0% found this document useful (0 votes)
4 views10 pages

Paper 3

The document discusses enhancing cloud data storage security through multi-layered encryption techniques, specifically using hybrid cryptography that combines symmetric and asymmetric methods. It highlights the use of various encryption algorithms such as AES, RC6, and 3DES, emphasizing their strengths in securing sensitive data against breaches and unauthorized access. The proposed system aims to provide a scalable and efficient solution for data protection in cloud environments.

Uploaded by

Mukesh Tarone
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views10 pages

Paper 3

The document discusses enhancing cloud data storage security through multi-layered encryption techniques, specifically using hybrid cryptography that combines symmetric and asymmetric methods. It highlights the use of various encryption algorithms such as AES, RC6, and 3DES, emphasizing their strengths in securing sensitive data against breaches and unauthorized access. The proposed system aims to provide a scalable and efficient solution for data protection in cloud environments.

Uploaded by

Mukesh Tarone
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Enhancing the Security of Large-Scale Data Storage in the Cloud through

Multi-Layered Encryption Techniques

SHILPA BURADE 1* PROF. JAYANT ADHIKARI2 PROF. NILESH MHAISKAR 3

1
Computer Science and Engineering Dept Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur

2
Computer Science and Engineering Dept Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur

3
Computer Science and Engineering Dept Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur

1
[email protected], [email protected], [email protected]

Abstract: In the modern digital era, cloud computing has emerged as a fundamental solution for
data storage, benefiting both individuals and businesses. Cloud-based systems provide key
advantages such as scalability, flexibility, and cost-effectiveness, allowing users to securely store
and retrieve large volumes of data remotely. Nonetheless, as more sensitive data is stored in the
cloud, ensuring strong security protections has become increasingly important. Data breaches,
cyber-attacks, and unauthorized access continue to pose significant risks to the confidentiality and
security of data stored in cloud environments.
Keywords— Triple encryption, Hybrid Cryptography, Confidentiality, Integrity, Availability,
Storage, and Security, Data Protection, Encryption, Elliptic Curve Cryptography, AES, RC6, 3DES,
RSA
.
I.INTRODUCTION

Hybrid Cryptography leverages the advantages of both symmetric and asymmetric encryption
to create a more secure, efficient, and scalable encryption system. For symmetric encryption,
Blowfish is chosen for its efficiency and speed, making it ideal for encrypting large files with
minimal computational overhead. To further secure the system, asymmetric encryption methods such
as AES, RC6, 3DES, RSA, or ECC (Elliptic Curve Cryptography) can be applied to encrypt the keys
used by Blowfish, ensuring that these keys are safely stored and transmitted. To achieve a high level
of security, documents are encrypted using three different encryption techniques in succession,
making unauthorized decryption exceedingly challenging. This multi-layered approach significantly
enhances security, particularly when data is transmitted over the internet. Unlike traditional systems
that typically use a single encryption method (either symmetric or asymmetric), our approach
combines Blowfish (a fast symmetric encryption algorithm) with AES, RC6, and 3DES for
symmetric encryption, along with RSA or ECC for asymmetric encryption to secure both the data
and the encryption keys. The widespread use of cloud computing offers several benefits, such as
scalability, flexibility, and cost-effectiveness, but it also brings forth significant concerns regarding
data security. The motivation for utilizing hybrid cryptography with triple encryption in cloud
storage stems from multiple security challenges.
II. RELATED WORK
Data security in cloud is an important issue and hybrid encryption is a popular tool to secure cloudb
ased data storage. Security is important in this digital age. Therefore, a lot of research has been done
in this field (like cloud) to protect customer information from all kinds of security and leaks. At the
same time, different researchers have proposed different security methods to protect cloud data usi
ng cryptography. I am using the following output to form a basis for my project.
Design of secure virtual data storage in cloud using hybrid encryption". By Bello A. Buhari, Aliyu
Mubarak, Bello A. Bodinga, and Muazu D. Sifawa (2022). In their research [1], they introduced a h
ybrid encryption algorithm cryptographic method for archive encryption and decryption based on 2
hash functions. The presented idea is to use a cloud API with REST calls or a client library in PH P.
"Securing data stored in the cloud using Hybrid Encryption" Naveetha K. &T. Tamirasan (2021).
This paper [2] introducesbehaviorbased encryption (ABE) as a hybrid cryptography. The aim of the
system is to provide effective access control to encrypted data and to provide easier and more secur
e access to the management and sharing of data."

Ensuring security of data stored in cloud computing using Hybrid Encryption Techniques", K. R. Vi
noth Kumar and K. Manivann, (2012). This paper [3] proposes cloud data security technology base
d on hybrid encryption technology. This technology combines AES and RSA.
"Performance Comparison of Data Encryption Algorithms", A. Nadeem, (2006). In this paper differ
ent key algorithms such as DES, 3DES, AES and Blowfish have been studied [4]. The proposed me
thods have been implemented and their performances have been compared by encrypting inputs wit
h different content and size. This paper has also tested the algorithm on two different hardware platf
orms to compare its performance. “Transforming Security Using Hybrid Encryption Algorithms” by
Sanjeev Kuma, Garima Karnani, and Madhu Sharma Gaur (2021). This paper [5] presents a securit
y solution for cloud computing based on hybrid cryptography. The proposed scheme combines DES
and RSA algorithms to encrypt and decrypt data. The paper also evaluates the performance of the p
roposed scheme and shows that it can provide data storage in the cloud.
"Securing data stored in the cloud using hybrid encryption techniques" A. Poduvall, A. Doke, H. Ne
made, and R. Nikam (2019). [6] This paper introduces the security of data stored in cloud computin
g based on hybrid encryption. This method uses DES, AES and RC6 algorithms to encrypt and decr
ypt data. This paper also reviews the requirements and demonstrates that it can provide secure data
storage in cloud computing
"Using hybrid encryption algorithms to ensure data security in cloud computing." By Punam V. M
aitri and Aruna Verma, (2016). The article [8] focuses on how data is stored securely on cloud plat
forms. It also talks about the problem of using a single encryption algorithm to encrypt data and ho
w useless the cloud is. This paper divides data into blocks and each block is encrypted using AES,
BlowfishandRC6algorithms.RivestShamirAdleman (RSA) encryption and digital signature". Auth
or: Ping, Z.L., Liang, S.Q. and Liang, L. X. (2011).

Gift Chisoni1 and Dr. Glorindal Selvam-2023This paper proposes a new hybrid cryptography
approach for secure file storage on the cloud regardless of the type of deployment model ie., either
public cloud, private cloud, or hybrid cloud. The proposed approach uses a combination of the
Advanced Encryption Standard (AES) algorithm, Triple Data Encryption Standard (DES)
algorithm, and Rivest cipher 6 (RC6) algorithms are used to provide block-wise security to data.
LSB steganography technique is introduced for key information security. One of the primary
disadvantages of steganography is the risk of detection. If an attacker or unauthorized user suspects
that steganography is being used, they may employ various detection techniques to uncover hidden
messages. This could lead to the exposure of sensitive information.

Pratima Sharma and Rajni Jinda in this paper blockchain technology is used Blockchain systems can
be complex to implement and manage. The decentralized nature of blockchain requires a significant
amount of computational resources, which can lead to scalability issues. As the number of
transactions increases, the network may become congested, resulting in slower processing times.
This is particularly problematic for cloud services that require high-speed data access and
processing

A. Ashok Kumar1, Santhosha1, A.JaganThe work presented here proposed a two layer mechanism
for providing efficient and computationally light security procedure. At the first layer public key
cryptography has been used, whereas second layer is totally based on steganography. RSA method
is used for key exchange and AES for encryption and decryption to make the method
computationally efficient.
III. METHODOLOGY

A. Advanced Encryption Standard (AES) Algorithm


The Advanced Encryption Standard (AES) is a widely used symmetric key block cipher designed to
maintain data confidentiality. It was formalized as a standard by the U.S. National Institute of
Standards and Technology (NIST) in 2001. AES processes data in 128-bit blocks, utilizing key sizes
of 128, 192, or 256 bits. The algorithm applies a series of transformations—SubBytes, ShiftRows,
MixColumns, and AddRoundKey—across multiple rounds (10, 12, or 14 rounds depending on the
key length). These operations introduce confusion and diffusion, strengthening the security of the
data. AES is employed in various applications, including:
 Secure Communication: Safeguarding sensitive information during transmission.
 Electronic Payments: Securing online transactions in digital commerce.
Data Storage: Encrypting sensitive data in databases and storage devices is crucial for maintaining
confidentiality. AES's combination of speed, efficiency, and strong security features makes it the
encryption standard of choice worldwide.
B. 3DES Algorithm Overview
3DES (Triple DES) is recognized for its strength due to its adherence to two key characteristics of
block ciphers:
1. Avalanche Effect: Even a slight modification in the plaintext results in significant changes in the
ciphertext, making the relationship between the two highly complex.
2. Completeness: Each bit of the ciphertext is influenced by multiple bits of plaintext, improving the
cipher's robustness.
These features help defend against cryptographic attacks, though 3DES is now less commonly used
in modern systems due to the development of faster and more efficient algorithms.
D. RC6 Algorithm Overview
RC6 is a symmetric key block cipher developed in 1998 by Ronald Rivest and his team at RSA
Security. It is a refinement of the RC5 algorithm and was a finalist in the AES competition. RC6
offers flexibility by allowing customization of key size, block size, and the number of rounds,
enabling adaptation to various security needs. It utilizes a four-register structure, enhancing both its
speed and parallel processing capabilities.
Key characteristics include:
 Variable Key Lengths: RC6 supports key sizes of 128, 192, or 256 bits.
 Block Size: Typically set at 128 bits, which is ideal for high-security applications.
 Rounds: A standard implementation uses 20 rounds to achieve strong encryption.
RC6 is employed in tasks such as encryption, digital signature verification, and authentication
protocols. Its efficiency in both hardware and software implementations makes it suitable for
environments with limited resources.
C. Block Cipher with Symmetric Secret Key
Block ciphers work by dividing plaintext into fixed-size blocks and encrypting each block using a
symmetric key.
 Key Length: Varies from a single byte to 128 bytes, offering flexibility for different security
requirements.
 Block Length: Typically 8 bytes, ensuring manageable sizes for encryption processes.
This method guarantees data confidentiality while being straightforward to implement.
D. Least Significant Bit (LSB) Technique
The Least Significant Bit (LSB) technique is commonly used in areas like data compression, digital
signal processing, and encryption. In encryption, LSB manipulation involves modifying the least
significant bit of a byte, enabling the embedding of data without noticeable changes to the overall
structure. Common applications include:
 Data Compression: Reducing the size of data without losing important information.
 Signal Processing: Improving the performance of digital communication systems.
The simplicity and low computational requirements of LSB techniques make them particularly
useful in resource-limited environments, although they may be vulnerable to certain attacks if not
supplemented with additional security methods.

Algorithm 1: Advanced Encryption Standard (AES)

Input: Plaintext (P), Key (K)


Output: Ciphertext (C) Steps:
1. Divide the plaintext into blocks of 128 bits.
2. Generate a key schedule using the provided key.
3. Perform the following steps for rounds (10 for 128-bit keys, 12 for 192-bit keys, and 14 for
256bit keys):
a. SubBytes: Replace each byte with its corresponding value from the S-box.
b. ShiftRows: Shift rows of the state matrix to the left by different offsets.
c. MixColumns: Apply a mathematical transformation to each column of the state matrix (skipped
in the final round).
d. AddRoundKey: XOR the state with the corresponding round key.
4. After the final round, output the ciphertext .

Algorithm 2: Triple Data Encryption Standard (3DES)

Input: Plaintext (P), Keys


Output: Ciphertext (C) Steps:
1. Divide the plaintext into blocks of 64 bits.
2. Apply the DES encryption algorithm using (Encrypt).
3. Apply the DES decryption algorithm using (Decrypt).
4. Apply the DES encryption algorithm again using

V. DESIGN AND IMPLEMENTATION

The system prototype is designed in such a way that it has the following phases:
Register/Login:
All users need to register first by filling up the basic registration fields.
• Using the combination of login id and password, the user can log in to the system.
Upload data:
Here, different types of files to be stored are encrypted using AES (Advance Encryption
Standard), DES (Data Encryption Standard), and RC6 (Rivest Cipher 6) encryption algorithms.
The Least Significant Bit (LSB) technique is widely utilized in fields such as data
compression, digital signal processing, and encryption. In encryption, LSB manipulation often
involves altering the least significant bit of a byte, enabling data embedding without significant
changes to the overall structure.
• Key information contains which part of the file is encrypted using which algorithm and key.
Send a Message via Email:

• Once the encryption process has been completed in the background, this encrypted file is sent
along with the image containing the key that s hidden in the image using LSB.
Download data:

• Here, when the user request for a file to be downloaded, then that file is decrypted using AES,
DES, and RC6.
• After successful decryption, the file is merged into one file and then downloaded.
Log Generation:

• If the file doesn't match the sender’s file, then the system will display a dummy file and the
technical details such as user ill, IP address, date, time, etc. will be stored in the data base.

Fig: Encryption method

VII. RESEARCH AND DISCUSSION


This paper outlines the design and implementation of a hybrid cryptosystem aimed at securing data
stored in the cloud. The system ensures high levels of security, privacy, availability, and scalability.
A model will be created to simulate and evaluate the performance metrics and other key
measurements of the proposed encryption algorithm.
The primary encryption algorithms considered are AES, 3DES, and RC6, as all three rely on block
cipher encryption methods. Security and resilience, among other factors, will be assessed during the
evaluation. AES, with its smaller key size (128 bits), generally requires less processing time
compared to 3DES (64 bits) and RC6 (128 or 256 bits). Although AES's key size is larger than that
of DES (56 bits), it is still less computationally demanding than 3DES and RC6, making it a more
efficient choice overall. Due to DES's smaller block size and key length, it is the slowest algorithm
among the three.
Security: In terms of security, AES is widely regarded as the most secure of the three algorithms. It
has undergone extensive analysis and testing, and its strength in protecting encrypted data has been
well-established. AES is also the only encryption method currently approved by the U.S.
government for securing sensitive information. 3DES, although secure, is considered less robust due
to its smaller key size compared to AES. RC6 is considered secure as well, though it hasn't been
subjected to as much scrutiny and testing as AES. AES and RC6 support various bit sizes, while
3DES uses a smaller bit size of 56 bits. AES is available in key sizes of 128, 192, and 256 bits, while
RC6 supports 128 and 256-bit key sizes. Additionally, RC6 can operate in both block cipher and
stream cipher modes, providing flexibility for different encryption applications. In combination,
AES and RC6 can offer enhanced security, with AES generally recognized for its speed and
robustness, while RC6 is valued for its versatility. 3DES, while secure, is slower compared to
modern algorithms.

VIII.CONCLUSION AND FUTURE ENHANCEMENT

In this project, Hybrid Cryptography is utilized by combining both symmetric and


asymmetric encryption techniques to create a more secure, efficient, and scalable encryption system.
The symmetric encryption algorithm Blowfish is chosen for its speed and efficiency, making it ideal
for encrypting large files with minimal processing time. In addition to Blowfish, other encryption
methods such as AES, RC6, and 3DES, as well as asymmetric encryption techniques like RSA or
ECC (Elliptic Curve Cryptography), are used to encrypt the keys that Blowfish generates. This
ensures secure storage and transmission of the keys.
To achieve a higher level of security, Triple Encryption is employed, which involves encrypting
documents using three different encryption techniques. This multi-layered encryption makes
unauthorized decryption extremely challenging, significantly improving security, particularly when
transferring data over the internet. Unlike older systems that rely on a single encryption method
(either symmetric or asymmetric), our approach integrates Blowfish (a fast symmetric encryption
algorithm) with AES, RC6, 3DES, and RSA or ECC (asymmetric encryption) to secure both the data
and the encryption keys. The widespread adoption of cloud computing offers various benefits such
as scalability, flexibility, and cost-effectiveness, but one of the main concerns in cloud storage is the
security of stored data.
Additionally, this project allows for the flexibility to change the encryption algorithms based on
specific requirements and provides the option to choose the level of encryption applied. In future
work, we plan to focus on load balancing and optimizing the speed of file uploads and downloads
from the cloud.

IX.ACKNOWLEDGMENT
would like to extend my heartfelt thanks to everyone who has supported me during this research
journey. My deepest appreciation goes to my project guide, Mr. Jayent Adhikari, and co-guide Mr.
Nilesh Mahishkar for their continuous guidance, encouragement, and valuable feedback throughout
the entire process. Their expertise and thoughtful advice have played a crucial role in shaping this
work.
X. REFERENCES
[1] Shrikanta Jogarl & Darshan S Handral. (2022). "Secure File Storage on Cloud Using
HybridCryptography", International Journal of Advanced Research in Science,
Communication and Technology (IJARSCT).
[2] Gajanan T, S. Jayde, H.Gaurkhede, R. Vaidya, A. Wankhade& V.Yelekar. (2021). "Secure
File Storage on Cloud Using Hybrid Cryptography", International Research Journal of
Engineering and Technology (IRJET). ISSN: 2395-0056.
[3] M.Naveetha Krishnan&T.Tamilarasan. (2021). "Secure File Storage on Cloud Using
Hybrid Cryptography", International Journal of Advanced Research in Computer Science
Engineering and Information Technology (IJARCSEIT).
[4] Uttam Kumar, Mr. Jay Prakash (2020). "Secure File Storage On Cloud Using Hybrid
Cryptography Algorithm", International Journal of Creative Research Thoughts (IJCRT).
ISSN:- 2320-2882 [Base Paper]. [5]. Aditya Poduval, Abhijeet Doke, Hitesh Nemade& Rohan
Nikam. (2019). "Secure File Storage on Cloud using Hybrid Cryptography", International
Journal of Computer Sciences and Engineering (IJCSE) E-ISSN: 2347-2693.
[6] M. Malarvizhi, J. Angela Jennifa Sujana, T.Revathi (2014). "Secure File Sharing Using
Cryptographic Techniques In Cloud", International Conference On Green Computing
Communication And Electrical Engineering (ICGCCEE).

[7] Lowlesh Yadav and Asha Ambhaikar, “IOHT based Tele-Healthcare Support System for
Feasibility and perfor-mance analysis,” Journal of Electrical Systems, vol. 20, no. 3s, pp. 844–
850, Apr. 2024, doi: 10.52783/jes.1382.
[8] L. Yadav and A. Ambhaikar, "Feasibility and Deployment Challenges of Data Analysis in
Tele-Healthcare System," 2023 International Conference on Artificial Intelligence for
Innovations in Healthcare Industries (ICAIIHI), Raipur, India, 2023, pp. 1-5, doi:
10.1109/ICAIIHI57871.2023.10489389.
[9] L. Yadav and A. Ambhaikar, "Approach Towards Development of Portable Multi-Model
Tele-Healthcare System," 2023 International Conference on Artificial Intelligence for
Innovations in Healthcare Industries (ICAIIHI), Raipur, India, 2023, pp. 1-6, doi:
10.1109/ICAIIHI57871.2023.10489468.
[10] Lowlesh Yadav and Asha Ambhaikar, Exploring Portable Multi-Modal Telehealth
Solutions: A Development Approach. International Journal on Recent and Innovation Trends in
Computing and Communication (IJRITCC), vol. 11, no. 10, pp. 873– 879, Mar. 2024.11(10),
873–879.
[11] Lowlesh Yadav, Predictive Acknowledgement using TRE System to reduce cost and
Bandwidth, March 2019. International Journal of Research in Electronics and Computer
Engineering (IJRECE), VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) ISSN: 2393-9028
(PRINT) | ISSN: 2348-2281 (ONLINE).

You might also like