Secure Data in the Cloud with a Robust Hybrid Cryptographic Approach

被引:0
|
作者
Ismail, Ghada Yousif [1 ]
Alhayali, Shaymaa [2 ]
Kareem, Shahab Wahhab [3 ,4 ]
Hussain, Zozan Saadallah [5 ]
机构
[1] Northern Tech Univ, Tech Inst, Dept Mech Technol, Mosul, Iraq
[2] Univ Mosul, Comp Ctr, Mosul, Iraq
[3] Knowledge Univ, Coll Engn, Dept Comp Engn, Erbil 44001, Iraq
[4] Erbil Polytech Univ, Erbil Tech Engn Coll, Informat Syst Engn Dept, Erbil, Iraq
[5] Northern Tech Univ, Tech Inst, Dept Elect Technol, Mosul, Iraq
关键词
Rivest Shamir Adleman (RSA); Storage Security; Cloud Computing; Cryptographic; Rabin;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud security combines hybrid symmetric encryption and key management to protect user privacy. Our approach can be easily scaled to meet growing cloud data security needs. Cloud computing's basic tenet is resource sharing, which is used for data storage, analysis, and management. Since many people use cloud services and are spread out across the internet, they present many security risks. Hybrid clouds, which can be accessed from anywhere, provide numerous advantages. The security solution (infrastructure as a service) is compatible with many PaaS, SaaS, and even IaaS cloud services. Furthermore, it is consistent with the vast majority of existing cloud solutions. Cloud computing security can be strengthened by using hybrid public key cryptosystems. Concerns about data security have made many businesses wary of cloud computing. The study aims to secure cloud computing by combining the Rabin and Rivest-Shamir-Adleman (RSA) cryptographic models. Analyzing how well a combination of methods generates secure encryption and decryption keys for data. The pure RSA system has longer response times and requires fewer computations compared to the hybrid system.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Harnessing the Hybrid Cloud for Secure Big Image Data Service
    Zhang, Yushu
    Huang, Hui
    Xiang, Yong
    Zhang, Leo Yu
    He, Xing
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1380 - 1388
  • [42] To Develop Secure Deduplication of Data Using Hybrid Cloud Methodology
    Motegaonkar, Sonali B.
    Kulkarni, Chaitanya S.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1759 - 1762
  • [43] Trust aware cryptographic role based access control scheme for secure cloud data storage
    Dayana, K. Roslin
    Rani, P. Shobha
    AUTOMATIKA, 2023, 64 (04) : 1072 - 1079
  • [44] Study on the Encryption and Decryption of a Hybrid Domestic Cryptographic Algorithm in Secure Transmission of Data Communication
    Cheng, Yuqian
    International Journal of Network Security, 2022, 24 (05) : 947 - 952
  • [45] RLCA-Robust Lightweight Cryptographic Paradigm for Secure Data Transfer Between IoT Devices
    Srinath S.
    Nagaraja G.S.
    SN Computer Science, 5 (6)
  • [46] Secure and efficient data storage scheme for unstructured data in hybrid cloud environment
    Vulapula, Sridhar Reddy
    Valiveti, Hima Bindu
    SOFT COMPUTING, 2022, 26 (23) : 13145 - 13152
  • [47] Secure and efficient data storage scheme for unstructured data in hybrid cloud environment
    Sridhar Reddy Vulapula
    Hima Bindu Valiveti
    Soft Computing, 2022, 26 : 13145 - 13152
  • [48] Hybrid and Adaptive Cryptographic-based secure authentication approach in IoT based applications using hybrid encryption
    Patil, Kavitha S.
    Mandal, Indrajit
    Rangaswamy, C.
    PERVASIVE AND MOBILE COMPUTING, 2022, 82
  • [49] Secure Management of Biomedical Data With Cryptographic Hardware
    Canim, Mustafa
    Kantarcioglu, Murat
    Malin, Bradley
    IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (01): : 166 - 175
  • [50] Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 62 - 73