CFP last date
01 January 2025
Reseach Article

Cloud Application Security using Hybrid Encryption

by Alabi Orobosade, Thompson Aderonke Favour-Bethy, Alese Boniface Kayode, Arome J. Gabriel
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 33
Year of Publication: 2020
Authors: Alabi Orobosade, Thompson Aderonke Favour-Bethy, Alese Boniface Kayode, Arome J. Gabriel
10.5120/cae2020652866

Alabi Orobosade, Thompson Aderonke Favour-Bethy, Alese Boniface Kayode, Arome J. Gabriel . Cloud Application Security using Hybrid Encryption. Communications on Applied Electronics. 7, 33 ( May 2020), 25-31. DOI=10.5120/cae2020652866

@article{ 10.5120/cae2020652866,
author = { Alabi Orobosade, Thompson Aderonke Favour-Bethy, Alese Boniface Kayode, Arome J. Gabriel },
title = { Cloud Application Security using Hybrid Encryption },
journal = { Communications on Applied Electronics },
issue_date = { May 2020 },
volume = { 7 },
number = { 33 },
month = { May },
year = { 2020 },
issn = { 2394-4714 },
pages = { 25-31 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume7/number33/869-2020652866/ },
doi = { 10.5120/cae2020652866 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T20:02:44.453744+05:30
%A Alabi Orobosade
%A Thompson Aderonke Favour-Bethy
%A Alese Boniface Kayode
%A Arome J. Gabriel
%T Cloud Application Security using Hybrid Encryption
%J Communications on Applied Electronics
%@ 2394-4714
%V 7
%N 33
%P 25-31
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The massive growth of sensitive information on cloud has made it more vulnerable. Thus, undeniably, the vulnerability shoots from the increasing number of users whose intentions are malicious. Since, the cloud is managed by a third party, ensuring cloud security services are of utmost importance, and coupled with the fact that cloud data and services resident in data centers are ubiquitous. The enlarged user surfing on the cloud for numerous purposes, therefore, necessitate a vastly safe and secured data. Consequent upon the highlighted points and providing a secure environment, this paper proposes a hybrid encryption algorithm comprising symmetric and asymmetric cryptography schemes suitable as state-of-the-art safeguarding users’ privacy and security in the cloud. We propose a privacy model using Advanced Encryption Standard (AES) as a first level data encryption scheme prior cloud application data storage, while Elliptic Curve Cryptography (ECC) is the subsequent encryption scheme with AES key to achieve our aim of data confidentiality as well as is security in the cloud.

References
  1. Sultan N. (2010) Cloud Computing for education: A new dawn International Journal of Information Management, International Journal of Information Management, doi: 10.1016/j.ijinfomgt.2009.09.004
  2. Buyya R., Chee S.Y., and Venugopal S. (2008) Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities in 10th IEEE International Conference on High Performance Computing and Communication., pp.5-13
  3. Alese B.K, Philemon E.D, and Falaki S.O. (2012) Comparative analysis of public key encryption scheme. International Journal of Engineering and Technology volume 2 No.9
  4. Priyadarshini P., Prashant N., Narayan D. G., and Meena S. M., (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish, Procedia Computer Science 78 (1): 617 – 624.
  5. Ankita, V, Paramita G, and Sunita M. (2016) Comparative Study of Different Cryptographic Algorithms, International Journal of Emerging Trends & Technology in Computer Science, 5 (1): 58-63.
  6. Hirani, S. (2003). Energy Consumption of Encryption Schemes in Wireless Devices Unpublished Thesis, university of Pittsburgh.
  7. Chandramouli, R. (2006). Battery power-aware encryption - ACM Transactions on Information and System Security, 9 (2): 12-25.
  8. Kumar N. (2012) A Secure communication wireless sensor networks through hybrid (AES+ECC) algorithm. von LAP LAMBERT Academic Publishing, vol. 386.
  9. Rachmat N., and Samsuryadi S. (2019) Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone. IOP Conf. Series: Journal of Physics: Conf. Series 1196 (2019) 012049
  10. Omotosho O.I (2019) A Review on Cloud Computing Security International Journal of Computer Science and Mobile Computing, Vol.8 Issue.9, September- 2019, pg. 245-257
  11. Manju S. A., and Neema M., (2016) Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Thing. Published by Elsevier Ltd.
  12. Alowolodu O.D, B. K Alese, Adetunmbi A.O, Adewale O. S, and Ogundele O.S (2013) Elliptic curve cryptography for securing cloud computing application. International Journal of Computer Applications (0975 – 8887) Volume 66– No.23.
  13. Thompson A. F., Iyare O. and Alese B.K. (2013): Towards Preserving the Confidentiality of Information in a Local Area Network (LAN) Messaging System, Journal of Applied Computer Science and Mathematics, 14 (7):27-33.
Index Terms

Computer Science
Information Sciences

Keywords

Hybrid Encryption Advanced Encryption Standard Elliptic Curve Cryptography