0% found this document useful (0 votes)
11 views26 pages

ART-Abiodun-Analysis of A Double Stage Encryçption Scheme-2023

Uploaded by

alexandra.godoy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views26 pages

ART-Abiodun-Analysis of A Double Stage Encryçption Scheme-2023

Uploaded by

alexandra.godoy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Journal of Library and Information Studies 21:2 (December 2023)pp.

1-26
https://doi.org/10.6182/jlis.202312_21(2).001

Analysis of a Double-stage Encryption Scheme Using


Hybrid Cryptography to Enhance Data Security in
Cloud Computing Systems
Moses Kazeem Abiodun1, Agbotiname Lucky Imoize2,3,
Joseph Bamidele Awotunde4, Cheng-Chi Lee5,6,7,
Abidemi Emmanuel Adeniyi8, Ugbaja Chioma9, Chun-Ta Li10

Abstract
Recently, network users have been scared of storing sensitive information, such as bank details,
health records, and other vital information, on the Internet because it is vulnerable to attack by a third
party. Several threat models are impacting the security of the cloud. Having a secure cloud system
will help to be at ease in using cloud computing facilities. This study aims at providing a cryptography
approach to eliminating the vulnerabilities in the cloud-based system, and making access and data
storage in the cloud very safe. The system uses Rivest-Shamir-Adleman (RSA) to encrypt files and the
Advanced Encryption Standard (AES) key to encrypt the encrypted files. The hash function is used
for extra key security, and Python programming language was used to implement the system, and for
cloud storage, MongoDB was used. Generally, results indicate that the Double Stage Encryption (DSE)
takes an average time for encryption of 83% and decryption of 75% compared to RSA and AES singly.
The RSA is 68% faster than AES during the encryption process, but there is no significant difference
between the two during decryption. The Avalanche effect testing showed the DSE to be 17% higher
than singly testing AES and RSA, which implies it is more secure than RSA and AES as single
encryption schemes. Therefore, the study recommends using DSE to secure valuable data on the cloud.
Keywords: Cloud Computing; Cryptography; Security and Privacy; Rivest-Shamir-Adleman;
Advanced Encryption Standard

1,9
Department of Computer Science, Landmark University, Omu-Aran, Nigeria
2
Department of Electrical and Electronics Engineering, University of Lagos, Lagos, Nigeria
3
Department of Electrical Engineering and Information Technology, Ruhr University, Bochum, Germany
4
Department of Computer Science, University of Ilorin, Ilorin, Nigeria
5
Research and Development Center for Physical Education, Health, and Information Technology,
College of Education, Fu Jen Catholic University, New Taipei, Taiwan
6
Department of Library and Information Science, Fu Jen Catholic University, New Taipei, Taiwan
7
Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan
8
Department of Computer Science, Precious Cornerstone University, Ibadan, Nigeria
10
Program of Artificial Intelligence and Information Security, Fu Jen Catholic University, New Taipei, Taiwan
* Corresponding Author: Cheng-Chi Lee, E-mail: [email protected]

1
Journal of Library and Information Studies 21:2 (December 2023)

1. Introduction Many researchers have inspired the need to


ensure cloud computing is secure, and there are
In recent years, there is a growing interest
various communications protocols for developing
in information analysis as a research theme.
different cloud computing models. One of the
Various security measures ensure the safety and
most important ways to secure cloud computing
security of user data. Cloud computing requires
is the cryptographic algorithms that protect data
strong security mechanisms to ensure that users
and information in cloud computing databases.
can use the technology safely. Thanks to various
This can reduce the number of attackers in a cloud
security measures, enabling a unified perspective
computing environment. However, it has not been
within this procedure. Thus, end-user security
adequately studied that using hybrid security
and privacy must be taken seriously in order to
measures to store data in databases significantly
transmit critical user data and information for
reduces intruders in cloud computing.
various decision-making needs such as image
Numerous models have been presented to
processing, medical examination, target tracking,
analyze and handle attacks and intruders in cloud
and risk analysis (Jimoh et al., 2022). Security and
computing, like intrusion detection, cryptography
privacy measurements must be taken seriously to
(AbdulRaheem et al., 2021; Meshram, Ibrahim
enhance and significantly improve performance within
et al., 2022; Selvanayagam et al., 2018), and
cloud computing systems (Imoize et al., 2020).
steganography. These methods, which concentrate
Computing services, including software,
on various traits based on the demands of the
storage, databases, apps, networking, and IT
industry, have been used worldwide.
resource analytics, are key examples of cloud
Cryptography is a technique for protecting
computing. Infrastructure-as-a-Service (IaaS),
information from unauthorized parties (Abikoye
Platform-as-a-Service (PaaS), and Software-as-
et al., 2023). Cryptography aims to safeguard
a-Service (SaaS) are typical examples of services
and maintain the security of information and data
accessible online (Abiodun, Adeniyi et al., 2022;
from unauthorized users (Meshram et al., 2023).
Mohammend & Zebaree, 2021; Selvanayagam et
Symmetric and asymmetric algorithms, hashing,
al., 2018). One can easily use low-cost resources
blowfish, and elliptical curve cryptography
that are highly adaptable and effective thanks to
have been reported. Examples of cryptographic
cloud computing (Meshram, Ibrahim et al., 2022).
methods include Data Encryption Standards (DES)
Meanwhile, researchers have long been troubled
and Advanced Encryption Standards (AES). These
by how to secure cloud computing servers from
techniques are used to protect cloud file storage.
attackers and intruders. This has reduced the
In order to protect data and information on cloud
usability and confidentiality of the users in storing
computing platforms, this study suggests a hybrid
critical data and information on a cloud computing
cryptography model.
database. To this end, a hybrid cryptography
High scalability, confidentiality, and simple
mechanism should be considered in order to
information accessibility over the Internet are all
secure the data in a cloud computing environment.
features of cloud computing. Despite the robust

2
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

security of the standard encryption scheme, the and reliability and security are complementary
most concerning issue is the routine side-channel (Abiodun, Awotunde et al., 2022).
assault for collecting one’s private and sensitive The most modern and sophisticated elliptic
images, audio, and video. In addition to a targeted curve cryptography (ECC) method is called the
Virtual Machine (VM), a malicious VM can elliptic curve (EC). EC is frequently employed
extract all data, and addressing this issue is the to enhance the safety of public communication
motivation for this paper. systems and to permit specified individuals with
The key contributions can be summed up verified characteristics to participate in the current
as follows: digital society, leveraging Multi-Cloud Data
(1) The study presents a hybrid cryptographic Encryption (MDE) (Ullah et al., 2023). Social
algorithm for image encryption that uses networking, the cloud, and the Internet of Things
RSA and AES for various files-updatable sector are just a few of the technologies that MDE
cryptography. users apply. The entire environment must preserve
(2) The study provides a robust crypto-architecture the users’ safety and privacy regardless of the tool
for the highlighted model, including key they are using (Ghiasi et al., 2023).
management, encryption, data integrity, digital Learning cryptography is essential since
signatures, and decryption modules. insecure networks expose information to data
(3) The study conducted an assessment of transmission, mugging, and hacking via an open
the highlighted model using a variety of network. As a result, understanding cryptography
performance indicators, including temporal is crucial to data security (Kumbhare et al., 2022;
complexity and computational overhead. Kumar et al., 2022). A digital signature, the
integrity of cryptographic data, the authentication
1.1 Motivation procedure, mathematical computations to
Given the importance of the data stored determine the signature, and the sender depend on
in the cloud, safekeeping is vital in the cloud the recipient’s address (Ahmed & Barukab, 2022;
computing environment. The information may Imoize et al., 2020). To illustrate the differences
be sensitive and highly attackable. As a result, between the two processes, the stated solution
data management needs to be entirely reliable is compared to the approach currently used
(AbdulRaheem et al., 2022). Cloud data must by Elliptic Curve Digital Signature Algorithm
be protected from harmful intrusions (Abiodun, (ECDSA) during the signature and verification
Adeniyi et al., 2022; Ayo et al., 2023; Rana et processes (Shukla et al., 2022; Ullah et al., 2023).
al., 2022). Concerns about data availability, High-tech equipment is frequently utilized in
confidentiality, and integrity are raised, and there cloud computing to store various data. Several
is a need to address these prevalent concerns. Data kinds of medical images include X-rays, MRIs,
confidentiality is lost as a result of unauthorized and CT scans. Such images are necessary for
access to information. Failure of cloud services diagnosing a variety of ailments by doctors. These
compromises data availability and integrity, images must be transmitted through various

3
Journal of Library and Information Studies 21:2 (December 2023)

channels, including the Internet. Their privacy will the authors described a method that interacted
be threatened by harmful attacks when sharing with the destination over a protected channel
photographs online. after encrypting the plaintext using ECC. The
Consequently, research into and implementation same plaintext was utilized simultaneously with
of medical data encryption has become crucial. The Message-Digest algorithm 5 (MD5) to generate
necessity of protecting patient privacy for medical the hash result. This value was transmitted to
photographs and the widespread reproduction of the destination while encrypted with DUAL
such photos in most medical facilities have served RSA. ECC and DUAL RSA are two asymmetric
as strong motivators for researchers. In order encryption algorithms that take advantage of extra
to connect patients and doctors with different time for encryption to achieve integrity and make
specializations and obtain a quick diagnosis, it difficult for hackers to retrieve text from an
medical applications and solutions have been encrypted file.
widely employed in addition to actual medical A hybrid method utilizing symmetric and
facilities. Patients cannot use such applications asymmetric techniques was employed (Zhu,
unless they are confident that their information 2011). The key and digital signature were
privacy has been protected (Abd Elminaam et encrypted with ECC, a component of the AES
al., 2022). approach, while the content was encrypted with
The remaining sections of the paper are AES. The key-dependent Advanced Encryption
structured as follows: The review of related Standard algorithm (KAES) key, which belonged
literature is presented in Section 2. The research to the AES family, was only used once by the
technique is covered in Section 3. Section 4 sender. In order to obtain the original data,
gives details of implementations, while Section signature verification was done at the receiver’s
5 presents the discussion of the results. Finally, end. This system’s level of security was quite
Section 6 provides a conclusion of the study with weak. A hybrid two-phase cryptography technique
key findings. called two-phase hybrid cryptography algorithm
(THCA) was used for wireless networks (Rizk &
2. Review of Related Work Alkady, 2015). By using this method, the plaintext
The authors discuss the rise of cloud computing is separated into two halves. The AES method
and its safety anxieties, including data theft, was used to encrypt the first section; then the
data breaks, insecure Application Programming ECC algorithm to encrypt the key. Both of these
Interfaces (APIs), account theft, and denial of cryptographic techniques are asymmetric. The
service (Meshram, Imoize et al., 2022; Meshram RSA technique was used to encrypt the second
et al., 2021). Like Garg et al. (2017), several half. The MD5 technique was employed to ensure
researchers have investigated numerous aspects that the data was secure. For decryption and
of cloud security, such as basic protection, cross- retrieval of the plaintext, the previous processes
site programming, SQL injection, and man-in-the- were reversed.
middle assaults. In Subasree and Sakthivel (2010),

4
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

P a v a n i a n d Tr i n a t h a (2019) p r o p o s e d a Ti m o t h y a n d S a n t r a (2017) p r o p o s e d
routing protocol centered on clusters to secure the symmetric and asymmetric encryption techniques
wireless sensor networks. A particle swarm that to protect cloud computing security. The Blowfish
adapts optimization (APSO) improves the firefly algorithm was used to encrypt the file that was
algorithm during data transmission. The encrypted uploaded to the cloud, and the RSA technique was
data was sent to the sink node within the network. used for the secret key generated by the Blowfish
The required transmission of the message was procedure. A secure hash algorithm-2 (SHA-2)
allocated into two portions. The AES encryption generated the message digit on the encrypted file.
algorithm was utilized for the first, while the The previously prepared message digit was then
Rivest cipher 6 (RC6) algorithm was used for the put through the digital signature process (DSA).
second. Data integrity was also achieved using The authors devised and implemented a
the MD5 method. The Secured Cluster-Based security mechanism for cloud storage (Chueh &
Routing Protocol (SCBRP) aims to minimize Sun, 2017). In order to keep data securely in the
energy usage per node to extend the network’s cloud, the method combines the AES encryption
lifetime. The SCBRP was designed with energy- technology with a third-party auditor (TPA). A
efficient clustering, safe routing, and security user or a Cryptographic Service Provider (CSP)
verification. Before data was uploaded to could not decrypt the encrypted file because the
cloud storage, it was encrypted using various encryption key was kept in the TPA. This solution
cryptography algorithms. improved key management and increased the
Bansal and Agrawal (2017) described a security of verification. The user can access the
method for securely storing information in cloud encrypted file and the encryption key through
storage. The method uses a unique key to secure the CSP and TPA. The master key might then be
cloud storage access. In order to increase security obtained by decrypting the encryption key with
during authentication, image matching was used. his specified password. Ultimately, the user could
The user can upload their file using the cloud unlock the encrypted file and get the original.
database storage. The file comprising sensitive Because the key had to be encrypted before being
user information was divided into various blocks placed in the TPA, this method incurred increased
choosing particular bits using ECC techniques overhead and cost complexity.
to encrypt the blocks. This help secures the data For file security, a self-encryption system’s
in a cloud-based storage system. Thus, the file design and implementation were suggested
is securely stored on the cloud. This method (Han et al., 2016). Before being implemented
involved selecting the metadata from each block, in the cloud, the scheme was used in the text. It
encrypting it with ECC, and then appending it employed the eXclusive OR (XOR) method to
to the end of the file. The data in the full file is partition the plaintext and encrypted text into
not sufficiently protected by this method. Only 1024-bit chunks. This technique was considered
checking to determine if data has changed or not problematic due to the risk of storing the key in
may be necessary. the database. Therefore, Li et al. (2017) proposed a

5
Journal of Library and Information Studies 21:2 (December 2023)

Security-Aware Efficient Distributed Storage (SA- edge computing environment (Tripathy et al.,
EDS) using three algorithms called Alternative 2022). To ensure healthcare data’s safety, privacy,
Data Distribution (AD2). The study split up the confidentiality, integrity, and processing mode, it is
plaintext needed to be stored on the cloud servers. essential to keep it safe from hackers. Ogundokun
The Secure Efficient Data Distributions (SED2) et al. (2021) proposed a New Lightweight Speck
provided a plaintext with two distinct ciphertexts Cryptographic Algorithm to enhance the security
as output in the second technique. The third of high-performance computing for patient
algorithm, Efficient Data Conflation (EDCon), information. The findings indicated a high degree
was combined with two other encryption messages of security and an apparent improvement in the
to enable users to retrieve text from disseminated time it requires to encode data and protect it is
cloud networks. After accepting the two encoded attainable compared to the cryptographic methods
text fragments and the key, it provided the frequently used in cloud computing.
plaintext. The complexity and overhead of this Similar proposals for lightweight encryption
method were increased by using three methods. centered on the Tiny Encryption Algorithm
Rahardjo and Shidik (2017) proposed a (TEA) for an IoT-driven setting were made by
self-encryption system for file security before AbdulRaheem et al. (2021). Instead of using
uploading the text to the cloud. The XOR hardware implementation, increase speed from a
method separated the plaintext and encrypted software standpoint. The proposed technique was
text into 1024-bit pieces. It also used a database utilized to shorten the encryption process on the
to keep track of the file’s ID, which enclosed IoT platform while maintaining the efficiency-
both plaintext and a key. In order to obtain security trade-off. The suggested study compared
the plaintext, the key was acquired from the favourably to existing studies on lightweight start-
databank during the decryption process. Loading ups regarding memory use, time complexity, and
the key in the databank was seen as a flaw in correctness. Results indicate that the technique
this technique since it was vulnerable to attack. is more effective and safer in an IoT-driven
The authors presented a lightweight Speck setup, making it better suited for data security.
encryption technique (AbdulRaheem et al., 2022) Chakrabarti and Suresh Babu (2021) proposed a
for Smart Healthcare Systems (SHS) medical second-stage encryption technique for interactive
data. The suggested approach reduces the time content protection using a pseudorandom
required for encoding on the SHS framework generation method. The first step encodes
while maintaining the swap between safety and audiovisual data using a symmetrical public
effectiveness. The suggested structure is compared key ciphertext-1. Next, an asymmetric private
to current attempts on lightweight start-ups in key created randomly is used to encrypt the
regard to accuracy, memory utilization, processing ciphertext-1 in the cloud. Anyone who obtains
time, and specificity. Outcomes demonstrate that the cipher text cannot decrypt the contents of
the procedure is extremely protected, efficient, the multimedia files. The proposed technique
and better suited for data security in an IoT-driven is a cloud computing security measure broadly

6
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

applicable due to its low complexity and blowfish, RC6, and Byte Rotation Algorithm
simple implementation. (BRA) are employed in the study to secure data
AbdulRaheem et al. (2021) suggested using a in blocks. For all techniques, the key size is 128
Crypto-Stegno method to protect medical data in bits. LSB steganography is presented for key data
the Internet of Medical Things (IoMT) platforms. protection. The key data defines which technique
The study tested the scheme on medical datasets and key are to be used to encode a specific
and found astounding outcomes in perceptibility portion of the file, and the file is split into eight
quality, extreme resistance to data loss, embedding portions. Every component of the file is encoded
capabilities, and safekeeping. The projected model using a unique algorithm. The multithreading
was a real plan for savvy and effective medical approach is used to encrypt every component of
data on the IoMT platform. the file simultaneously. Data encryption keys are
Abod et al. (2020) introduced a new technique placed using the LSB approach into the cover
for hiding hybrid steganography and quantum image. Steganography (Stego) image is sent
cryptography messages in graphics. The output through email to a verified recipient. The reverse
i s e n c r y p t e d u s i n g q u a n t u m o n e-t i m e p a d encryption procedure is used to decrypt files.
encryption after the least significant bit (LSB) Based on user demand, cloud computing
substitution is used to conceal hidden messages provides users with infrastructure, platforms,
within cover images of three bands (Red, Green, and software as services over the internet
and Blue). This hybrid approach is stimulated economically. However, potential data breaches
and put into practice. The models are explicitly could result from storing sensitive or confidential
presented and put to the test. Additionally, to find data on cloud servers and infrastructure that
LSB steganography in images, the test analysis customers do not control or maintain. Security is
uses the steganalysis application StegExpose. thus the primary issue that restricts the benefits of
The experimental results demonstrated that cloud computing. In order to accomplish the level
image concealment is consistently secure and of security required in the cloud, cryptography is
untraceable, and as a result, the suggested new essential. In addition, hybrid cryptography leverages
hybrid model offers a sufficient level of security. the benefit of combining multiple cryptographic
By using powerful, cutting-edge steganalysis methods to improve overall efficiency and
tools, it was discovered that the suggested availability (Murad & Rahouma, 2021).
system’s low payload threshold results in a high The quick rise of cloud services became
margin of communication security and safety. outstanding due to the rapid development of
Although each file had the whole content of the cloud computing technologies. However, today’s
material as embedded text, no payload files were society faces difficult issues with data security.
found (0% detections). The security of the cloud and effective cloud
Maitri and Verma (2016) developed a new implementation across the network are the key
security approach using steganography and the concerns with cloud computing. Confidentiality,
symmetric key cryptography algorithm. AES, authentication, accessibility, data recovery, and

7
Journal of Library and Information Studies 21:2 (December 2023)

data integrity are the security models used in There are digital signatures in each pair of
the cloud (Sajay et al., 2019). These concerns keys that are used to know the public key that
encompassed cloud computing hurdles, cloud belongs to a private key. The work of this digital
computing security issues, and cloud computing signature is to certify the integrity of the user.
services. Enhancing cloud data security has After the encryption with RSA, the data is then
become a top priority in the modern era, and using encrypted with AES.
appropriate encryption methods while storing The AES is a symmetric cryptography
data on the cloud is the answer to this problem. algorithm. This means AES uses a single key for
The three most important factors for cloud both encoding and decoding, and the key can only
computing are (a) data secrecy, (b) data integrity, be generated and provided by the user. Before the
(c) availability, and (d) confidentiality (Abiodun, encryption, a series of actions, such as substitution,
Adeniyi et al., 2022; Erondu et al., 2022; Sajay shifting bytes, and rotation, are carried out. As a
et al., 2019). Hence, a suitable approach to data result, there are different bits of AES keys. These
security and privacy on cloud database storage has 128 bits, randomly chosen, are used in this case as
been presented. a password (key) of 16 characters or less that are
needed for the AES. Figure 1 shows the double
3. Materials and Methods encryption phases.
The cloud is a computing and data paradigm The encryption process is divided into 7 steps:
in which digital data is kept in conceptual streams. Step 1: The user inputs the files to be encrypted.
A hosting company manages the physical layout. Step 2: The user inputs the password. The
These online backup companies are responsible password is a prerequisite for encryption
for keeping the information protected, encrypted, and acts as the AES 128-bit key.
and operating, as well as the physical ecosystem. Step 3: The user generates RSA keys (public
The encryption process: and private keys)
The data is first encrypted with RSA. The Step 4: The file is then encrypted using RSA.
RSA is an asymmetric encryption algorithm Step 5: The file already encrypted with RSA
that uses private and public keys obtained using is again encrypted using the AES
two very large prime numbers for encoding and algorithm, hence the double encryption.
decoding. When the file is ready to be encrypted, Step 6: The system checks and prompts you
RSA requires the private key to be present before if any more files need to be encrypted.
encryption can be done. Likewise, when a file If there are more files, the process is
is ready to be decrypted, RSA requires the started again for the new file to be
public key that relates to the previously used encrypted. Else it stops.
private key to be present before decryption can Step 7: The encrypted files are uploaded to
be performed. the cloud.

8
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

Figure 1. Double Encryption Phases

Start

User inputs
User inputs encryption
unencrypted key
file(s)
User
generates
RSA keys

User
double-
encrypt file(s)

Double
encrypted file(s)
ready to be stored
on the cloud

Stop

Figure 2 displays the double decryption Step 4: AES decryption is first performed on
phases for the proposed system. The steps of the the encrypted file then RSA decryption
decryption process are explained below: is performed.
The decryption process is divided into 6 steps: Step 5: T h e s y s t e m c h e c k s a n d p r o m p t s
Step 1: T h e u s e r i n p u t s t h e f i l e s t o you if there are any more files to be
be decrypted. decrypted. If there are more files, the
Step 2: T h e u s e r i n p u t s t h e p a s s w o r d. process is started again for the new file
The password is a prerequisite for to be decrypted else, it stops.
encryption and acts as the AES 128- Step 6: The decrypted files are allowed by
bit key. the authorized user then the files are
Step 3: System checks for the correct RSA downloaded from the cloud.
p r i v a t e k e y. I f i t i s c o r r e c t, t h e The system user interface is divided into a
decryption process continues, else the register, login, and file manager. First, the register
process is truncated. section is created for new users. This would enable

9
Journal of Library and Information Studies 21:2 (December 2023)

Figure 2. Double Decryption Phases

Start

User inputs User inputs


encrypted file(s) previous key

System clock
availability of RSA
keys

Double decryption
process on file(s)

Decrypted files
ready for
download

Stop

them to create an account and use the system. The of hybrid cryptography. Attacks through side
login section is for already existing users. In this channels can target any component. But the
form, username and password are required. Then security level should be raised using the trivium
the file manager is the section where the main cipher before using AES. This gain is achieved
events of the system occur. The file manager’s by avoiding side-channel attacks like differential
actions are file management, viewing existing power analysis (DPA). The study uses documents,
files, uploading new files, encrypting, decrypting, images and videos with different files size to
downloading, and deleting files. The proposed simulate the performance of RSA, AES, and DSE
model framework is displayed in Figure 3. in terms of computational time and security. The
encryption time and decryption time from the
input files were analyzed to determine which
4. Results
algorithms performed efficiently in terms of
The adapted model uses symmetric key computational cost. The hybrid architecture lessen
encryption with both RSA and AES as part the amount of encrypted data with an encryption

10
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

Figure 3. Flowchart of the System User Interface

Start

Login

Already
Register an existing
user?
No

Yes

File manager

End

key. As a result, the volume of data exposed by of varying contents and sizes were encrypted
one significant compromise has decreased. This to test their performance. The algorithms were
implies that most widely used attacks that require implemented in Python and were tested to
a lot of data, such as well-known “plain text” and compare their performance. Next, the user chooses
“algebraic” attacks, would fail with the suggested the files to encrypt and upload to the database.
approach. The asymmetric private key created at Different types of files can be selected, ranging
random is used to encrypt the ciphertext-1 once from audio to video, text files, etc. When
more in the cloud. Anyone who obtains the cipher the file has been uploaded, the process of
text cannot decrypt the contents of the multimedia encrypting begins, and then the encrypted file is
files. The proposed technique is a cloud computing sent to the cloud. Figure 4 shows the interface
security measure that is broadly applicable due to to upload a file.
its low complexity and simple implementation. Here, one can choose to delete or decrypt
Double-stage encryption using RSA and AES your already encrypted files. Figure 5 shows the
algorithms was implemented, and input files interface and decryption for the upload file.

11
Journal of Library and Information Studies 21:2 (December 2023)

Figure 4. Upload File Interface

Figure 5. The Interface of Deletion and Decryption

4.1 Performance evaluation time, respectively, and AES has improved


Table 1 presents document files encoding and encryption and decryption time performance with
decoding time for the selected DSE, RSA, and 43.070 and 78.584, respectively.
AES Algorithms. The results in Table 1 show that Table 1 displays the data analysis of the
the presented double-stage encryption has the encryption time and decryption time obtained
highest encryption and decryption time compared during the encryption and decryption of document
with RSA and AES, respectively. The model has type of various file size using RSA, AES and DES.
1513.300 and 1289.600 time required for encoding Figure 6 and Figure 7 displayed the encryption
and decoding. At the same time, the RSA gives and decryption of the text file for the double
10.291 and 77.154 encryption and decryption cryptography model, RSA, and AES, respectively.

12
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

Table 1. Text Files Encryption and Decryption Time for Double Stage Encryption (DSE),
Rivest-Shamir-Adleman (RSA), and Advanced Encryption Standard (AES)
Double encryption
RSA AES
(RSA & AES)
File size
Encryption Decryption Encryption Decryption Encryption Decryption
time (ms) time (ms) time (ms) time (ms) time (ms) time (ms)
10KB 1.414 5.470 0.319 2.255 1.076 2.277
20KB 2.820 10.940 0.555 4.052 2.119 3.100
110KB 15.057 60.176 2.780 20.860 12.917 27.780
340KB 45.931 185.997 7.099 53.143 29.278 61.614
630KB 77.491 344.642 13.953 105.230 59.934 92.569
780KB 98.538 416.190 18.112 132.997 71.736 115.042
1.2MB 172.548 677.372 29.222 221.542 124.403 247.703
Mean 59.114 242.970 10.291 77.154 43.070 78.584

Figure 6. The Encryption Time for Document Files

In particular, Figure 6 shows that double-stage there is no significant difference between AES and
encryption consumes more time and complexity RSA decryption time complexity.
while encrypting document files of various file Table 2 shows the video files for encryption
sizes. As revealed in Figure 7, double-stage and decryption time for DSE, RSA, and AES
encryption has a higher time complexity, while Algorithms. The results in Table 2 demonstrate

13
Journal of Library and Information Studies 21:2 (December 2023)

Figure 7. The Decryption Time for Document Files

Table 2. Video Files Encryption and Decryption time for Double Stage Encryption (DSE),
Rivest-Shamir-Adleman (RSA), and Advanced Encryption Standard (AES)
Double encryption
RSA AES
(RSA & AES)
File size
Encryption Decryption Encryption Decryption Encryption Decryption
time (ms) time (ms) time (ms) time (ms) time (ms) time (ms)
780KB 109.407 1.732 11.640 2.817 11.640 2.817
2.38MB 349.754 12.272 42.612 16.622 42.612 16.622
3.0MB 441.522 48.935 15.401 48.236 15.401 48.236
5.46MB 799.773 28.567 32.340 23.777 32.340 23.777
8.23MB 1311.727 61.485 32.095 22.039 32.095 22.039
Mean 602.437 30.598 26.818 22.698 26.818 22.698

that the double-stage encryption has the highest AES has the same encryption and decryption time
encryption and decryption time compared to RSA with 26.800 and 22.700, respectively.
and AES. For example, the model has 602.400 and Figure 8 and Figure 9 displayed the encryption
30.600 encryption and decryption time, respectively. and decryption of the video file for the double
At the same time, the RSA gives 26.800 and 22.700 cryptography model, RSA, and AES, respectively.
encryption and decryption time, respectively, and Figure 8 shows that RSA and AES consume

14
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

Figure 8. The Encryption Time for Video Files

Figure 9. The Decryption Time for Video Files

lesser time complexity during the encryption, encryption consumes more run-time during the
while double-stage encryption uses more time decryption of video files compared to the two
complexity. Figure 9 shows that double-stage other algorithms.

15
Journal of Library and Information Studies 21:2 (December 2023)

Table 3 shows the image files for encryption decryption time, respectively. At the same time,
and decryption time for DSE, RSA, and AES the RSA gives 26.600 and 208.700 encryption
Algorithms. The results in Table 3 show that and decryption time, respectively, and AES has
the double-stage encryption has the highest encryption and decryption time of 26.800 and
encryption and decryption time when compared 22.700, respectively.
with RSA and AES, respectively. For example, the Figure 10 and Figure 11 show the decoding
model has 184.400 and 103.000 encryption and and encryption of image files for the double

Table 3. Image Files Encryption and Decryption time for Double Stage Encryption (DSE),
Rivest-Shamir-Adleman (RSA) and Advanced Encryption Standard (AES)
Double encryption
RSA AES
(RSA & AES)
File size
Encryption Decryption Encryption Decryption Encryption Decryption
time (ms) time (ms) time (ms) time (ms) time (ms) time (ms)
164KB 23.252 31.92 4.281 31.92 11.64 2.817
224KB 31.771 43.43 5.928 43.43 42.612 16.622
411KB 53.879 73.232 9.7588 73.232 15.401 48.236
1.4MB 212.411 304.829 37.459 304.829 32.34 23.777
2.92MB 600.795 61.485 75.694 590.279 32.095 22.039
Mean 184.422 102.979 26.624 208.738 26.818 22.698

Figure 10. The Encryption Time for Image Files

16
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

Figure 11. The Decryption Time for Image Files

cryptography model, RSA, and AES, respectively. Table 6 shows that the DSE has the highest
Figure 10 and Figure 11 show that DSE trade- average avalanche effect. This denotes that double-
off time complexity for security performed better. stage encryption is more secure than the other two
Figure 10 shows that RSA and AES consume algorithms. This can be deduced from the various
lesser time complexity during the encryption, tables and graphs that double-stage encryption
while double-stage encryption uses more time trade-off time complexity to its security which
complexity. Figure 11 shows that double-stage was the goal of this study to improve the security
encryption uses lesser run-time during the of cloud files. Double-stage encryption combines
decryption of image files compared to the two symmetric and asymmetric encryptions to enhance
other algorithms. the security of files in the cloud environment.
This study was carried out to combine AES
4.2 Comparison of the highlighted algorithms and RSA to form a DSE to mitigate the issue of
and file types safekeeping and privacy in cloud environment.
Table 4 shows that DSE consumes more The various tables and graphical analyses in this
average time complexity during the encryption study show that the DSE takes a long time on
process for all the file types used compared to average for encryption 83% and decryption 75%
other algorithms. compared to RSA and AES singly. The RSA
Table 5 shows that DSE uses more time is 68% faster than AES during the encryption
during each file type’s decryption than RSA process, but there is no significant difference
and AES. between the two during decryption. The Avalanche

17
Journal of Library and Information Studies 21:2 (December 2023)

Table 4. Comparison of the Average Encryption Time of the Algorithms


Files RSA AES DSE
Document files 10.291 43.070 59.114
Image files 26.624 26.818 184.422
Video files 26.818 26.818 602.437

Table 5. Comparison of the Average Decryption Time of the Algorithms


Files RSA AES DSE
Document files 77.154 78.584 242.970
Image files 208.738 22.618 102.979
Video files 22.698 22.698 30.598

Table 6. Comparison of the Overall Average Avalanche Effect


AES RSA DSE
One bit change (%) 40.18 38.97 57.92
Key change (%) 39.22 38.82 51.58

effect testing showed DSE to be 17% higher strings. This model was implemented to improve
than singly testing AES and RSA, which means cloud security using the Python programming
it is more secure than RSA and AES as single language and cryptographic method. Similar to
encryption schemes. encryption, decryption uses the same methods,
except as an initial step, it requires the encrypted
5. Discussion text as an input, then uses it in the AES decryption
The study presented a suitable hybrid model layer, after which the message has been decrypted
using double-stage encryption and decryption before being sent to the RSA layer for decryption,
to enhance cloud security using RSA and AES and once that bit has been received, compare the bits
cryptography algorithms. Since RSA cryptography and convert them back to their original integer form.
primarily operates on bits, this study employs This is how the multi-layer approach works. This is
input integers N, first converting it to binary and revocable and significantly more effective than other
then using the RSA technique to encrypt each of its encryption methods. Similarly, the AES encryption
bits. Then the second layer of the AES algorithm algorithm’s key creation procedure generates a safe
receives a concatenated version of all these key for both encoding and decoding.

18
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

AES is a symmetric block cipher capable confidence, we will also work to maintain multiple
of encrypting and decrypting data securely. It layers of protection for various types of data in the
uses the same key for both operations. The AES cloud. Additionally, the use of AI-driven solutions
technique is also known as a variable-length key to automate the protection process and give the
block cipher. Since the key does not change and key management and distribution stages a more
is speedier than most encryption techniques, this autonomous aspect will be explored.
is appropriate for various uses. The decryption
and encryption of cloud data have been chosen for 6. Conclusions
text files. Owing to the hybrid method suggested This study highlights the strengths of double
in this study, hacking would be substantially very stage cryptography to secure files in a cloud
difficult for intruders. This hybrid method uses computing context, leveraging the RSA and
encryption algorithms to provide improved storage AES. The aim was to boost file security in the
and security over a cloud environment. More cloud computing environment. RSA and AES
information must be protected using encryption cryptographic algorithms were used separately to
techniques to prevent data attacks from hackers. encrypt and decrypt data sent to the cloud. Also,
The RSA encryption algorithm’s performance is these two algorithms were merged to achieve a
adaptable and secure by design. double-stage encryption scheme used to protect
The security and privacy concerns in the data sent to the cloud to improve data security.
cloud are developed using the AES algorithm. A Based on the various experimental results
symmetric key block is used for both encryption performed on text, image, and video files, it was
and decryption, and it generates the security key. shown that double stage encryption takes a longer
The RSA encryption adds a new layer to cloud amount of time on average for encryption 83%
storage and ensures data secrecy because no and decryption 75% compared to RSA and AES
process stage exposes information in plain text. singly. The RSA is 68% faster than AES during
As the demand for security grows, a trustworthy the encryption process, but there is no significant
authentication system is required to limit illegal difference between the two during decryption.
access and assist secure data. Even though cloud The Avalanche effect testing showed the DSE to
storage offers several advantages, numerous be 17% higher than singly testing AES and RSA.
security concerns still need to be addressed. The Therefore, the DSE scheme is more secure than
efficacy of performance is anticipated to increase RSA and AES as single encryption schemes. This
with the employment of various other algorithms study recommends this approach, combining
in the same procedure. If the security concerns the RSA and AES algorithms for file security in
are addressed, cloud storage solutions for small cloud computing. The purpose of this technology
and large businesses will be the future. In the was to improve data security while increasing
future, using multiple authentication factors to information confidentiality. The drawback of this
give sensitive data even more security will be approach is the computational cost. However,
considered. In order to increase the overall system enhancing the security level of files in the cloud

19
Journal of Library and Information Studies 21:2 (December 2023)

environment is highly pertinent when sending 2022 2nd international mobile, intelligent,
data over an unsecured platform. Implementing and ubiquitous computing conference
a DSE scheme can be complex, and any errors (MIUCC) (pp. 175-182). IEEE. https://doi.
in the implementation can compromise the org/10.1109/MIUCC55081.2022.9781704
system’s security. This complexity can increase AbdulRaheem, M., Awotunde, J. B., Jimoh, R.
the development time and cost of the system. G., & Oladipo, I. D. (2021). An efficient
The DSE scheme may not be scalable for large-
lightweight cryptographic algorithm for
scale distributed systems where multiple users
IoT security. In S. Misra & B. Muhammad-
can access data simultaneously. The scheme may
Bello (Eds.), Communications in computer
require additional mechanisms to manage the
a n d i n f o r m a t i o n s c i e n c e : Vo l . 1350.
access control and encryption keys for each user.
International conference on information and
Data Availability Statement communication technology and applications

The data that support the findings of this paper (p p. 444-456). S p r i n g e r. h t t p s://d o i.
is available upon reasonable request from the org/10.1007/978-3-030-69143-1_34
corresponding author. AbdulRaheem, M., Balogun, G. B., Abiodun, M.
K., Taofeek-Ibrahim, F. A., Tomori, A. R.,
Conflicts of Interest Oladipo, I. D., & Awotunde, J. B. (2021). An
The authors declare no conflict of interest enhanced lightweight speck system for cloud-
related to this work. based smart healthcare. In H. Florez & M. F.
Pollo-Cattaneo (Eds.), Communications in
Acknowledgments computer and information science: Vol. 1455.
Applied informatics. ICAI 2021 (pp. 363-
The work of Agbotiname Lucky Imoize is
376). Springer. https://doi.org/10.1007/978-
supported in part by the Nigerian Petroleum
3-030-89654-6_26
Technology Development Fund (PTDF) and
AbdulRaheem, M., Oladipo, I. D., González-
in part by the German Academic Exchange
Service (DAAD) through the Nigerian-German Briones, A., Awotunde, J. B., Tomori, A.
Postgraduate Program under Grant 57473408. R., & Jimoh, R. G. (2022). An efficient
lightweight speck technique for edge-IoT-
based smart healthcare systems. In A. K.
References
Bhoi, V. H. C. de Albuquerque, S. Nath
Abd Elminaam, D. S., Mousa, M. A. W., & Abd El Sur, & P. Barsocchi (Eds.), 5G IoT and
Fattah, M. (2022). Secure data storage in the edge computing for smart healthcare (pp.
cloud by using DNA and chaos cryptography. 139-162). Academic Press. https://doi.
In A. Bahaa-Eldin, A. AbdelRaouf, N. org/10.1016/B978-0-323-90548-0.00005-X
Shorim, S. Refaat, & S. E. Elbohy (Eds.),

20
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

Abikoye, O. C., Oladipupo, E. T., Imoize, A. L., ECDH for cybersecurity mechanism in
Awotunde, J. B., Lee, C.-C., & Li, C.-T. internet of things. Processes, 10(12), Article
(2023). Securing critical user information 2631. https://doi.org/10.3390/pr10122631
over the internet of medical things platforms Ayo, F. E., Awotunde, J. B., Olalekan, O. A.,
using a hybrid cryptography scheme. Future Imoize, A. L., Li, C.-T., & Lee, C.-C. (2023).
Internet, 15(3), Article 99. https://doi. CBFISKD: A combinatorial-based fuzzy
org/10.3390/fi15030099 inference system for keylogger detection.
Abiodun, M. K., Adeniyi, E. A., Awotunde, Mathematics, 11(8), Article 1899. https://doi.
J. B., Bhoi, A. K., AbdulRaheem, M., & org/10.3390/math11081899
Oladipo, I. D. (2022). A framework for the Bansal, A., & Agrawal, A. (2017). Providing
actualization of green cloud-based design security, integrity and authentication using
for smart cities. In S. Nath Sur, B. E. Balas, ECC algorithm in cloud storage. In 2017
A. K. B h o i, & A. N a y y a r (E d s.), E A I / international conference on computer
Springer innovations in communication communication and informatics (ICCCI)
and computing. IoT and IoE driven smart (pp. 1-5). IEEE. https://doi.org/10.1109/
cities (pp. 163-182). Springer. https://doi. ICCCI.2017.8117749
org/10.1007/978-3-030-82715-1_8 Chakrabarti, S., & Suresh Babu, G. N. K. (2021).
Abiodun, M. K., Awotunde, J. B., Adeniyi, The security enhancement of symmetric
A. E., A d e m u a g u n, D., & A r e m u, D. key crypto mechanism based on double
R. (2022). Securing digital transaction stage secret model. Information Security
using a three-level authentication system. Journal: A Global Perspective, 30(6), 325-
In O. Gervasi, B. Murgante, S. Misra, 341. https://doi.org/10.1080/19393555.202
A. M. A. C. Rocha, & C. Garau (Eds.), 0.1842945
Lecture notes in computer science: Vol. Chueh, J. S., & Sun, M. T. (2017). Design and
13380. I n t e r n a t i o n a l c o n f e re n c e o n implementation of security system for cloud
computational science and its applications storage. In 2017 19th Asia-Pacific network
2022 (pp. 135-148). Springer. https://doi. operations and management symposium
org/10.1007/978-3-031-10542-5_10 (APNOMS) (pp. 129-134). IEEE. https://doi.
Abod, Z. A., Abbas, M. S., & Bermani, A. K. org/10.1109/APNOMS.2017.8094191
(2020). Image security system using hybrid Erondu, U. I., Adebayo, N., Arowolo, M. O., &
cryptosystem. Periodicals of Engineering & Abiodun, M. K. (2022). A review on different
Natural Sciences (PEN), 8(4), 2007-2018. encryption and decryption approaches
A h m e d, A. A., & B a r u k a b, O. M. (2022). for securing data. In A. M. Tyagi (Ed.),
Unforgeable digital signature integrated into Handbook of research on technical, privacy,
lightweight encryption based on effective and security challenges in a modern world

21
Journal of Library and Information Studies 21:2 (December 2023)

(pp. 357-370). https://doi.org/10.4018/978-1- Kumar, V., Malik, N., Singla, J., Jhanjhi, N.
6684-5250-9.ch019 Z., Amsaad, F., & Razaque, A. (2022).
G a r g, P., G o e l, S., & S h a r m a, A. (2017). Light weight authentication scheme for
Security techniques for cloud computing smart home IoT devices. Cryptography,
environment. In P. N. Astya, A. Swaroop, 6(3), Article 37. https://doi.org/10.3390/
V. Sharma, M. Singh, & K. Gupta (Eds.), cryptography6030037
2017 international conference on computing, Kumbhare, A., & Thakur, P. K. (2022). Security
communication and automation (ICCCA) and privacy of biomedical data in IoMT. In
(pp. 771-776). IEEE. https://doi.org/10.1109/ A. Prasanth, D. Lakshmi, R. K. Dhanaraj,
CCAA.2017.8229900 B. Balusamy, & P. C. Sherimon (Eds.),
Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, Cognitive computing for internet of medical
M., Dehghani, M., & Ghadimi, N. (2023). A things (pp. 77-104). Chapman and Hall/CRC.
comprehensive review of cyber-attacks and Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H.
defense mechanisms for improving security (2017). Intelligent cryptography approach
in smart grid energy systems: Past, present for secure distributed big data storage in
and future. Electric Power Systems Research, cloud computing. Information Sciences,
215, Part A, Article 108975. https://doi. 387, 103-115. h t t p s://d o i.o r g/10.1016/
org/10.1016/j.epsr.2022.108975 j.ins.2016.09.005
Han, K., Li, Q., & Deng, Z. (2016). Security M a i t r i, P. V., & Ve r m a, A. (2016). S e c u r e
and efficiency data sharing scheme for file storage in cloud computing using
cloud storage. Chaos, Solitons & Fractals, hybrid cryptography algorithm. In 2016
86, 107-116. h t t p s://d o i.o r g/10.1016/ i n t e r n a t i o n a l c o n f e re n c e o n w i re l e s s
j.chaos.2016.02.010 c o m m u n i c a t i o n s , s i g n a l p ro c e s s i n g
Imoize, A. L., Ben-Adeola, B. S., & Adebisi, J. and networking (WiSPNET) (pp. 1635-
A. (2020). Development of a multifactor- 1638). I E E E. h t t p s://d o i.o r g/10.1109/
security-protocol system using ambient noise WiSPNET.2016.7566416
synthesis. EAI Endorsed Transactions on Meshram, C., Lee, C.-C., Bahkali, I., & Imoize, A.
Security & Safety, 6(22), Article e4. http:// L. (2023). An efficient fractional chebyshev
doi.org/10.4108/eai.13-7-2018.163979 chaotic map-based three-factor session
Jimoh, R. G., Olusanya, O. O., Awotunde, J. initiation protocol for the human-centered
B., I m o i z e, A. L., & Lee, C.-C. (2022). IoT architecture. Mathematics, 11(9), Article
Identification of risk factors using ANFIS- 2085. https://doi.org/10.3390/math11092085
based security risk assessment model for Meshram, C., Ibrahim, R. W., Meshram, S.
SDLC phases. Future Internet, 14(11), Article G., Imoize, A. L., Jamal, S. S., & Barve,
305. https://doi.org/10.3390/fi14110305 S. K. (2022). An efficient remote user

22
Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

authentication with key agreement procedure h t t p s://d o i.o r g/10.1007/s11042-021-


based on convolution-Chebyshev chaotic 11125-2
maps using biometric. The Journal of Pavani, M., & Trinatha Rao, P. (2019). Adaptive
Supercomputing, 78(10), 12792-12814. PSO with optimised firefly algorithms for
https://doi.org/10.1007/s11227-021-04280-8 secure cluster-based routing in wireless
Meshram, C., Imoize, A. L., Jamal, S. S., Tambare, sensor networks. IET Wireless Sensor
P., Alharbi, A. R., & Hussain, I. (2022). S y s t e m s , 9(5), 274-283. h t t p s://d o i.
An efficient three-factor authenticated key org/10.1049/iet-wss.2018.5227
agreement technique using FCM under HC- Rahardjo, M. R. D., & Shidik, G. F. (2017,
IoT architectures. Computers, Materials October). Design and implementation of
& Continua, 72(1), 1373-1389. https://doi. self encryption method on file security.
org/10.32604/cmc.2022.024996 I n 2017 i n t e r n a t i o n a l s e m i n a r o n
Meshram, C., Imoize, A. L., Aljaedi, A., Alharbi, application for technology of information
A. R., Jamal, S. S., & Barve, S. K. (2021). A a n d c o m m u n i c a t i o n ( i S e m a n t i c ) (p p.
provably secure IBE transformation model 181-186). IEEE. https://doi.org/10.1109/
for PKC using conformable Chebyshev ISEMANTIC.2017.8251866
chaotic maps under human-centered IoT Rana, P., Batra, I., Malik, A., Imoize, A. L., Kim, Y.,
environments. Sensors, 21(21), Article 7227. Pani, S. K., Goyal, N., Kumar, A., & Rho, S.
https://doi.org/10.3390/s21217227 (2022). Intrusion detection systems in cloud
Mohammed, C. M., & Zebaree, S. R. M. (2021). computing paradigm: Analysis and overview.
Sufficient comparison among cloud Complexity, 2022, Article 3999039. https://
computing services: IaaS, PaaS, and SaaS: A doi.org/10.1155/2022/3999039
review. International Journal of Science & Rizk, R., & Alkady, Y. (2015). Two-phase hybrid
Business, 5(2), 17-30. cryptography algorithm for wireless sensor
M u r a d, S. H., & R a h o u m a, K. H. (2021). networks. Journal of Electrical Systems
Implementation and performance analysis & Information Technology, 2(3), 296-313.
of hybrid cryptographic schemes applied https://doi.org/10.1016/j.jesit.2015.11.005
in cloud computing environment. Procedia Sajay, K. R., Babu, S. S., & Vijayalakshmi, Y.
Computer Science, 194, 165-172. https://doi. (2019). Enhancing the security of cloud data
org/10.1016/j.procs.2021.10.070 using hybrid encryption algorithm. Journal
Ogundokun, R. O., Awotunde, J. B., Adeniyi, E. A., of Ambient Intelligence & Humanized
& Ayo, F. E. (2021). Crypto-Stegno based Computing. https://doi.org/10.1007/s12652-
model for securing medical information 019-01403-1
on IOMT platform. Multimedia Tools & Selvanayagam, J., Singh, A., Michael, J., &
A p p l i c a t i o n s , 80(21/23), 31705-31727. Jeswani, J. (2018). Secure file storage on

23
Journal of Library and Information Studies 21:2 (December 2023)

the cloud using cryptography. International S., Isabona, J., & Pani, S. K. (2022). A novel
R e s e a rc h J o u r n a l o f E n g i n e e r i n g & edge-computing-based framework for an
Technology (IRJET), 5(3), 2044-2047. intelligent smart healthcare system in smart
Shukla, P. K., Aljaedi, A., Pareek, P. K., Alharbi, cities. Sustainability, 15(1), Article 735.
A. R., & Jamal, S. S. (2022). AES based https://doi.org/10.3390/su15010735
white box cryptography in digital signature Ullah, S., Zheng, J., Din, N., Hussain, M. T.,
verification. Sensors, 22(23), Article 9444. Ullah, F., & Yousaf, M. (2023). Elliptic
https://doi.org/10.3390/s22239444 curve cryptography; applications, challenges,
Subasree, S., & Sakthivel, N. K. (2010). Design recent advances, and future trends: A
of a new security protocol using hybrid comprehensive survey. Computer Science
cryptography algorithms. IJRRAS, 2(2), 95-103. Review, 47, Article 100530. https://doi.
Timothy, D. P., & Santra, A. K. (2017). A hybrid org/10.1016/j.cosrev.2022.100530
cryptography algorithm for cloud computing Zhu, S.-H. (2011). Research of hybrid cipher
security. In 2017 international conference on algorithm application to hydraulic
microelectronic devices, circuits and systems i n f o r m a t i o n t r a n s m i s s i o n. I n 2011
(ICMDCS) (pp. 1-5). IEEE. https://doi. international conference on electronics,
org/10.1109/ICMDCS.2017.8211728 communications and control (ICECC) (pp.
Tripathy, S. S., Imoize, A. L., Rath, M., Tripathy, 3873-3876). IEEE. https://doi.org/10.1109/
N., Bebortta, S., Lee, C.-C., Chen, T.-Y., Ojo, ICECC.2011.6066481

(Received: 2023/1/16; Accepted: 2023/6/16)

24
學 21 2 2023.12 1-26
https://doi.org/10.6182/jlis.202312_21(2).001

於雲端運算系統中使用混合密碼學與
兩階段加密方法之分析
Analysis of a Double-stage Encryption Scheme Using
Hybrid Cryptography to Enhance Data Security in
Cloud Computing Systems
Moses Kazeem Abiodun1, Agbotiname Lucky Imoize2,3,
Joseph Bamidele Awotunde4, Cheng-Chi Lee5,6,7,
Abidemi Emmanuel Adeniyi8, Ugbaja Chioma9, Chun-Ta Li10

摘 要

RSAAES
Python MongoDB
AES RSA
17%

RSA

1,9

Department of Computer Science, Landmark University, Omu-Aran, Nigeria


2

Department of Electrical and Electronics Engineering, University of Lagos, Lagos, Nigeria


3

Department of Electrical Engineering and Information Technology, Ruhr University, Bochum, Germany
4

Department of Computer Science, University of Ilorin, Ilorin, Nigeria


5

Research and Development Center for Physical Education, Health, and Information Technology,
College of Education, Fu Jen Catholic University, New Taipei, Taiwan

25
21 2 2023.12

Department of Library and Information Science, Fu Jen Catholic University, New Taipei, Taiwan
7

Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan
8

Department of Computer Science, Precious Cornerstone University, Ibadan, Nigeria


10

Program of Artificial Intelligence and Information Security, Fu Jen Catholic University, New Taipei, Taiwan
* Corresponding Author: Cheng-Chi Lee, E-mail: [email protected]

APA Abiodun, M. K., Imoize, A. L., Awotunde, J. B., Lee, C.-C., Adeniyi, A.
E., Chioma, U., & Li, C.-T. (2023). Analysis of a double-stage encryption scheme using hybrid
cryptography to enhance data security in cloud computing systems. Journal of Library and
Information Studies, 21(2), 1-26. https://doi.org/10.6182/jlis.202312_21(2).001
Chicago Moses Kazeem Abiodun, Agbotiname Lucky Imoize, Joseph Bamidele
Awotunde, Cheng-Chi Lee, Abidemi Emmanuel Adeniyi, Ugbaja Chioma, and Chun-Ta Li,
“Analysis of a double-stage encryption scheme using hybrid cryptography to enhance data security
in cloud computing systems,” Journal of Library and Information Studies 21, no. 2 (2023): 1-26.
https://doi.org/10.6182/jlis.202312_21(2).001

26

You might also like