CFP last date
20 May 2024
Reseach Article

Evaluation of Hybrid Encryption Technique to Secure Data during Transmission in Cloud Computing

by Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 166 - Number 4
Year of Publication: 2017
Authors: Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal
10.5120/ijca2017914005

Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal . Evaluation of Hybrid Encryption Technique to Secure Data during Transmission in Cloud Computing. International Journal of Computer Applications. 166, 4 ( May 2017), 25-28. DOI=10.5120/ijca2017914005

@article{ 10.5120/ijca2017914005,
author = { Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal },
title = { Evaluation of Hybrid Encryption Technique to Secure Data during Transmission in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 166 },
number = { 4 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume166/number4/27658-2017914005/ },
doi = { 10.5120/ijca2017914005 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:12:48.371351+05:30
%A Mohammad Ubaidullah Bokhari
%A Qahtan Makki Shallal
%T Evaluation of Hybrid Encryption Technique to Secure Data during Transmission in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 166
%N 4
%P 25-28
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The technology of Cloud computing is permit the subscribers to store their own data in its infrastructure. The subscribers will be able to use their stored data whenever they required. Since the data are stored outside their boundary, it needs to use a strong encryption during transmission process to be protected well. Thus, in this paper we have proposed a model to use a hybrid encryption and decryption process based on AES-128 and RSA algorithm. Furthermore, we used HMAC algorithm to ensure the integrity and authenticity of data. Our experiment work has been done to explain the time required, throughput and memory utilization for encryption and decryption based on different size of files.

References
  1. Hashem, Ibrahim Abaker Targio, et al. "The rise of “big data” on cloud computing: Review and open research issues." Information Systems 47 (2015): 98-115.
  2. Alneyadi, Sultan, Elankayer Sithirasenan, and Vallipuram Muthukkumarasamy. "A Survey on Data Leakage Prevention Systems."Journal of Network and Computer Applications (2016).
  3. Wang, Cong, et al. "Privacy-preserving public auditing for secure cloud storage." Computers, IEEE Transactions on 62.2 (2013): 362-375.
  4. Mulazzani, Martin. New challenges in digital forensics: online storage and anonymous communication. Diss. Vienna University of Technology, 2014.
  5. Ahmed, Usama, et al. "Modelling cyber security for software-defined networks those grow strong when exposed to threats." Journal of Reliable Intelligent Environments 1.2-4 (2015): 123-146.
  6. Liu, Bin, and Bevan M. Baas. "Parallel AES encryption engines for many-core processor arrays." Computers, IEEE Transactions on 62.3 (2013): 536-547.
  7. Goshwe, Nentawe Y. "Data encryption and decryption using RSA Algorithm in a Network Environment." International Journal of Computer Science and Network Security (IJCSNS) 13.7 (2013): 9.
  8. Arasu, S. Ezhil, B. Gowri, and S. Ananthi. "Privacy-preserving public auditing in cloud using HMAC algorithm." International Journal of Recent Technology and Engineering (IJRTE) ISSN (2013): 2277-3878.
  9. Mu, Shuai, et al. "Cloud Storage over Multiple Data Centers." Handbook on Data Centers. Springer New York, 2015. 691-725.
  10. Basu, Sanjay. Modified Playfair Cipher with Rectangular Matrix. Diss. JADAVPUR UNIVERSITY, 2012.
  11. Schreck, Jörg. Security and privacy in user modeling. Vol. 2. Springer Science & Business Media, 2013.
  12. Singh, Gurpreet. "A study of encryption algorithms (RSA, DES, 3DES and AES) for information security." International Journal of Computer Applications 67.19 (2013).
  13. Kapur, Raj Kamal, and Sunil Kumar Khatri. "Secure data transfer in MANET using symmetric and asymmetric cryptography." Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on. IEEE, 2015.
  14. Dubrawsky, Ido. How to cheat at securing your network. Syngress, 2011.
  15. Rege, Komal, et al. "Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA." International Journal of Computer Applications 71.22 (2013).
  16. Chandra, Sourabh, et al. "A comparative survey of symmetric and asymmetric key cryptography." Electronics, Communication and Computational Engineering (ICECCE), 2014 International Conference on. IEEE, 2014.
  17. Crocker, Paul, and Pedro Querido. "Two Factor Encryption in Cloud Storage Providers Using Hardware Tokens." 2015 IEEE Globecom Workshops (GC Wkshps). IEEE, 2015.
  18. C. Xue-zhou, “Network Data Encryption Strategy for Cloud Computing,” 2015.
  19. Rajput, Somesh Kumar, and Anuradha Konidena. "PERFORMANCE ENHANCEMENT IN IMAGE ENCRYPTION USING AES." (2015).
  20. Zhu, Xiaoyan, et al. "Efficient privacy-preserving authentication for vehicular ad hoc networks." Vehicular Technology, IEEE Transactions on 63.2 (2014): 907-919.
  21. K. M. Anand and S. Karthikeyan, “Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms”, International Journal of Computer Networks and Information Security, vol. 2, pp. 22-28, 2012.
  22. A. K. B and P. A. A, “A New Hybrid Data Encryption and Decryption Technique to Enhance Data Security in Communication Networks: Algorithm Development,” vol. 5, no. 10, pp. 804–811, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Advanced Encryption Standard (AES-128) RSA hash based message authentication code (HMAC).