Secure Cloud Storage Using Different Algorithms in Cryptography
Secure Cloud Storage Using Different Algorithms in Cryptography
https://doi.org/10.22214/ijraset.2022.43500
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
Abstract: Cloud computing offers online services that allow visible servers, dynamic reminiscence swimming pools, and so for a
smooth get right of entry. Because dispensed computing is based on the internet, security concerns include information
protection, confidentiality, records protection, encryption, and authentication seem. Cloud records garage protection is a primary
difficulty. In this examination, we aimed to explore a variety of information safety strategies. The use of cryptographic
algorithms is used to solve information protection and privacy troubles in cloud storage. Inside the proposed Hybrid set of rules
system RC4, DES & AES Algorithms have been used to enhance data security and privacy. Proposed hybrid system algorithm
shield upload and download of statistics from cloud garage. In this case, mystery keys are required for each encryption to do
away with encryption. As a result, several parameters have calculated the usage of taking a look at features that encompass
encryption time, memory utilization, privacy length, and output to illustrate the performance of the hybrid machine, facts
simulations are to be supplied to JAVA, the use of the Eclipse IDE device. The proposed hybrid machine set of rules is used and
tested the usage of various record formats such as textual content and photo data. The proposed set of rules is thought to
paintings properly to provide additional information safety.
Keywords: Cryptography, cloud computing, encryption/decryption Algorithm
I. INTRODUCTION
Cloud computing provides cloud services online. The Cloud computing model allows apps once information is accessed remotely.
Three levels of services used are d to define as cloud computing infrastructure as a service (IaaS), Software as a service (SaaS), and
Platform as a Service(PaaS). IaaS provides visual equipment and storage to users. SaaS provides users with frameworks to improve
cloud hosting applications to develop, use, analyze, and manage theorem services. PaaS provides users with services and
applications with a web browser anywhere at any time and any place. Data security is a major issue as data is being held is a third
party, and the risk is high if users gather information in transparent manner storage also provides a backup tool. Cloud is divided
into three categories. There are a public cloud, virtual cloud, and hybrid cloud cloth most popular security issues in cloud computing
are data recovery issues, data privacy, Integrity, Availability, Confidentiality, Operational privacy, unauthorized access to such
management interface, vulnerability in virtual machine(VM)script illustration, data leakage risk, challenges with security metrics
&monitoring, Trouble regarding digital key management & numeric codes Cloud interoperability problem, and monitoring activity
patterns. Cryptography refers to the process of converting plain text into unreadable text Cryptography might be used to identify
users as well as safeguard data from theft and modification. Cryptography contains three categories: secret key (symmetric)
cryptographic public-key key (asymmetric) cryptography, as well as hash functions. Public key encryption is referred to as
symmetric key exchange in the middle of the transmitter as well as the receiver of data. In Asymmetric key cryptography, public-
key encryption is a kind of encryption that employs two distinct keys, one for encryption (public key) and decryption (private key).
The public key, everyone knows, and the private key, then only the owner knows For cryptography, the following three algorithms
were proved to be effective in terms of encryption/decryption time and other parameters for cloud storage: DES is an algorithm
program that takes a fixed-length stream of plaintext bits as well as, apparently limiting decoding to those who aware of the
encryption key takes a secure block size of 128,192, or 256 bits. The cipher is defined as many transformations Long repetitions that
transform the input of the cipher text’s last output. Each round involves multiple processing steps, together with one that relies on
the encryption key. A series of reverse rounds are applied to turn the ciphertext again into plain text just using the same encryption
key. Rivest Cipher four (RC4) is a symmetric-key block cipher invented by Ron Rivets. The RC4 algorithm performs bit-wise
encryption and decryption with a key length of 40-128 bits.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4765
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
The RC4 algorithm is widely used to secure the transport layer. Because The Rivest cipher four is still a stream cipher, it produces
streams of bits, with each byte of the same text to be encrypted. The password for data encryption is called the secret key. These
algorithms are less efficient in providing full-time security to cloud data. As these algorithms work individualities are supposed to
be less effective in furnishing full-time security to pall data. To ameliorate the effectiveness mongrel system of the named
algorithms was conducted for high-position security. This exploration substantially focuses on the performance evaluation
of different algorithms for the security of pall storehouse and provides a comparison of cold-blooded security encryption systems
with every single algorithm.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4766
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
B. Perpetration Procedure
The following is the procedure for the proposed system
1) Admit that data is trained for encryption & transfer towards others.
2) Also the stoner browses as of native storehouse to choose a train/ image to always be uploaded.
3) After that, the stoner chooses the encryption algorithm they want to use.
4) The proposed system gives druggies the option of employing an admixture of AES, DES, as well as RC4.
5) The named train is uploaded after it has been translated with the encryption algorithm that contains a combination of three
algorithms.
6) Accepting the stoner's DES key
7) Gain this same AES key procedure
8) Data file encryption has been done using the AES Fashion
9) Encryption using the DES system with an AES key.
10) Ciphertext/ image using RC4
11) Lines Transferring Process
12) Lines accepting the process
13) Approved translated AES secret key for decryption process we used the DES system
14) Accepted RC4 translated data train decryption using AES system
15) Now the translated train generated
16) So download the translated train
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4767
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
In such cases, a hybrid encryption strategy is employed. The enormous amount of data is encrypted using the AES technique, and
the AES key is encrypted using the DES algorithm in this methodology. The data cipher form is obtained by utilizing RC4 and an
AES encrypted message and a DES-encrypted AES key. When the message is received, the AES key is first encrypted utilizing
DES private key, and then the message is decrypted using the RC4 key. This hybrid encryption technique with java source code is
demonstrated in figure 3. Encrypted and the decrypted text file are shown in figure 4 and figure 5 respectively. Figure 6 and figure 7
show Encrypted and decrypted image files respectively.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4768
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4769
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
Fig.8 comparison of Encryption time of AES, DES, RC4, and Hybrid Algorithms
Fig.9 Comparison of Decryption time of AES, DES, RC4, and Hybrid Algorithms
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4770
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4771
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
V. CONCLUSION
As the demand for cloud computing keeps growing, maintaining the integrity of the cloud as well as its users becomes a key
priority. Several security methods may be used in the cloud. So here utilized a cryptography method to ensure the security of
cloud storage. This hybrid method combines the cryptographic algorithms AES, DES, and RC4 to provide fast data security. The
suggested technique is more efficient than existing techniques, according to analysis including its performance. In comparison to
previous techniques, the methodology accomplishes hybrid encryption as well as decryption in a small amount of time. As a result,
the suggested hybrid system of algorithms is beneficial for modern demands. This system creates random AES and DES keys &
encrypts the accepted data file. The RC4 encryption technique is then used to encode the applied AES key. The AES key is
encrypted, and the encrypted data file is concatenated and delivered via the communication medium. The merged file is approved on
the receiver's side. The encrypted AES and DES key files and the encrypted data file are separated in this file. Data is decrypted
using the AES and DES algorithms as well as RC4 keys. The goal of the hybrid algorithm system is to increase the level of security.
Such a method can make it more difficult for the hacker to succeed. The required result for the data on cloud computing was
accomplished by implementing a hybrid system of algorithms in the eclipse IDE tool using the Java language. In the future, various
comparisons with other techniques for cryptography might be utilized to provide findings that demonstrate the efficiency of the
suggested framework. As a result, more research will concentrate on improving encryption as well as decryption times. In addition,
new hybrid algorithms should be built from existing methods to increase the encryption process as well as the level of security for
cloud storage.
REFERENCES
[1] E. Ghazizadeh, "Cloud Surfing: A General Comparison of Cloud Identity Guidelines," in the proceedings of Americas Conference on Information Systems
(AMCIS 2020), USA, pp. 30-34,2020.
[2] J. Gibson, "Benefits and challenges of three cloud computing service models." In the proceedings of Fourth International Conference on Computational
Aspects of Social Networks (Cason), Brazil, pp. 198-205. 2012.
[3] A. Orobosade, "Cloud application security using hybrid encryption," Communications, vol. 7, pp. 25-31, 2020
[4] P. Srivastava, "A review paper on cloud computing," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8,
issue. 6. pp. 17-20, 2018.
[5] H. Tabrizchi, "A survey on security challenges in cloud computing: issues, threats, and solutions," The journal of supercomputing, vol. 76, issue. 12. pp.
9493-9532, 2020.
[6] R. Chatterjee, "Cryptography in cloud computing: a basic approach to ensure security in the cloud," International Journal of Engineering Science, vol.7, issue.
5, pp. 11818-11821,2017.
[7] S. Sharma, "A hybrid cryptographic technique for file storage mechanism over the cloud," in First international conference on sustainable technologies for
computational intelligence, Poland, Vol. 1045, pp. 241-256, 2020.
[8] K. Logunleko, "A comparative study of symmetric cryptography mechanism on DES, AES, and EB64 for information security," International Journal
Scientific Research in Computer Science and Engineering, vol. 8, issue. 1. pp. 45-51, 2020.
[9] S. K. Ghosh, "Hybrid Cryptography Algorithm For Secure And Low-Cost Communication," in Proceedings of International Conference on Computer
Science, Engineering and Applications (ICCSEA), UK, pp. 1-5, 2020.
[10] S. R. Zeebaree, "DES encryption and decryption algorithm implementation based on FPGA," Indonesian Journal of Electrical Engineering and Computer
Science, vol. 18, issue. 2. pp. 774-781, 2020.
[11] O. Hajihassani, "Fast AES implementation: A high-throughput bitsliced approach," IEEE Transactions on parallel and distributed systems, vol. 30, issue. 10.
pp. 2211-2222, 2019.
[12] O. G. Abood, "A survey on cryptography algorithms," International Journal of Scientific and Research Publications, vol. 8, issue. 7. pp. 495-516, 2018.
[13] N. A. Sharma, "A performance test on symmetric encryption algorithms—RC2 Vs Rijndael," International Journal Of Scientific & Technology Research, vol.
6, issue. 07. pp. 292-294, 2017.
[14] K. Sajay, "Enhancing the security of cloud data using hybrid encryption algorithm," Journal of Ambient Intelligence and Humanized Computing, pp. 1-10,
2019.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4772