CFP last date
20 May 2024
Reseach Article

Enhancing the Security of Cloud Computing by Building Hybrid Cryptography Algorithms

by Tahera Begum, Md. Ebrahim Hossain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 44
Year of Publication: 2021
Authors: Tahera Begum, Md. Ebrahim Hossain
10.5120/ijca2021921849

Tahera Begum, Md. Ebrahim Hossain . Enhancing the Security of Cloud Computing by Building Hybrid Cryptography Algorithms. International Journal of Computer Applications. 183, 44 ( Dec 2021), 22-29. DOI=10.5120/ijca2021921849

@article{ 10.5120/ijca2021921849,
author = { Tahera Begum, Md. Ebrahim Hossain },
title = { Enhancing the Security of Cloud Computing by Building Hybrid Cryptography Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2021 },
volume = { 183 },
number = { 44 },
month = { Dec },
year = { 2021 },
issn = { 0975-8887 },
pages = { 22-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number44/32227-2021921849/ },
doi = { 10.5120/ijca2021921849 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:39.005484+05:30
%A Tahera Begum
%A Md. Ebrahim Hossain
%T Enhancing the Security of Cloud Computing by Building Hybrid Cryptography Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 44
%P 22-29
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present circumstances, the Cloud Computing is very well-known and flexible technology. It provides massive data centre to handle the large amount of information. The Cloud Computing benefits the organizations to handle their large volume of information. The major issue in cloud computing is data security, because most of the customers are sharing same cloud. This study aims at designing a new security method by using a hybrid cryptosystem, for data security in the cloud. The necessity for the current investigation is to protect data from unauthorized access or hackers in cloud at the time of data transmission by encrypting the user data. Cloud computing constitutes several security issues including data access control, identity management, auditing, integrity control and risk management. So, this hybrid cryptosystem is designed and comprises of both symmetric and asymmetric cryptography algorithm in which Blowfish symmetric algorithm deals with data confidentiality whereas, RSA asymmetric algorithm deals with an authentication. This method also includes the Secure Hash Algorithm – 256 (SHA-256) for data integrity. This study concluded that the proposed method provides high security on data transmission over the internet and proper network access on demand to a shared tank of constructive computing resources, like net, server, and storage application.

References
  1. Mahavir Jain, and Arpit Agrawal, “Implementation of Hybrid Cryptography Algorithm”, International journal of Core Engineering & Management, Volume 1, Issue 3, pp. 1-8, June 2014.
  2. Sunita Rani and Ambrish Gangal, “Cloud Security with Encryption using Hybrid Algorithm and Secured Endpoints”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012.
  3. Ali E.Taki El_Deen, “Design and Implementation of Hybrid Encryption Algorithm”, International Journal of Scientific & Engineering Research, Volume 4, Issue 12, pp. 669-673, December- 2013.
  4. Jasleen Kaur and Dr. Sushil Garg, “Security in Cloud Computing using Hybrid of Algorithms” International Journal of Engineering Research and General Science Volume 3, Issue 5, September October, 2015.
  5. Jan Mohammad Najar, and Shahid Bashir Dar, “A New Design of a Hybrid Encryption Algorithm”, International Journal of Engineering and Computer Science, Volume 3, Issue 11, pp. 9169-9171, November 2014.
  6. Self-study: Cryptography and its Types, retrieve from: https://www.geeksforgeeks.org/cryptography-and-its-types/, retrieve date: 5 July 2020.
  7. Self-study: Cloud computing, retrieve from: https://en.wikipedia.org/wiki/Cloud_computing, retrieve date: 1October 2020.
  8. Self-study: RSA (Rivest Shamir Adleman) algorithm, retrieve from: https://www.educative.io/edpresso/what-is-the-rsa-algorithm, retrieve date: 10 February 2021.
  9. Self-study: Encrypting data with the Blowfish algorithm, retrieve from: https://www.embedded.com/encrypting-data-with-the-blowfish-algorithm , retrieve date: 13 March 2021.
  10. Self-study: Secure Hash Algorithm 2 (SHA-2), retrieve from: https://en.wikipedia.org/wiki/SHA-2, retrieve date: 18 April 2021.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Cryptography Blowfish RSA SHA-256