Call for Paper

CAE solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 31, 2020.

Read More

Cloud Application Security using Hybrid Encryption

Alabi Orobosade, Thompson Aderonke Favour-Bethy, Alese Boniface Kayode, Arome J. Gabriel. Published in Security.

Communications on Applied Electronics
Year of Publication: 2020
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Alabi Orobosade, Thompson Aderonke Favour-Bethy, Alese Boniface Kayode, Arome J. Gabriel
10.5120/cae2020652866

Alabi Orobosade, Thompson Aderonke Favour-Bethy, Alese Boniface Kayode and Arome J Gabriel. Cloud Application Security using Hybrid Encryption. Communications on Applied Electronics 7(33):25-31, May 2020. BibTeX

@article{10.5120/cae2020652866,
	author = {Alabi Orobosade and Thompson Aderonke Favour-Bethy and Alese Boniface Kayode and Arome J. Gabriel},
	title = {Cloud Application Security using Hybrid Encryption},
	journal = {Communications on Applied Electronics},
	issue_date = {May 2020},
	volume = {7},
	number = {33},
	month = {May},
	year = {2020},
	issn = {2394-4714},
	pages = {25-31},
	numpages = {7},
	url = {http://www.caeaccess.org/archives/volume7/number33/869-2020652866},
	doi = {10.5120/cae2020652866},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The massive growth of sensitive information on cloud has made it more vulnerable. Thus, undeniably, the vulnerability shoots from the increasing number of users whose intentions are malicious. Since, the cloud is managed by a third party, ensuring cloud security services are of utmost importance, and coupled with the fact that cloud data and services resident in data centers are ubiquitous. The enlarged user surfing on the cloud for numerous purposes, therefore, necessitate a vastly safe and secured data. Consequent upon the highlighted points and providing a secure environment, this paper proposes a hybrid encryption algorithm comprising symmetric and asymmetric cryptography schemes suitable as state-of-the-art safeguarding users’ privacy and security in the cloud. We propose a privacy model using Advanced Encryption Standard (AES) as a first level data encryption scheme prior cloud application data storage, while Elliptic Curve Cryptography (ECC) is the subsequent encryption scheme with AES key to achieve our aim of data confidentiality as well as is security in the cloud.

References

  1. Sultan N. (2010) Cloud Computing for education: A new dawn International Journal of Information Management, International Journal of Information Management, doi: 10.1016/j.ijinfomgt.2009.09.004
  2. Buyya R., Chee S.Y., and Venugopal S. (2008) Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities in 10th IEEE International Conference on High Performance Computing and Communication., pp.5-13
  3. Alese B.K, Philemon E.D, and Falaki S.O. (2012) Comparative analysis of public key encryption scheme. International Journal of Engineering and Technology volume 2 No.9
  4. Priyadarshini P., Prashant N., Narayan D. G., and Meena S. M., (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish, Procedia Computer Science 78 (1): 617 – 624.
  5. Ankita, V, Paramita G, and Sunita M. (2016) Comparative Study of Different Cryptographic Algorithms, International Journal of Emerging Trends & Technology in Computer Science, 5 (1): 58-63.
  6. Hirani, S. (2003). Energy Consumption of Encryption Schemes in Wireless Devices Unpublished Thesis, university of Pittsburgh.
  7. Chandramouli, R. (2006). Battery power-aware encryption - ACM Transactions on Information and System Security, 9 (2): 12-25.
  8. Kumar N. (2012) A Secure communication wireless sensor networks through hybrid (AES+ECC) algorithm. von LAP LAMBERT Academic Publishing, vol. 386.
  9. Rachmat N., and Samsuryadi S. (2019) Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone. IOP Conf. Series: Journal of Physics: Conf. Series 1196 (2019) 012049
  10. Omotosho O.I (2019) A Review on Cloud Computing Security International Journal of Computer Science and Mobile Computing, Vol.8 Issue.9, September- 2019, pg. 245-257
  11. Manju S. A., and Neema M., (2016) Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Thing. Published by Elsevier Ltd.
  12. Alowolodu O.D, B. K Alese, Adetunmbi A.O, Adewale O. S, and Ogundele O.S (2013) Elliptic curve cryptography for securing cloud computing application. International Journal of Computer Applications (0975 – 8887) Volume 66– No.23.
  13. Thompson A. F., Iyare O. and Alese B.K. (2013): Towards Preserving the Confidentiality of Information in a Local Area Network (LAN) Messaging System, Journal of Applied Computer Science and Mathematics, 14 (7):27-33.

Keywords

Hybrid Encryption, Advanced Encryption Standard, Elliptic Curve Cryptography