0% found this document useful (0 votes)
9 views6 pages

Itjcc02 - ZR

This document presents a hybrid cryptography system designed to enhance data security in cloud computing by combining symmetric (DES, AES) and asymmetric (Elliptic Curve Cryptography) encryption methods. The proposed model addresses limitations of traditional systems, offering layered security, efficient key management, and scalability to protect sensitive data against modern cyber threats. Additionally, it outlines system requirements for hardware and software necessary for implementation.

Uploaded by

spamgmair
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views6 pages

Itjcc02 - ZR

This document presents a hybrid cryptography system designed to enhance data security in cloud computing by combining symmetric (DES, AES) and asymmetric (Elliptic Curve Cryptography) encryption methods. The proposed model addresses limitations of traditional systems, offering layered security, efficient key management, and scalability to protect sensitive data against modern cyber threats. Additionally, it outlines system requirements for hardware and software necessary for implementation.

Uploaded by

spamgmair
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Hybrid Cryptography Techniques for Data Security in Cloud

Computing

ABSTRACT:

The Prime objective of cloud computing is to centralize processing and storage capabilities.
Since cloud computing elevates performance requirements to greater heights, it is possible to
process extremely huge amounts of data with minimal effort. This research work suggests a
two-tier cryptography-based security system for cloud computing. This particular model
combines symmetric and asymmetric key cryptography methods. In this case, the most used
Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are used to
enable layered encryption and decryption, enhancing the security of cloud storage. It
generates the secret key using Elliptic Curve Cryptography, which is utilized in the DES and
AES algorithms to promote adaptability, scalability, and dependability. The system further
improves data confidentiality by ensuring that unauthorized access to sensitive information is
minimized. This approach also addresses the growing concerns about data breaches and
cyber-attacks in cloud environments. With the combination of DES, AES, and Elliptic Curve
Cryptography, the proposed model offers a more robust and efficient method for protecting
cloud-based data.
EXISTING SYSTEM
In the existing system of cloud computing, data security remains a major concern due to the
vast amount of sensitive information stored in the cloud. Traditional security methods often
rely on single encryption algorithms, such as symmetric or asymmetric encryption. While
these methods ensure some level of security, they are limited in their ability to address the
various challenges posed by cloud environments, such as scalability, performance, and
adaptability. For instance, symmetric encryption methods like DES (Data Encryption
Standard) are fast and efficient but lack sufficient security when dealing with modern
computing power. Asymmetric encryption, on the other hand, offers higher security but is
often slower and computationally expensive. Furthermore, many existing systems fail to
combine these methods effectively, limiting their ability to provide comprehensive protection
for data. This lack of layered security increases the risk of data breaches, unauthorized
access, and cyber-attacks, especially as cloud services continue to grow in scale and
complexity.

DISADVANTAGES

1. Limited Security Layering: Most existing systems only use one type of encryption,
leaving data potentially vulnerable to attacks that could bypass a single encryption
layer.
2. Slower Processing in Asymmetric Encryption: While asymmetric encryption
provides higher security, it can be slower compared to symmetric encryption,
impacting overall performance in cloud systems.
3. Inefficiency with Large Datasets: Existing single encryption methods struggle to
handle the encryption and decryption of large datasets efficiently, affecting the
performance of cloud-based applications.
4. Scalability Challenges: Traditional encryption schemes may not scale effectively in
large cloud environments, leading to performance bottlenecks as the volume of data
increases.
5. Weak Key Management: Many existing systems lack efficient key management,
making them more susceptible to key theft and unauthorized access to encrypted data.
6. Vulnerability to Advanced Attacks: Traditional encryption methods may not be
fully resistant to modern cryptographic attacks, such as those from quantum
computers, leaving data at risk.
7. Inadequate Protection for Sensitive Data: In cloud computing environments, where
data sensitivity is critical, existing systems often fail to provide the required level of
protection for sensitive user information, making it vulnerable to unauthorized access.

PROPOSED SYSTEM
The proposed system introduces a hybrid cryptography approach for enhancing data security
in cloud computing. This system combines symmetric encryption (DES and AES) with
asymmetric encryption techniques, along with Elliptic Curve Cryptography (ECC) for key
generation. The hybrid approach aims to address the limitations of traditional systems by
leveraging the strengths of both encryption types. Symmetric encryption methods like DES
and AES are used for fast data encryption, while asymmetric encryption, using ECC, ensures
stronger security without compromising performance. The combination of these methods
provides layered security, improving adaptability, scalability, and overall data confidentiality.
This hybrid model ensures that cloud data is protected from unauthorized access while
enhancing efficiency in large-scale environments. Furthermore, ECC enables secure and
efficient key management, reducing the risk of exposure to cyber-attacks and data breaches.
The result is a highly secure, scalable, and efficient system capable of meeting the growing
security challenges in modern cloud computing environments.

ADVANTAGES

1. Enhanced Security with Layered Encryption: By combining both symmetric (DES,


AES) and asymmetric encryption (Elliptic Curve Cryptography), the proposed system
offers multiple layers of security, reducing the risk of unauthorized access and data
breaches.
2. Efficient Data Encryption: Symmetric encryption algorithms like DES and AES
provide fast encryption and decryption speeds, ensuring minimal impact on
performance while maintaining strong data protection.
3. Strong Key Management: The use of Elliptic Curve Cryptography (ECC) for key
generation ensures secure, efficient, and scalable key management, improving overall
data security in cloud environments.
4. Scalability: The hybrid cryptographic system is designed to scale effectively in large
cloud environments, supporting large volumes of data and numerous users without
sacrificing performance.
5. Adaptability to Different Use Cases: The system can be tailored to meet the security
needs of various cloud applications, providing a flexible security approach that adapts
to different environments.
6. Protection Against Modern Attacks: By incorporating ECC and layered encryption,
the proposed system is resilient against advanced threats, including brute-force
attacks, man-in-the-middle attacks, and quantum computing-based attacks.
7. Faster Processing with Symmetric Encryption: The use of symmetric encryption
methods (AES, DES) ensures fast data processing, which is critical for cloud
applications that require real-time access to large datasets.
8. Reduced Risk of Data Breaches: Layered security mechanisms reduce the chances
of successful data breaches, offering a higher level of protection than single-
encryption approaches.
9. Efficiency in Key Exchange: ECC provides efficient key generation and exchange,
reducing the computational overhead associated with traditional asymmetric
encryption methods like RSA.
10. Compliance with Data Protection Regulations: The robust encryption techniques
used in the proposed system ensure compliance with data privacy laws and
regulations, such as GDPR and HIPAA, by safeguarding sensitive cloud data.
SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS
The hardware requirements may serve as the basis for a contract for the
implementation of the system and should therefore be a complete and consistent specification
of the whole system. They are used by software engineers as the starting point for the system
design. It shows what the system does and not how it should be implemented.

PROCESSOR : DUAL CORE 2 DUOS

RAM : 4GB RAM

MONITOR : 15” COLOR

HARD DISK : 250 GB

SOFTWARE REQUIREMENTS

The software requirements document is the specification of the system. It should include both
a definition and a specification of requirements. It is a set of what the system should do rather
than how it should do it. The software requirements provide a basis for creating the software
requirements specification. It is useful in estimating cost, planning team activities,
performing tasks and tracking the team’s and tracking the team’s progress throughout the
development activity.

FRONT END : HTML, CSS, REACTJS,


BOOTSTRAP

BACK END : SPRINGBOOT

DATABASE : MY SQL

CLOUD SERVICE : AMAZON WEB SERVICE

You might also like