A survey of cryptographic algorithms for cloud computing

    Google Scholar 

  22. Sajjan RS, Ghorpade V, Dalimbkar V (2016) A survey paper on data security in cloud computing. Int J Comput Sci Eng (IJCSE) 4(4):9–13

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sherief H. Murad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Murad, S.H., Rahouma, K.H. (2022). Hybrid Cryptography for Cloud Security: Methodologies and Designs. In: Magdi, D.A., Helmy, Y.K., Mamdouh, M., Joshi, A. (eds) Digital Transformation Technology. Lecture Notes in Networks and Systems, vol 224. Springer, Singapore. https://doi.org/10.1007/978-981-16-2275-5_7

Download citation

Publish with us

Policies and ethics