Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems

被引:1
作者
Abiodun, Moses Kazeem [1 ]
Imoize, Agbotiname Lucky [2 ,3 ]
Awotunde, Joseph Bamidele [4 ]
Lee, Cheng-Chi [5 ,6 ,7 ]
Adeniyi, Abidemi Emmanuel [8 ]
Chioma, Ugbaja [1 ]
Li, Chun-Ta [9 ]
机构
[1] Landmark Univ, Dept Comp Sci, Omu Aran, Nigeria
[2] Univ Lagos, Dept Elect & Elect Engn, Lagos, Nigeria
[3] Ruhr Univ, Dept Elect Engn & Informat Technol, Bochum, Germany
[4] Univ Ilorin, Dept Comp Sci, Ilorin, Nigeria
[5] Fu Jen Catholic Univ, Res & Dev Ctr Phys Educ Hlth & Informat Technol, Coll Educ, New Taipei, Taiwan
[6] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei, Taiwan
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[8] Precious Cornerstone Univ, Dept Comp Sci, Ibadan, Nigeria
[9] Fu Jen Catholic Univ, Program Artificial Intelligence & Informat Secur, New Taipei, Taiwan
来源
JOURNAL OF LIBRARY AND INFORMATION STUDIES | 2023年 / 21卷 / 02期
关键词
Cloud Computing; Cryptography; Security and Privacy; Rivest-Shamir-Adleman; Advanced Encryption Standard;
D O I
10.6182/jlis.202312_21
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Recently, network users have been scared of storing sensitive information, such as bank details, health records, and other vital information, on the Internet because it is vulnerable to attack by a third party. Several threat models are impacting the security of the cloud. Having a secure cloud system will help to be at ease in using cloud computing facilities. This study aims at providing a cryptography approach to eliminating the vulnerabilities in the cloud-based system, and making access and data storage in the cloud very safe. The system uses Rivest-Shamir-Adleman (RSA) to encrypt files and the Advanced Encryption Standard (AES) key to encrypt the encrypted files. The hash function is used for extra key security, and Python programming language was used to implement the system, and for cloud storage, MongoDB was used. Generally, results indicate that the Double Stage Encryption (DSE) takes an average time for encryption of 83% and decryption of 75% compared to RSA and AES singly. The RSA is 68% faster than AES during the encryption process, but there is no significant difference between the two during decryption. The Avalanche effect testing showed the DSE to be 17% higher than singly testing AES and RSA, which implies it is more secure than RSA and AES as single encryption schemes. Therefore, the study recommends using DSE to secure valuable data on the cloud.
引用
收藏
页码:1 / 26
页数:26
相关论文
共 42 条
[1]  
Abd Elminaam D. S., 2022, 2022 2 INT MOB INT U, P175, DOI [10.1109/MIUCC55081.2022.9781704, DOI 10.1109/MIUCC55081.2022.9781704]
[2]  
Abdulraheem Muyideen, 2021, Information and Communication Technology and Applications: Third International Conference, ICTA 2020. Communications in Computer and Information Science (1350), P444, DOI 10.1007/978-3-030-69143-1_34
[3]  
AbdulRaheem M., 2022, 5G IoT and Edge Computing for Smart Healthcare, P139
[4]   An Enhanced Lightweight Speck System for Cloud-Based Smart Healthcare [J].
AbdulRaheem, Muyideen ;
Balogun, Ghaniyyat Bolanle ;
Abiodun, Moses Kazeem ;
Taofeek-Ibrahim, Fatimoh Abidemi ;
Tomori, Adekola Rasheed ;
Oladipo, Idowu Dauda ;
Awotunde, Joseph Bamidele .
APPLIED INFORMATICS (ICAI 2021), 2021, 1455 :363-376
[5]   Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme [J].
Abikoye, Oluwakemi Christiana ;
Oladipupo, Esau Taiwo ;
Imoize, Agbotiname Lucky ;
Awotunde, Joseph Bamidele ;
Lee, Cheng-Chi ;
Li, Chun-Ta .
FUTURE INTERNET, 2023, 15 (03)
[6]  
Abiodun M. K., 2022, EAI/ Springer innovations in communication and computing, P163, DOI [10.1007/978-3-030-82715-1_8, DOI 10.1007/978-3-030-82715-1_8]
[7]   Securing Digital Transaction Using a Three-Level Authentication System [J].
Abiodun, Moses Kazeem ;
Awotunde, Joseph Bamidele ;
Adeniyi, Abidemi Emmanuel ;
Ademuagun, David ;
Aremu, Dayo Reuben .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART IV, 2022, 13380 :135-148
[8]  
Abod Z. A., 2020, Periodicals of Engineering & Natural Sciences (PEN), V8, P2007
[9]   Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things [J].
Ahmed, Adel A. ;
Barukab, Omar M. .
PROCESSES, 2022, 10 (12)
[10]   CBFISKD: A Combinatorial-Based Fuzzy Inference System for Keylogger Detection [J].
Ayo, Femi Emmanuel ;
Awotunde, Joseph Bamidele ;
Olalekan, Olasupo Ahmed ;
Imoize, Agbotiname Lucky ;
Li, Chun-Ta ;
Lee, Cheng-Chi .
MATHEMATICS, 2023, 11 (08)