Electronics 10 02673 v2
Electronics 10 02673 v2
Article
Hybrid AES-ECC Model for the Security of Data over
Cloud Storage
Saba Rehman 1 , Nida Talat Bajwa 1 , Munam Ali Shah 1, * , Ahmad O. Aseeri 2 and Adeel Anjum 1
Abstract: A cloud computing environment provides a cost-effective way for the end user to store
and access private data over remote storage using some Internet connection. The user has access
to the data anywhere and at any time. However, the data over the cloud do not remain secure
all the time. Since the data are accessible to the end user only by using the interference of a third
party, it is prone to breach of authentication and integrity of the data. Moreover, cloud computing
allows simultaneous users to access and retrieve their data online over different Internet connections,
which leads to the exposure, leakage, and loss of a user’s sensitive data in different locations. Many
algorithms and protocols have been developed to maintain the security and integrity of the data
using cryptographic algorithms such as the Elliptic Curve Cryptography (ECC). This paper proposes
a secure and optimized scheme for sharing data while maintaining data security and integrity
over the cloud. The proposed system mainly functions by combining the ECC and the Advanced
Encryption Standard (AES) method to ensure authentication and data integrity. The experimental
Citation: Rehman, S.; Talat Bajwa, N.; results show that the proposed approach is efficient and yields better results when compared with
Shah, M.A.; Aseeri, A.O.; Anjum, A. existing approaches.
Hybrid AES-ECC Model for the
Security of Data over Cloud Storage. Keywords: cloud computing; data security; authentication; data integrity; Elliptic Curve Cryptogra-
Electronics 2021, 10, 2673. https:// phy (ECC); Advanced Encryption Standard (AES)
doi.org/10.3390/electronics10212673
private key is used to encrypt the message and avoid the various activity of the hackers. It
has been identified that the difficulty in adopting the symmetric cryptographic algorithms
stems from the key size which needs to be large enough to ensure proper security. List of
abbreviations used in this paper are shown in Table 1.
Abbreviation Explanation
AES Advanced Encryption Standard
ECC Elliptic Curve Cryptography
RSA Rivest–Shamir–Adleman
DES Data Encryption Standard
PHECC Polynomial-based hashing elliptic curve cryptography
NIST National Institute of Standards and Technology
Extensible Authentication Protocol—Challenge Handshake
EAP-CHAP
Authentication Protocol
GDLP Generalized Discrete Logarithm Problem
API Application Programming Interface
CSP Cryptographic Service Provider
1.5. Contributions
The following are the main contributions of this paper:
Electronics 2021, 10, 2673 6 of 20
1.5. Contributions
The following are the main contributions of this paper:
q We propose a hybrid model by combining two algorithms AES and ECC, in which
key generation of AES is done with the help of ECC. In simple words, we are not
using the key generated by the AES algorithm; ECC is used for generating the key so
that its key size is reduced.
q As in symmetric/asymmetric encryption, a public key or private key is used for
encryption and decryption of data. Thus, this process needs a large key size and
requires a lot of computational power. The proposed hybrid algorithm (AES-ECC) is
used to enhance the security of system in less time by solving the problem of key size
and it helps to reduce the computational power for memory optimization.
q We also present an algorithm for our proposed framework which describes how the
public key is generated using ECC algorithm and how encryption/decryption is done
using AES.
The remaining sections of this paper are organized as follows. Section 2 provides the
related studies. In Section 3, the research methodology is explained in detail. The proposed
hybrid AES-ECC model is presented in Sections 4 and 5 is about experimental results and
discussions. In Section 6, the conclusion of the work is presented.
2. Related Work
Cloud storage is gaining popularity day by day due to its synchronous resource
sharing among all users. Data owners prefer cloud storage over other services due to its
access-all time nature. For this purpose, data integrity and data preservation should be
verified in order to increase security of the system.
In ref. [1], AES along with ECC is proposed for increasing security of the system.
Shamir secret sharing is used for distributing and managing the system without the trusted
center. Although the proposed combined approach increases system security, it still takes
huge computational cost as well as taking much time.
AES, DES, and Blowfish methods are used along with the proposed method which
uses the relatable algorithms for secure cloud services [2]. These algorithms provide
efficiency and integrity to the data storage to avoid conflict among bulk users and secure
the data of each user separately. Moreover, data accessibility is expeditious and managed
appropriately by the service provider. The avalanche impact of plain text and data block
size is also measured by the cloud computing data services.
In paper [3] by Madhavi et al., the security strength of ECC and RSA are combined
by using the data over 264 bits while 256 bits of data follow the guidelines of NIST. This
working of algorithms shows that the ECC works more effectively as compared to the RSA
algorithm as it provides more secure services over reduced data size and contains less
storage for the accessibility of data. Experimentation can be done on different platforms
of JAVA.
ECC is used for the encryption and decryption of data to provide secure and efficient
services to different users [4,9]. The encryption and decryption of data are done in the
layered method comprising of two sections. The first section contains the small sections
for the addition of the bits for the data encryption process and reduces the size of the
keys for efficient accessibility. Meanwhile, the second layer consists of a partition of the
elliptical curves which are used for the encryption of data such as P0 , P1 , P2 , P3 , P4 . . .
Pn . These steps are used for the encryption and decryption process and these two layers
provide the security of the data. In the previous techniques, data losses and security issues
arise. To overcome the effect of these issues, ECC is used to secure the data and avoid the
breakdown of the data for unethical reasons. In this asymmetric technique of cryptography,
data security and enhancement of larger datasets can be done easily to provide security
services most readily. ECC simultaneously provides the two operations to access and
secure the data over cloud computing.
Electronics 2021, 10, 2673 7 of 20
while for encryption and decryption. In the other way around, different strategies might
give an efficient encryption, yet they experience the ill effects of the need for security.
The author [22] introduced a configuration that depends on different key parts that
allow the security model to put away and share touchy information utilizing public cloud
innovation. AES with a 256-bit encryption decoding motor is utilized to scramble the
information that will be transferred on the cloud. AES has conveyed incredible outcomes
for scrambling mass information at high paces. Steganography measures are utilized for
information security. Steganography stores delicate information inside other information,
in this way expanding the information size to be put away on cloud. These result in
increment transfer speed and cloud diminish capacity use, which is not practical.
8-bit ECC processor possesses just 11 cuts used in [23,24]. A review on the duplication
strategies were done, from which Karatsuba, Stall, and Montgomery’s particular increase
techniques were observed to be effective. The investigation of the three augmentation
techniques was performed and among the three increase strategies, Karatsuba duplication
was picked as a space-effective duplication strategy. The Karatsuba augmentation strategy
possesses a smaller number of cuts in contrast with other strategies. It will be helpful in
decreasing for higher request bits since lower request bits as of now involve a smaller
number of cuts.
Paper [25–27] introduced a two-level cryptographic procedure and a model for the im-
provement of information security in cloud processing. The model utilizes both symmetric
and uneven encryption calculation (AES and ECC) to improve the security of information
against intruders, denying them from approaching the genuine information, thus empow-
ering privacy, respectability of the information, and time taken to perform cryptographic
tasks, and further developing the trust level of clients in cloud computing and speeding up
the utilization of more modest keys of ECC in the cryptographic interaction.
Table 2 represents the comparative analysis of related work in detail of papers [1–13].
Different levels of security and threats are discussed by different authors [5] based on
the services which are discussed below in Table 3.
Electronics 2021, 10, 2673 9 of 20
Different levels of security, attacks and their impact on system can be seen in Table 4.
3. Research Methodology
In this section, we provide the research design that has been followed by the paper.
The research design for the proposed method is also discussed in the next section. Figure 4
shows the conventional research methodology followed in general, from reviewing existing
schemes to proving the proposed one.
phishing modification
3. Research Methodology
In this section, we provide the research design that has been followed by the paper.
Electronics 2021, 10, 2673 The research design for the proposed method is also discussed in the next section. Figure
10 of 20
4 shows the conventional research methodology followed in general, from reviewing ex-
isting schemes to proving the proposed one.
Figure 4. 4.
Figure Methodology used
Methodology in in
used thethe
paper.
paper.
InInFigure
Figure 4, 4,
wewe can
cansee
seethat
thatpaper
paperfollows
followsthetheconventional
conventionalresearch
researchmethodology
methodology
flow.
flow.Firstly, wewestudied
Firstly, studiedalready
alreadyexisting
existingschemes
schemesininthetheliterature.
literature.After
Afterstudying,
studying,we we
identified
identified severallimitations
several limitationsininthese
theseexisting
existing schemes.
schemes. Mainly,
Mainly, wewefound
foundthat
thatcomputation
computa-
overhead
tion overheadcostcost
for for
existing schemes
existing is larger
schemes as is as
is larger theistime required
the time to compute
required them. them.
to compute Several
other other
Several limitations werewere
limitations found; however,
found; however,we solve only
we solve a few
only of of
a few thethe
main
mainlimitations
limitationsby
byproposing
proposingour ournewnew hybrid
hybrid approach (AES-ECC),
(AES-ECC), whichwhichsecures
securesthethedata
dataover
overthethe cloud
cloud
storage. Experimental setup is created for our proposed hybrid scheme and comparison
can be done with other methods and hybrid scheme as well. We found that our proposed
hybrid scheme outperforms other security schemes in terms of performance and efficiency.
4. Proposed Framework
In this section, we provide the design details of the proposed approach. We highlight the
significance of combining ECC and AES and focus on the algorithm used in this approach.
Request for
download
Cloud Server
Verfication Decryption
Provider
Cloud Server
Key Generation by
ECC
Analysis
Encryption/
Decryption on Time
In the above
In the above figure, it canfigure, it canseen
be clearly be clearly seenalong
that AES that AES
withalong
ECC with ECC effectively
effectively securessecures
data
data over cloud over cloud
storage. Thestorage.
noveltyThe novelty
of the of the proposed
proposed method can method can be clearly
be clearly seen inseen
the in the
new proposed diagram, in which there is secure transmission of user data to server and
new proposed diagram, in which there is secure transmission of user data to server and
then storage mechanism is even secured due to encrypted data. Moreover, novelty can
then storage mechanism
be determinedis even secured
in terms due to encrypted
of computational cost anddata.
time.Moreover,
However, novelty can be can
attack prevention
determined inbeterms of computational cost and time. However, attack prevention
done in the following way: for example, if an attacker wants to attack on the usercan be side
done in the following way:
in order to gainfor example,
user personalifinformation
an attackeror wants to attack
for some other on the user
purpose, sideproposed
in the in
order to gain approach,
user personal
once information
the user uploadsor for
thesome
input other purpose,
file, the in the proposed
file is converted ap- text
into encrypted
proach, once the user uploads the input file, the file is converted into encrypted text with
the help of AES encryption, so the text is fully encrypted. Therefore, if an attacker per-
forms an attack and somehow get the user-uploaded file, then it is useless because the
information was already encrypted upon uploading. Similarly, on the other end, if an at-
Electronics 2021, 10, 2673 12 of 20
with the help of AES encryption, so the text is fully encrypted. Therefore, if an attacker
performs an attack and somehow get the user-uploaded file, then it is useless because the
information was already encrypted upon uploading. Similarly, on the other end, if an
attack is performed, the attacker is not able to decrypt the encrypted file and hence the
data are secured from attacks.
Explanation: As you can see in the Table 5 and Figure 6, a medium key size is required
for ECC as compared to RSA. Because of this, it provides better security than RSA. ECC-AES
Explanation:
also provides As you
better can see with
security in the a
Table 5 andkey
smaller Figure 6, aasmedium
size key size
compared to is re- cryptographic
other
quired for ECC as compared to RSA. Because of this, it provides better security than RSA.
algorithms.
ECC-AES alsoItprovides
optimizes memory
better space
security with and reduces
a smaller computational
key size as complexity
compared to other cryp- because of
the smaller
tographic key size.
algorithms. Thus, bymemory
It optimizes using space
a medium key computational
and reduces size, a high level of data security can
complexity
bebecause
obtained.
of the smaller key size. Thus, by using a medium key size, a high level of data
security can be obtained.
16,000
14,000
12,000
Key Size
10,000
8000
6000
4000
2000
0
1 2 3 4
Figure 6. Graphical
Figure 6. Graphical representation of key of
representation sizes.
key sizes.
5.2.Various
5.2. Various Algorithms
AlgorithmsComparisons
Comparisons
The analysis of different algorithms is compared to check the functionality and space
The analysis of different algorithms is compared to check the functionality and space
optimization over cloud storage [34]. The comparison of different algorithms is given be-
optimization
low in Table 6. over cloud storage [34]. The comparison of different algorithms is given
below in Table 6.
Table 6. Comparison of different Cryptographic Algorithms.
No. ofKey
keyLength in 1 64–256 156 112–1681 32–448 1 1024 2 Exchange
Key Key Exchange
bits
Key Length in bits 64–256 56 112–168 32–448 1024 Key Exchange
Rounds 10 16 48 16 1 56
Rounds 10 16 48 16 1 56
Brute Computational Key frequently Key generation Cannot encrypt
Limitation Brute force Computational Key frequently
Limitation Brute force force
Brute force power
power changing
changing
weekKey generationdata
week Cannot encrypt data
As you can see in the above table 6, it shows the analysis of different cryptographic
techniques
As youbased
can on
seedifferent factors. Table
in the above Cryptographic algorithms
6, it shows have been
the analysis ofcompared
different cryptographic
with each other for performance evaluation on basis of number of keys used, keys in bits,
techniques based on different factors. Cryptographic algorithms have been compared
rounds, and limitations.
with each other for performance evaluation on basis of number of keys used, keys in bits,
rounds, and and
5.3. Materials limitations.
Methods
This section provides details about the materials that we used in implementing our
research paper. The following are some of the general details about the implementation:
Electronics 2021, 10, 2673 14 of 20
The Python code along with its complete guideis available at the following URL: https:
//github.com/sabarehmanciit/Hybrid-AES-ECC-Model (accessed on 27 September 2021).
5.4. Setup
We used Python to implement our proposed algorithm and to validate the efficiency
and uniqueness of our proposed system. We used SimpleCV library for Python to read
the images. The image format used by our code was Portable Network Graphics. The
uniqueness and efficiency of the system by the combination of ECC and AES was enhanced
in the different way that many of the data over cloud storage were secured and achieved
the secured connections for the encryption and description of the data.
2030
2000 1908
1850 1850
1766 1732
1711
1642 1642
1531
Time Taken (ns)
1500 1373
1205
1000
500
0
Images (3233) Images (4830) Images (6308)
Hybrid Algorithm AES (128 key size) DES (64 key size) AES and Blowfish (128 key size)
Figure 7. Encryption
Figure time
7. Encryption comparison
time comparisonof
of different algorithms.
different algorithms.
Explanation: Figure 7 shows comparison of the encryption time of the data with dif-
ferent cryptographic algorithms. The hybrid algorithm is the proposed algorithm. Results
are prominent in that the hybrid ECC-AES approach took less time to encrypt data than
the existing approaches due to its smaller key size. Moreover, the hybrid ECC-AES algo-
Electronics 2021, 10, 2673 15 of 20
Explanation: Figure 7 shows comparison of the encryption time of the data with
different cryptographic algorithms. The hybrid algorithm is the proposed algorithm.
Results are prominent in that the hybrid ECC-AES approach took less time to encrypt
data than the existing approaches due to its smaller key size. Moreover, the hybrid ECC-
AES algorithm has characteristics of both algorithms which provides higher security by
increasing the complexity and making the system strong against attacks. It can also be
clearly seen that encryption time for the proposed h algorithm is much less as compared
to other algorithms. As the time for encryption is reduced, our computational cost is also
Electronics 2021, 10, x FOR PEER REVIEW
reduced, which is very effective. Hence, our proposed approach works more17efficiently
of 22
than others. Figure 8 represents the decryption time comparison of various algorithms.
900 877
800
700
630
606
Time Taken (ns)
600
400
289 290 309
300 269
230
200 174
150
100
0
Images (3233) Images (4830) Images (6308)
Hybrid Algorithm AES (128 key size) DES (64 key size) AES and Blowfish (128 key size)
Explanation:
Explanation: Figure
Figure 88shows
shows comparison
comparison ofdecryption
of the the decryption
time oftime of the
the data withdata
dif- with
different cryptographic algorithms. The hybrid algorithm is the proposed
ferent cryptographic algorithms. The hybrid algorithm is the proposed algorithm. Results algorithm.
Results are prominent
are prominent in that
in that the hybridtheECC-AES
hybrid approach
ECC-AEStakes approach
less time takes less time
to decrypt datato decrypt
than
data
thethan the approaches
existing existing approaches due tokey
due to its smaller its smaller key size.
size. Moreover, theMoreover,
hybrid ECC-AES the hybrid
algo- ECC-
AES algorithm
rithm has characteristics
has characteristics of both which
of both algorithms algorithms
provideswhich
higherprovides
securityhigher security by
by increasing
the complexity
increasing and makingand
the complexity the making
system strong againststrong
the system attacks.against
It can also be clearly
attacks. seen
It can also be
that decryption
clearly time for proposed
seen that decryption time forhybrid algorithm
proposed hybrid is algorithm
much less as compared
is much lessto
asother
compared
algorithms.
to other As the time
algorithms. for decryption
As the is reduced,is
time for decryption our computational
reduced, cost is also reduced,
our computational cost is also
reduced, which is very effective. Hence, our proposed approach worksthan
which is very effective. Hence, our proposed approach works more efficiently more others.
efficiently
The evaluation of our proposed scheme is based on encryption time and decryption
than others.
time.
The evaluation of our proposed scheme is based on encryption time and decryption time.
5.6. Performance Analysis
5.6. Performance Analysis
All the results and comparisons were performed on a system with the following spec-
All the results
ifications: Windows and10,
comparisons were performed
Processor Intel(R) Core (TM) on a system
i7-8550U with
CPU the following
@ 1.80GHz, 1992 speci-
fications:
MHz, 4 Core(s), 8 Logical Processor(s). The proposed algorithm was tested on Python en- MHz,
Windows 10, Processor Intel(R) Core (TM) i7-8550U CPU @ 1.80GHz, 1992
4 Core(s), 8 Logical Processor(s). The proposed algorithm was tested on Python environment.
vironment.
5.6.1. Encryption
5.6.1. EncryptionTime
Time
WeWealso compared
also comparedthetheencryption
encryptionand
and decryption timewith
decryption time withdifferent
differentkey
keysizes
sizes
forfor our
proposed hybridhybrid
our proposed algorithm and with
algorithm the existing
and with algorithms
the existing (AES,
algorithms DES,
(AES, and
DES, andBlowfish)
Blow- for
fish) for final confirmation. The tests were performed using different keys, namely, 64 bits,
128 bits, 192 bits, and 256 bits. The proposed and existing encryption algorithms were
tested for text data using different keys. In Table 7 and 8, the encryption and decryption
time of all the values in seconds are shown. Furthermore, we can see the visual analysis
of these values for better understanding.
Electronics 2021, 10, 2673 16 of 20
final confirmation. The tests were performed using different keys, namely, 64 bits, 128 bits,
192 bits, and 256 bits. The proposed and existing encryption algorithms were tested for text
data using different keys. In Tables 7 and 8, the encryption and decryption time of all the
values in seconds are shown. Furthermore, we can see the visual analysis of these values
for better understanding.
021, 10, x FOR PEER REVIEW 18 of 22
Table 7. Encryption time calculated using different key sizes.
128 2.47
Table 8. Decryption 3.59different key4.02
calculated using sizes. 4.47
Key Sizes Hybrid AES DES Blowfish
192 2.54 3.48 4.05 4.43
64 1.64 2.69 3.11 3.89
128 1.77 2.82 3.30 3.94
256 2.60 3.60 4.34 4.70
192 1.88 2.93 3.38 4.10
256 2.10 3.08 3.58 4.25
In Figure 9, encryption time of proposed and existing algorithms have been com-
pared. In Figure 9, encryption time of proposed and existing algorithms have been compared.
Encryption Time
5 4.7
4.47 4.43 4.34
4.5 4.2
3.99
4 3.7 3.59 3.6
3.48
3.5
Time Taken (s)
AES (128 bits) Hybrid (64 bits) Base Paper(512 bits) Blowfish (64 bits)
Figure 9. Comparison graph for encryption time in hybrid and other existing algorithms using different key sizes.
Figure 9. Comparison graph for encryption time in hybrid and other existing algorithms using different key sizes.
Explanation: The above Figure 9 shows the time taken by other existing algorithms
Explanation: The
(AES andabove figure
Blowfish), Base9 Paper,
showsandthehybrid
time models
taken by for other existing
the same algorithms
text data for the encryption
(AES and Blowfish), Base
process. Paper,
It was and
found hybrid
that models
the hybrid for themodel
ECC-AES sametook
textless
data foron
time the encryp-
key size in bits (64,
tion process. It 128,
was192,
foundandthat
256),the
while on theECC-AES
hybrid other hand, the other
model tookexisting algorithms
less time on key(AES,
size inDES, and
Blowfish) took more time on key size in bits (64, 128, 192, and 256).
bits (64, 128, 192, and 256), while on the other hand, the other existing algorithms (AES,
DES, and Blowfish) took more time on key size in bits (64, 128, 192, and 256).
Decryption Time
4.1 4.25
4.5 3.89 3.94
4 3.58
3.3 3.38
3.5 3.1 2.93 3.08
2.82
Time Taken (s)
3
2.5 2.1
1.77 1.88
2 1.64
1.5
1
0.5
0
64 128 192 512
Bits
AES (128 bits) Hybrid (64 bits) Base Paper (512 bits) Blowfish (64 bits)
Figure 10. Comparison graph for decryption time in hybrid and other existing algorithms using different key sizes.
Figure 10. Comparison graph for decryption time in hybrid and other existing algorithms using
different key sizes. Explanation: Figure 10 shows the time taken by other existing algorithms (AES and
Blowfish), Base Paper, and hybrid models for the same text data for the decryption process.
Explanation: Figure 10 shows
It was found thehybrid
that the time model
takentook
by other existing
less time on key algorithms (AES
size in bits (64, andand 256),
128, 192,
whileand
Blowfish), Base Paper, on the other hand,
hybrid models the for
other
theexisting
samealgorithms
text data (AES, DES,
for the and Blowfish)
decryption took more
pro-
time on key size in bits (64, 128, 192, and 256).
cess. It was found that the hybrid model took less time on key size in bits (64, 128, 192,
Figures 9 and 10 show that our scheme will help in the optimization of the memory space
and 256), while on the other hand, the other existing algorithms (AES, DES, and Blowfish)
and reduce the computational complexity as compared to other cryptographic algorithms. A
took more time on key sizememory
medium in bits (64, 128,
size is 192, and
required 256).
for the hybrid algorithm and less time is required for the
Figures 9 and encryption
10 show that our scheme
and decryption will as
process help in thetooptimization
compared of thealgorithms.
other cryptographic memory
space and reduce the computational complexity as compared to other cryptographic al-
gorithms. A medium 5.6.3. Avalanche
memory Effect
size is required for the hybrid algorithm and less time is
In general, the Avalanche
required for the encryption and decryption Effect (Av)
process is the measure
as compared of change
to other in an algorithm. It
cryptographic
simply means that a smaller change in input can cause significant change in output of
algorithms.
the text. We can calculate Av by calculating changed bits in cipher bits and dividing this
number by total number of cipher bits [35]. The formula by which we calculated Avalanche
5.6.3. Avalanche Effect
Effect of our proposed algorithm and base paper is:
In general, the Avalanche Effect (Av) is the measure of change in an algorithm. It
Av = Number of changed bits/Total number of bits
simply means that a smaller change in input can cause significant change in output of the
text. We can calculate AWe
v by calculating
compared changed effect
the Avalanche bits inofcipher bits and
our proposed dividing
algorithm this
with num-
other encryption
ber by total number of cipher bits [35]. The formula by which we calculated Avalanchea certain
algorithms [1], in Table 9. An Avalanche effect greater than 50% indicates that
Effect of our proposed algorithm and base paper is:
Av = Number of changed bits/Total number of bits
We compared the Avalanche effect of our proposed algorithm with other encryption
algorithms [1], in Table 9. An Avalanche effect greater than 50% indicates that a certain
algorithm has more security power as compared to others. Our proposed algorithm has
the highest Avalanche effect showing that the system is more secure than others.
Table 9 shows the Avalanche effect for the various encryption algorithms. The more
the change occurs in the cipher due to a single bit change in key or the plain text, the
greater the avalanche effect. In Figure 11, we can see that the higher the avalanche effect,
Electronics 2021, 10, 2673 18 of 20
algorithm has more security power as compared to others. Our proposed algorithm has
the highest Avalanche effect showing that the system is more secure than others.
Encryption Algos 1-bit Key Change Avalanche Effect 1-bit Plain Text Change Avalanche Effect
Base Paper 68 0.55 70 0.56
Electronics 2021, 10, x FOR PEER REVIEW 20 of 22
Blowfish 37 0.29 23 0.18
AES 64 0.51 71 0.55
Proposed 73 0.61 83 0.64
Table 9. Avalanche effect comparison.
Table 9Al-
Encryption shows1-bit
the Avalanche
Key effect for the various
1-bitencryption
Plain Text algorithms. The more
the change occurs in the cipher Avalanche
due to a Effect
single bit change in Avalanche
key or the plain text, theEffect
greater
gos Change Change
the avalanche effect. In Figure 11, we can see that the higher the avalanche effect, as with
Base Paper 68 0.55 70 0.56
our proposed algorithm, the more it becomes difficult to break the algorithm easily. Hence,
Blowfish 37 0.29 23 0.18
we can see that our algorithm has higher security in terms of its Avalanche effect. Below
AES 64 0.51 71
is the visual representation of the above table, where we can easily see that our 0.55proposed
Proposed
algorithm 73
has higher security 0.61
than other 83
encryption algorithms. 0.64
Avalanche Effect
90
80
Avalanche Effect (Av)
70
60
50
40
30
20
10
0
Base Paper Blowfish AES Proposed
Table 11 shows the power consumption of decryption time in Watts, here we com-
pared our proposed algorithm with Base Paper.
Electronics 2021, 10, 2673 19 of 20
Table 11 shows the power consumption of decryption time in Watts, here we compared
our proposed algorithm with Base Paper.
Power Consumption
Hybrid AES Base Paper Blowfish
(Watts)
64-bit key size 1.64 W 2.69 W 3.1 W 3.89 W
128-bit key size 1.77 W 2.82 W 3.3 W 3.94 W
192-bit key size 1.88 W 2.93 W 3.38 W 4.10 W
256-bit key size 2.10 W 3.08 W 3.58 W 4.25 W
6. Conclusions
IT-related services such as cloud computing provide efficient services regardless of the
user’s knowledge about technology. Data can be stored, managed, improved, and accessed
through a cloud interface provided by third party cloud service providers via the Internet
with minimal effort regardless of the location of the user. Cloud services provide many
facilities to the user. Users are the people who are using the services depending on the kind
of cloud services. Services are provided at low cost as well as being a beneficial thing for
so many users to access their data from any place. Cloud services can be made available
on any machine as there is no need to take your device along with you. However, the
drawback of cloud services is the low data security which may be overcome through special
strategies and must be secured. Specifically, for the generation of the key, ECC is used to
reduce the complexity of the operations. Due to the low-key size, the enhancement of ECC
is much better than other cryptographic techniques. AES in combination with ECC can
do a lot better with the optimization and security of the data. However, much security is
still needed in the future to expand the concept of cloud computing through cryptographic
techniques. In future, this research can be improved by increasing the security of the hybrid
approach. Multiple security layers can be added to enhance the productivity and efficiency
of the system.
Author Contributions: Conceptualization, methodology and initial writeup, S.R. and N.T.B.; research
supervision and results validation, M.A.S.; formal analysis, A.A.; review, editing and funding
acquisition, A.O.A. All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Data Availability Statement: Data is available on the github on the following link: https://github.
com/sabarehmanciit/Hybrid-AES-ECC-Model (accessed on 27 September 2021).
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Shukla, D.K.; Dwivedi, V.K.; Trivedi, M.C. Encryption algorithm in cloud computing. Mater. Today Proc. 2020, 37, 1869–1875.
[CrossRef]
2. Yahia, H.S.; Zeebaree, S.R.M.; Sadeeq, M.A.M.; Salim, N.O.M.; Kak, S.F.; Al-Zebari, A.; Salih, A.A.; Hussein, H.A. Comprehensive
survey for cloud computing based nature-inspired algorithms optimization scheduling. Asian J. Res. Comput. Sci. 2021, 1–16.
[CrossRef]
3. Qazi, R.; Khan, I.A. Data security in cloud computing using elliptic curve cryptography. Int. J. Comput. Commun. Netw. 2019, 1,
46–52. [CrossRef]
4. Chen, Y.; Liu, H.; Wang, B.; Sonompil, B.; Ping, Y.; Zhang, Z. A threshold hybrid encryption method for integrity audit without
trusted center. J. Cloud Comput. 2021, 10, 3. [CrossRef]
5. Agrahari, V. Data security in cloud computing using cryptography algorithms. Int. J. Sci. Dev. Res. 2020. Available online:
www.ijsdr.org (accessed on 22 October 2021).
6. Abdullahi Ibrahim, A.; Cheruiyot, W.; Kimwele, M.W. Data security in cloud computing with elliptic curve cryptography core.
Int. J. Comput. 2017, 26, 1–14. Available online: http://ijcjournal.org/ (accessed on 22 October 2021).
Electronics 2021, 10, 2673 20 of 20
7. Manaa, M.E.; Hadi, Z.G. Scalable and robust cryptography approach using cloud computing. J. Discret. Math. Sci. Cryptogr. 2020,
23, 1439–1445. [CrossRef]
8. Madhavi, G.; Samatha, J. Secure data storage and access of data in cloud using Elliptic curve cryptography. IEEE J. 2020, 11.
Available online: www.jespublication.com (accessed on 22 October 2021).
9. Sridharan, S.; Arokiasamy, A. Effective secure data storage in cloud by using ecc algorithm. Middle-East J. Sci. Res. 2017, 25,
117–127. [CrossRef]
10. Selvam, J.M.; Srivaramangai, P. Time complexity analysis of cloud authentications and data security: Polynomial based hashing
and elliptic curve cryptography. Int. J. Anal. Exp. Modal Anal. 2020, 12, 850–860.
11. Manaa, M.E. Data encryption scheme for large data scale in cloud computing. J. Telecommun. Electron. Comput. Eng. 2017, 9, 1–5.
Available online: https://jtec.utem.edu.my/jtec/article/view/2759 (accessed on 22 October 2021).
12. Astuti, N.R.D.P.; Aribowo, E.; Saputra, E. Data security improvements on cloud computing using cryptography and steganogra-
phy. IOP Conf. Series Mater. Sci. Eng. 2020, 821, 012041. [CrossRef]
13. Awad, W.S. A framework for improving information security using cloud computing. Int. J. Adv. Res. Eng. Technol. 2020, 11,
264–280. [CrossRef]
14. Kumar, V.; Ahmad, M.; Kumari, A. A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted
TMIS. Telemat. Inform. 2018, 38, 100–117. [CrossRef]
15. Singla, S.; Singh, J. Cloud computing security using encryption technique. Int. J. Adv. Res. Comput. Eng. Technol. 2013, 2, 673.
16. Almorsy, M.; Grundy, J.; Müller, I. An analysis of the cloud computing security problem. arXiv 2016, arXiv:1609.01107.
17. Jena, O.P.; Tripathy, A.; Swagatam, S.; Rath, S. Dual encryption model for preserving privacy in cloud computing. Adv. Math. Sci.
J. 2020, 9, 6667–6678. [CrossRef]
18. Arockia, P.; Dharani, N.; Aiswarya, R.; Shailesh, P. Cloud data security using elliptic curve cryptography. Int. Res. J. Eng. Technol.
2017, 4, 32–36.
19. Li, Y.; Gai, K.; Qiu, L.; Qiu, M.; Zhao, H. Intelligent cryptography approach for secure distributed big data storage in cloud
computing. Inf. Sci. 2017, 387, 103–115. [CrossRef]
20. Saeed, Z.R.; Ayop, Z.; Azma, N.; Rizuan Baharon, M. Improved cloud storage security of using three layers cryptography
algorithms. Int. J. Comput. Sci. Inf. Secur. 2018, 16, 34–39.
21. Al-Dhuraibi, Y.; Paraiso, F.; Djarallah, N.; Merle, P. Elasticity in cloud computing: State of the art and research challenges. IEEE
Trans. Serv. Comput. 2017, 11, 430–447. [CrossRef]
22. Hosam, O.; Ahmad, M.H. Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. Int. J.
Comput. Sci. Eng. 2019, 19, 153. [CrossRef]
23. Shantha, A.; Renita, J.; Edna, E.N. Analysis and implementation of ECC algorithm in lightweight device. In Proceedings of the
2019 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 4–6 April 2019; pp. 305–309.
[CrossRef]
24. Varghese, S.; Vigila, S.M.C. A varied approach to attribute based access model for secure storage in cloud. In Proceedings of the
2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore,
India, 17–18 March 2017; pp. 1–4. [CrossRef]
25. Hodowu, D.K.M.; Korda, D.R.; Ansong, E.D. An enhancement of data security in cloud computing with an implementation of a
two-level cryptographic technique, using AES and ECC algorithm. Int. J. Eng. Res. Technol. 2020, 9, 639–650.
26. Lee, B.-H.; Dewi, E.K.; Wajdi, M.F. Data security in cloud computing using AES under HEROKU cloud. In Proceedings of the
2018 27th Wireless and Optical Communication Conference (WOCC), Hualien, Taiwan, 30 April–1 May 2018; pp. 1–5. [CrossRef]
27. Zhu, Y.; Fu, A.; Yu, S.; Yu, Y.; Li, S.; Chen, Z. New algorithm for secure outsourcing of modular exponentiation with optimal
checkability based on single untrusted server. In Proceedings of the 2018 IEEE International Conference on Communications
(ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [CrossRef]
28. Bhardwaj, K.; Chaudhary, S. Implementation of elliptic curve cryptography in ‘C’. Int. J. Emerg. Technol. 2012, 3, 38–51.
29. Ogiela, U. Cognitive cryptography for data security in cloud computing. Concurr. Comput. Pr. Exp. 2019, 32, e5557. [CrossRef]
30. Sood, S.K. A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 2012, 35, 1831–1838.
[CrossRef]
31. Mendonca, S.N. Data security in cloud using AES. Int. J. Eng. Res. Technol. 2018, 7. [CrossRef]
32. Suresha, R.G. Enhancing security in cloud storage using ecc algorithm. Int. J. Sci. Res. 2013, 2–8. Available online: https:
//www.ijsr.net/archive/v2i7/MDIwMTM3NA==.pdf (accessed on 22 October 2021).
33. Abbas, S.; Maryoosh, A.A. Improving data storage security in cloud computing using elliptic curve cryptography. IOSR J. Comput.
Eng. 2015, 17, 48–53.
34. Barati, M.; Aujla, G.S.; Llanos, J.T.; Duodu, K.A.; Rana, O.F.; Carr, M.; Rajan, R. Privacy-Aware cloud auditing for gdpr compliance
verification in online healthcare. IEEE Trans. Ind. Inform. 2021, 1. [CrossRef]
35. Mahto, D.; Yadav, D.K. RSA and ECC: A comparative analysis. Int. J. Appl. Eng. Res. 2017, 12, 9053–9061.
36. Vidakovic, D.; Parezanovic, D. Generating keys in elliptic curve cryptosystems. arXiv 2013, arXiv:1309.0245.