Skip to main content

Enhancement of Data Security for Cloud Computing with Cryptography Techniques

  • Conference paper
  • First Online:
Proceedings of International Conference on Network Security and Blockchain Technology (ICNSBT 2023)

Abstract

In cloud computing, users may access their crucial data that is kept on distant servers over the Internet. The amount of sensitive and important data is expanding quickly as technology develops every day. Data security is crucial in cloud computing because cloud computing involves storing and processing data on remote servers, often belonging to third-party providers. This means that data is transmitted and stored outside of the user’s immediate control, making it more vulnerable to security breaches and cyberattacks. A security breach of user data highlights the importance of user privacy. Every form of data has a varied level of protection requirements. In this paper, we have suggested a model that categorizes the data in accordance with its security characteristics. We have created a new hybrid approach to achieve this. We have built a hybrid algorithm using AES and DES. The performance of the hybrid system is compared to the current hybrid technology, showing that the recommended approach offers excellent security and confidentiality of user data. The shortcomings of both symmetric and asymmetric encryptions are solved by hybrid cryptography and steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shirole BS, Vishwamitra LK (2020) Review paper on data security in cloud computing environment. In: 2020 9th International conference system modeling and advancement in research trends (SMART), pp 79–84. https://doi.org/10.1109/SMART50582.2020.9337115

  2. Mudawi NA, Beloff N, White M (2020) Issues and challenges: cloud computing e-government in developing countries. Int J Adv Comput Sci Appl 11(4). https://doi.org/10.14569/IJACSA.2020.0110402

  3. Tan CB, Hijazi MHA, Lim Y, Gani A (2018) A survey on proof of retrievability for cloud data integrity and availability: cloud storage state of-the-art, issues, solutions and future trends. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.03.017

  4. Joshi M, Budhani S, Tewari N, Prakash S (2021) Analytical review of data security in cloud computing. In: 2nd International conference on intelligent engineering and management (ICIEM), pp 362–366. https://doi.org/10.1109/ICIEM51511.2021.9445355

  5. Van Der Ham J (2021) Toward a better understanding of cybersecurity. Digit Threat Res Pract 2(3), Article 18. https://doi.org/10.1145/3442445

  6. Roy I, Setty STV, Vitaly AK, Witchel SE (2010) Airavat: security and privacy for MapReduce. In: Conference: proceedings of the 7th USENIX symposium on networked systems design and implementation, NSDI (2010), 28–30 Apr 2010, San Jose, CA, USA

    Google Scholar 

  7. Thabit F, Al-ahdal A, Alhomdy S, Jagtap S (2020) Exploration of security challenges in cloud computing: issues, threats, and attacks with their alleviating techniques. J Inf Comput Sci 10:35–59

    Google Scholar 

  8. Verma V, Tiwari AK (2020) Analytic study of data security in cloud computing using cryptography. Int J Technol 10(1):88–92. https://doi.org/10.5958/2231-3915.2020.00017.6

  9. Deerthana K, Devi Saranya B, Jayamala R (2016) Enhancing security using cryptography and steganography and providing data backup and recovery in cloud. Int J Eng Res Technol (IJERT) NCICCT 4(19)

    Google Scholar 

  10. Mohammed SJ, Basheer D (2021) From cloud computing security towards homomorphic encryption: a comprehensive review. TELKOMNIKA Telecommun Comput Electron Control 19(4):1152–1161. https://doi.org/10.12928/TELKOMNIKA.v19i4.16875

  11. Albugmi A, Alassafi MO, Walters RJ, Wills G (2016) Data security in cloud computing. In: Conference: 2016 fifth international conference on future generation communication technologies (FGCT), vol 1. IEEE, At, Luton, UK. https://doi.org/10.1109/FGCT.2016.7605062

  12. Agrahari V (2020) Data security in cloud computing using cryptography algorithms. Int J Sci Dev Res (IJSDR) 5(9). www.ijsdr.org

  13. Meinardi M, Clayton T (2020) How to manage and optimize costs of public cloud IaaS and PaaS, p 70

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Snehal Bhosale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Giri, G. et al. (2024). Enhancement of Data Security for Cloud Computing with Cryptography Techniques. In: Mandal, J.K., Jana, B., Lu, TC., De, D. (eds) Proceedings of International Conference on Network Security and Blockchain Technology. ICNSBT 2023. Lecture Notes in Networks and Systems, vol 738. Springer, Singapore. https://doi.org/10.1007/978-981-99-4433-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-4433-0_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-4432-3

  • Online ISBN: 978-981-99-4433-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics