Secure File Storage on Cloud using Hybrid Cryptography
DOI:
https://doi.org/10.26438/ijcse/v7i1.587591Keywords:
Cryptography, Encryption, Decryption, Cloud Security, Cloud StorageAbstract
In this era cloud computing is used in various fields like industry, military, college, etc. for various services and storage of huge amount of data. Data stored in this cloud can be accessed or retrieved on the users request without direct access to the server computer. But the major concern regarding storage of data online that is on the cloud is the Security. This Security concern can be solved using various ways, the most commonly used techniques are cryptography and steganography. But sometimes a single technique or algorithm alone cannot provide high-level security. So we have introduces a new security mechanism that uses a combination of multiple cryptographic algorithms of symmetric key and steganography. In this proposed system 3DES (Triple Data Encryption Standard), RC6 (Rivest Cipher 6) and AES (Advanced Encryption Standard) algorithms are used to provide security to data. All the algorithms use 128-bit keys. LSB steganography technique is used to securely store the key information. Key information will contain the information regarding the encrypted part of the file, the algorithm and the key for the algorithm. File during encryption is split into three parts. These individual parts of the file will be encrypted using different encryption algorithm simultaneously with the help of multithreading technique. The key information is inserted into an image using the LSB technique. Our methodology guarantees better security and protection of customer data by storing encrypted data on a single cloud server, using AES, 3DES and RC6 algorithm.
References
[1] A. K. Shahade, V.S. Mahalle, “Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm”, IEEE, INPAC, pp 146-149, Oct .2014.
[2] Palash Uddin, Abu Marjan, “Developing Efficient Solution to Information Hiding through text steganography along with cryptography”, IEEE, IFOST, pages 14-17, October 2014.
[3] R. T. Patil and P. S. Bhendwade , “Steganographic Secure Data Communication”,IEEE, International Conference on Communication and Signal Processing, pages 953-956,April 2014.
[4] Klaus Hofmann and S. Hesham, “High Throughput Architecture for the Advanced Encryption Standard Algorithm” IEEE, International Symposium on Design and Diagnostics of Electronic Circuits & Systems, pages 167- 170, April 2014.
[5] D. Nilesh, M. Nagle, “The New Cryptography Algorithm with High Throughput”, IEEE, ICCCI, pages 1-5, January 2014.
[6] LI Yongzhen, Zhou Yingbing, “The Design and Implementation of a Symmetric Encryption Algorithm Based on DES”, IEEE, ICSESS, pages 517-520, June 2014.
[7] A. Hasan, N. Sharma, “A New Method Towards Encryption Schemes (Name-Based-Encryption Algorithm)”, IEEE, International Conference.
[8] S.Rajendirakumar, Dr.A.Marimuthu, “Cryptographic Algorithms used in Cloud Computing – An Analysis and Comparison”, International Journal for Research in Applied Science & Engineering Technology, Vol 6, Iss. 1, 2018.
[9] Prerna Mahajan, Abhishek Sachdeva, "A Study of Encryption Algorithms AES, DES and RSA for Security", Global Journal of Computer Science and Technology, Network, Vol. 13, Iss. 15, 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
