Hybrid DES-RSA Model for the Security of Data over Cloud Storage
DOI:
https://doi.org/10.26438/ijcse/v11i10.17Keywords:
Cloud Computing, Cryptography, DES, RSA, Cloud Security, AuthenticationAbstract
Cloud computing is a novel business strategy. Over the past several years, the idea of cloud computing has matured, becoming one of the most rapidly expanding business concepts in the IT sector. The capacity of cloud computing to supply consumers with elastic, dependable, and reasonably priced services on demand has contributed to its meteoric rise in popularity in recent years. Since cloud computing provides users with scalable, on-demand services while requiring less investment in infrastructure. Client data and computations must be protected from both internal and external threats in order to allay fears that cloud computing is inherently insecure. This is due to the fact that cloud users get the required information from distant cloud servers that are not under the direct management of the data owners and that the data owners store their sensitive information on remote hosts. The client has the option of implementing security measures such as firewalls, VPNs, and other perimeter-based controls to safeguard their information. Data stored in the cloud raises privacy and security concerns since it is not located on the client`s premises. Therefore, data security is a major focus area in the cloud computing industry. To address these issues with cloud data security, we have developed solutions and strategies. Collectively, the models we`ve offered to ensure data security, privacy, and integrity constitute comprehensive principles for bolstering cloud data security. Cloud security risks and privacy issues, as well as the types of assaults and threats to which clouds are susceptible, are all addressed in the models. We`ve also solved the problem of how to store data on the cloud effectively. Additionally, we propose a general security model for cloud computing that might assist in satisfying its security requirements and safe guarding clouds from different hazardous behaviors.
References
[1] P. Yang, N. Xiong and J. Ren, "Data Security and Privacy Protection for Cloud Storage: A Survey," in IEEE Access, Vol.8, pp.131723-131740, 2020.
[2] P.K. & Aremu, Prof Sir Bashiru. (2020), Cloud Service Providers: An Analysis of Some Emerging Organizations and Industries, Srinivas & Paul Publication, India, pp.172-183, 2020.
[3] Kaja, Durga & Fatima, Yasmin & Mailewa, Akalanka. Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques. International Journal of Research Publication and Reviews. pp.713-720, 2022.
[4] A. Bhargav, & Manhar, Advin. A Review on Cryptography in Cloud Computing. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. pp.225-230, 2020.
[5] S. A. Nooh, "Cloud Cryptography: User End Encryption," 2020 International Conference on Computing and Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, 2020, pp.1-4, 2020.
[6] S. Kumar, G. Karnani, M. S. Gaur and A. Mishra, "Cloud Security using Hybrid Cryptography Algorithms," 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, pp.599-604, 2021.
[7] Duan, Qiang & Wang, Shangguang & Ansari, Nirwan. (2020). Convergence of Networking and Cloud/Edge Computing: Status, Challenges, and Opportunities. IEEE Network. pp.1-8, 2020.
[8] Bruno Guazzelli Batista, Carlos Henrique Gomes Ferreira, Danilo Costa Marim Segura, Dionisio Machado Leite Filho & Maycon Leone Maciel Peixoto, ‘A QoS-driven approach for cloud computing addressing attributes of performance and security’, Future Generation Computer Systems, Vol.68, pp.260-274, 2017.
[9] M Subha & Banu Uthaya, M 2014, ‘A survey on QoS ranking in cloud computing’, International Journal of Emerging Technology and Advanced Engineering, Vol.4, No.2, pp.293-300, 2014.
[10] Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil,A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends, Computers & Security, Vol.65, pp.29-49, 2017.
[11] P Natesan, RR Rajalaxmi, Gowrison & P Balasubramanie, 2017, ‘Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection’, International Journal of Pattern Programming, Vol.45, No.5, pp.1194-1213, 2017.
[12] Salman Iqbal, Laiha, Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman khan, Muhammad Khurram Khan & Kim-Kwang Raymond Choo 2016, ‘On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service’, International Journal of Network and Computer Applications, Vol.74, pp.98-120, 2016.
[13] Syed Asad Hussain, Mehwish Fatima, Atif Saeed, Imran Raza, Raja & Khurram Shahzad 2017, ‘Multilevel classification of security concerns in cloud computing’, Applied Computing and Informatics, Vol.13, No.1, pp.57-65, 2017.
[14] Dinh-Mao Bui, YongIk, Yoon, Eui-Nam, Huh, SungIk Jun & Sungyoung Lee 2017, ‘Energy efficiency for cloud computing system based on predictive optimization’, Journal of Parallel and Distributed Computing, Vol.102, pp.103-114, 2017.
[15] Durfi Ashraf & Sayiema Amin 2016, ‘Information hiding based on optimization technique for Encrypted Images’, International Research Journal of Engineering and Technology (IRJET), Vol.3, No.1, pp.1-6, 2016.
[16] A. Prabhu, & M Usha, ‘A Secured best data centre selection in cloud computing using encryption techniques’, International Journal of Business Intelligence and Data Mining, Vol.14, No.1/2, 2019.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
