Secure Data in the Cloud with a Robust Hybrid Cryptographic Approach

被引:0
|
作者
Ismail, Ghada Yousif [1 ]
Alhayali, Shaymaa [2 ]
Kareem, Shahab Wahhab [3 ,4 ]
Hussain, Zozan Saadallah [5 ]
机构
[1] Northern Tech Univ, Tech Inst, Dept Mech Technol, Mosul, Iraq
[2] Univ Mosul, Comp Ctr, Mosul, Iraq
[3] Knowledge Univ, Coll Engn, Dept Comp Engn, Erbil 44001, Iraq
[4] Erbil Polytech Univ, Erbil Tech Engn Coll, Informat Syst Engn Dept, Erbil, Iraq
[5] Northern Tech Univ, Tech Inst, Dept Elect Technol, Mosul, Iraq
关键词
Rivest Shamir Adleman (RSA); Storage Security; Cloud Computing; Cryptographic; Rabin;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud security combines hybrid symmetric encryption and key management to protect user privacy. Our approach can be easily scaled to meet growing cloud data security needs. Cloud computing's basic tenet is resource sharing, which is used for data storage, analysis, and management. Since many people use cloud services and are spread out across the internet, they present many security risks. Hybrid clouds, which can be accessed from anywhere, provide numerous advantages. The security solution (infrastructure as a service) is compatible with many PaaS, SaaS, and even IaaS cloud services. Furthermore, it is consistent with the vast majority of existing cloud solutions. Cloud computing security can be strengthened by using hybrid public key cryptosystems. Concerns about data security have made many businesses wary of cloud computing. The study aims to secure cloud computing by combining the Rabin and Rivest-Shamir-Adleman (RSA) cryptographic models. Analyzing how well a combination of methods generates secure encryption and decryption keys for data. The pure RSA system has longer response times and requires fewer computations compared to the hybrid system.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A Novel Cryptographic and Steganographic Approach for Secure Cloud Data Migration
    Dhamija, Ankit
    Dhaka, Vijay
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 346 - 351
  • [2] A robust cryptographic-based system for secure data sharing in cloud environments
    Mahmoud, Ibrahim M.
    El-Din, Sherif H. Nour
    Elgohary, Rania
    Faheem, Hossam
    Mostafa, Mostafa G. M.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6248 - 6265
  • [3] Secure Data Storage in Cloud using Cryptographic Algorithms
    Kodumru, Nagasai Lohitha
    Supriya, M.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [4] Hybrid cryptographic technique to secure data in web application
    Gupta, Neha
    Kapoor, Vivek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (01): : 125 - 135
  • [5] An Efficient Paillier Cryptographic Technique for Secure Data Storage on the Cloud
    Pallavi
    Joshi, Sandeep
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 145 - 149
  • [6] Secure cloud services - extended cryptographic model of data storage
    Grocholewska-Czurylo, Anna
    Retinger, Marek
    PRZEGLAD ELEKTROTECHNICZNY, 2018, 94 (03): : 162 - 167
  • [7] Hybrid robust image steganography approach for the secure transmission of biomedical images in cloud
    Arunkumar S.
    Subramaniyaswamy V.
    Logesh R.
    EAI Endorsed Transactions on Pervasive Health and Technology, 2019, 5 (18)
  • [8] A hybrid approach to secure and compress data streams in cloud computing environment
    Abdo, A.
    Karamany, Taghreed S.
    Yakoub, Ahmed
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (03)
  • [9] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [10] On Secure Outsourcing of Cryptographic Computations to Cloud
    Kuppusamy, Lakshmi
    Rangasamy, Jothi
    Gauravaram, Praveen
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 63 - 67